Open Access   Article Go Back

Security and Privacy Issues in Big-data Hadoop: A Review

athisha M S1 , K C Ravishankar2

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 730-738, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.730738

Online published on Nov 30, 2018

Copyright © Sathisha M S, K C Ravishankar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sathisha M S, K C Ravishankar, “Security and Privacy Issues in Big-data Hadoop: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.730-738, 2018.

MLA Style Citation: Sathisha M S, K C Ravishankar "Security and Privacy Issues in Big-data Hadoop: A Review." International Journal of Computer Sciences and Engineering 6.11 (2018): 730-738.

APA Style Citation: Sathisha M S, K C Ravishankar, (2018). Security and Privacy Issues in Big-data Hadoop: A Review. International Journal of Computer Sciences and Engineering, 6(11), 730-738.

BibTex Style Citation:
@article{S_2018,
author = {Sathisha M S, K C Ravishankar},
title = {Security and Privacy Issues in Big-data Hadoop: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {730-738},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3235},
doi = {https://doi.org/10.26438/ijcse/v6i11.730738}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.730738}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3235
TI - Security and Privacy Issues in Big-data Hadoop: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Sathisha M S, K C Ravishankar
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 730-738
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
509 346 downloads 204 downloads
  
  
           

Abstract

Nowadays Data is one of the important assets for industries in almost all fields. Advances in information technology and its widespread growth in several areas such as business, engineering, medical, and scientific studies are resulting in data explosion. This data explosion created a new problem that, data cannot be handled by traditional techniques. This problem was, therefore, solved through the creation of a new paradigm: Big Data. Big-data refers to massive volume of structured, semi structured and unstructured data that conventional data management methods are incapable of handling. One of the finest and most popular technology available for handling and processing that enormous amount of data is the Hadoop ecosystem[4]. Enterprises are increasingly relying on Hadoop for storing their valuable data and processing it. However, Hadoop is still evolving. Many researchers have found vulnerabilities in Hadoop, which can question the security of the sensitive information that enterprises are storing on it. In order to prevent these concerns from becoming real harms, effective policy and technological measures are required on the part of organizations that uses “Big Data”, as well as for individuals to whom the data relates. It is almost impossible to carry out detailed research into the entire topic of security. In this paper we try to present a big picture of the main problems related to security in a Hadoop ecosystem, along with the possible solutions to those problems proposed by the research community.

Key-Words / Index Term

Big data; Hadoop; security; privacy

References

[1] Julio Moreno, Manuel A. Serrano and Eduardo Fernandez-Medina “Article Main Issues in Big Data Security” Future Internet 2016, 8, 44; doi: 10.3390/fi8030044.
[2] B. Saraladevi, N. Pazhaniraja, P. Victer Paul, M.S. Saleem Basha, P. Dhavachelvan “Big Data and Hadoop-A Study in Security Perspective” 2nd International Symposium on Big Data and Cloud Computing (ISBCC’15) doi: 10.1016/j.procs.2015.04.091
[3] Youssef Gahi, Mouhcine Guennoun, and Hussein T. Mouftah “Big Data Analytics: Security and Privacy Challenges” IEEE Symposium on Computers and Communication (ISCC), 2016
[4] Raj R. Parmar, Sudipta Roy, Debnath Bhattacharyya,Samir Kumar Bandyopadhyay, (Senior Member, IEEE), And Tai-Hoon Kim “Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions” IEEE Access, 2017. Digital Object Identifier 10.1109/ACCESS.2017.2700228
[5] YANG Mengke, ZHOU Xiaoguang, ZENG Jianqiu, XU Jianjian,
“Challenges and solutions of information Security issues in the
Age of Big Data” China communications, 2016
[6] Pradeep Adluru, Srikari Sindhoori Datla, Xiaowen Zhang, “Hadoop Eco System for Big Data Security and Privacy” 978-1-4577-1343-9/12/$26.00 ©2015 IEEE
[7] Xianqing Yu, Peng Ning, Mladen A. Vouk, “Enhancing Security of Hadoop in a Public Cloud” 6th International Conference on Information and Communication Systems (ICICS), IEEE 2015
[8] Masoumeh RezaeiJam, Leili Mohammad Khanli, Mohammad Kazem Akbari, “A Survey on Security of Hadoop” IEEE 4th international conference on computer and knowledge engineering, 2014
[9] Yannan Maa, Yu Zhoua, Yao Yua, Chenglei Penga, Ziqiang Wanga, Sidan Dua “A Novel Approach for Improving Security and Storage Efficiency on HDFS” The 6th International Conference on Ambient Systems, Networks and Technologies (ANT 2015) doi: 10.1016/j.procs.2015.05.062
[10] Zichan Ruan , Yuantian Miao, Lei Pan, Nicholas Patterson, Jun Zhang “Visualization of big data security: A Case study on the KDD99 cup data set” Digital Communications and Networks 3 (2017) 250–259 doi.org/10.1016/j.dcan.2017.07.004
[11] Chao YANG, Weiwei LIN, Mingqi LIU “A Novel Triple Encryption Scheme for Hadoop-based Cloud Data Security” Fourth International Conference on Emerging Intelligent Data and Web Technologies, IEEE 2013 DOI 10.1109/EIDWT.2013.80
[12] MATTURDI Bardi, ZHOU Xianwei, LI Shuai, LIN Fuhong “Big Data security and privacy: A review”,China Communications Supplement No.2, 2014
[13] Madhvaraj M Shetty, Manjaiah D.H “Data Security in Hadoop Distributed File System” International Conference on Emerging Technological Trends [ICETT], IEEE 2016
[14] Thu Yein Win,Member IEEE, Huaglory Tianfield, and Quentin Mair, Member IEEE “Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing” IEEE TRANSACTIONS ON BIG DATA, VOL. 4, NO. 1, JANUARY-MARCH 2018
[15] Khairulliza Ahmad Salleha,Lech Janczewski “Technological, organizational and environmental security and privacy issues of big data: A literature review” Procedia Computer Science 100 ( 2016 ) 19 – 28, doi: 10.1016/j.procs.2016.09.119
[16] A RENCI/ National consortium for data science white paper “Security and Privacy in the Era of Big Data” November 2013
[17] C.L.Philip Chen,Chun-Yang Zhang “Data-intensive applications, challenges, techniques and technologies: A survey on Big Data” Information Sciences 275 (2014) 314–347, dx.doi.org/10.1016/j.ins.2014.01.015
[18] Tian, Y. (2017) “Towards the Development of Best Data Security for Big Data”.Communications and Network, 9, 291-301.
[19] Priya P. Sharma, Chandrakant P. Navdeti “Securing Big Data Hadoop: A Review of Security Issues, Threats and Solution” International Journal of Computer Science and Information Technologies, Vol. 5 (2), 2014, 2126-2131
[20] Alfredo Cuzzocrea “Privacy and Security of Big Data: Current Challenges and Future Research Perspectives” Copyright © 2014 ACM 978-1-4503-1583- 8/14/11
[21] Poonam R. Wagh, Amol D. Potgantwar “Providing Security to Data Stored on HDFS Using Security Protocol” International Journal of Scientific Research in Network Security and Communication Volume-5, Issue-4, August 2017, ISSN: 2321-3256
[22] Anitya Kumar Gupta, Srishti Gupta “Security Issues in Big Data with Cloud Computing” International Journal of Scientific Research in Computer Sciences and Engineering, Vol.5, Issue.6, pp.27-32, December (2017) E-ISSN: 2320-7639
[23] Masoumeh RezaeiJam, Leili Mohammad Khanli, Mohammad Kazem Akbari “A Survey on Security of Hadoop”,4th international conference on computer and knowledge engineering (ICCKE) IEEE 2014.