Open Access   Article Go Back

Approval of Data in Hadoop Using Apache Sentry

Regha S.1 , Manimekalai M.2

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 583-586, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.583586

Online published on Jan 31, 2019

Copyright © Regha S., Manimekalai M. . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Regha S., Manimekalai M., “Approval of Data in Hadoop Using Apache Sentry,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.583-586, 2019.

MLA Style Citation: Regha S., Manimekalai M. "Approval of Data in Hadoop Using Apache Sentry." International Journal of Computer Sciences and Engineering 7.1 (2019): 583-586.

APA Style Citation: Regha S., Manimekalai M., (2019). Approval of Data in Hadoop Using Apache Sentry. International Journal of Computer Sciences and Engineering, 7(1), 583-586.

BibTex Style Citation:
@article{S._2019,
author = {Regha S., Manimekalai M.},
title = {Approval of Data in Hadoop Using Apache Sentry},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {583-586},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3547},
doi = {https://doi.org/10.26438/ijcse/v7i1.583586}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.583586}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3547
TI - Approval of Data in Hadoop Using Apache Sentry
T2 - International Journal of Computer Sciences and Engineering
AU - Regha S., Manimekalai M.
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 583-586
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
283 236 downloads 127 downloads
  
  
           

Abstract

Huge Data has turned out to be progressively famous, as it can give on-request, dependable and adaptable administrations to clients, for example, stockpiling and its preparing. The information security has turned into a noteworthy issue in the Big information. The open source HDFS programming is utilized to store tremendous measure of information with high throughput and adaptation to internal failure and Map Reduce is utilized for its calculations and handling. Be that as it may, it is a noteworthy focus in the Hadoop framework, security demonstrate was not structured and turned into the real disadvantage of Hadoop programming. As far as capacity, meta information security, touchy information and furthermore the information security will be a difficult issue in HDFS. With the significance of Hadoop in the present undertakings, there is likewise an expanding pattern in giving a high security includes in ventures. Over ongoing years, just some dimension of security in Hadoop, for example, Kerberos and Transparent Data Encryption(TDE),Encryption procedures, hash methods are appeared for Hadoop. This paper, demonstrates the endeavors that are made to exhibit Hadoop Authorization security issues utilizing Apache Sentry in HDFS.

Key-Words / Index Term

Introduction, Security Issues in Hadoop Cluster , Hadoop Security Primer, Key Benefits of Apache Sentry , Working of Sentry

References

[1] Sirisha N & Kiran KVD, “Protection Of Encroachment On Bigdata Aspects”, International Journal of Mechanical Engineering and Technology (IJMET), Vol.8, No.7, (2017), pp.550–558.
[2] Park S & Lee Y, “Secure Hadoopwith Encrypted HDFS”, SpringerVerlag Berlin Heidelberg, (2013), pp.134–141.
[3] Dean J & Ghemawat S, “MapReduce: simplified data processing on large clusters”, CACM, Vol.51, No.1, (2008), pp.107-113.
[4] Park S & Lee Y, “Secure hadoop with encrypted HDFS”, International Conference on Grid and Pervasive Computing, (2013), pp.134-141.
[5] Zerfos P, Yeo H, Paulovicks BD &Sheinin V, “SDFS: Secure distributed file system for data-at-rest security for Hadoop-as-aservice”, IEEE International Conference on Big Data (Big Data), (2015), pp.1262-1271.
[6] Grover C &Aulakh MK, “Big Data Authentication and Authorization in HDP (Hadoop Distributed platform) using Kerberos and Ranger”, 2nd International Conference on Recent Innovations in Management and Engineering, (2017), pp.44-51.
[7] Cheng Z, Zhang D, Huang H & Qian Z, “Design and Implementation of Data Encryptionin Cloud based on HDFS”, International Workshop on Cloud Computing and Information Security, (2013), pp.274-277.
[8] Shehzad D, Khan Z, Dag H &Bozkus Z, “A novel hybrid encryption scheme to ensure Hadoop based cloud data security”, International Journal of Computer Science and Information Security, Vol.14,No.4,(2016).
[9] Rabin MO, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance”, Journal of the Association for Computing Machinery, Vol.36, No.2, (1989), pp.335-348. [10] "Transparent Encryption in HDFS. https://hadoop.apache.org/docs/r2.7.2/hadoop-project dist/hadoophdfs/TransparentEncryption.html.
[11] Byers J, Luby M, Mitzenmacher M & Reg A e, “A Digital Foundation Approach to Reliable Distribution of Bulk Data”, Proc.ACM SIGCOMM’98, Vol.28, No.4, (1998), pp.56-67.
[12] Darade SA &Kamble K, “Network Level Security in Hadoop Using Wire Encryption”, International journal of Advanced research in science management and technology,Vol.1, No.6, (2015).
[13] Cloudera Inc., “HDFS Data At Rest Encryption”, http://www.cloudera.com/content/cloudera/en/documentation/core/latest/topic s/cdh_sg_hdfs_encryption.html#xd_583c10bfdbd326ba--5a52cca1476e7473cd--7f85, 2015.
[14] IBM BigInsights on Cloud, IBM, 2016. http://www-03.ibm.com/software/products/en/ibm-biginsights-oncloud.
[15] Vivekanand &Vidyavathi BM, “Security Challenges in Big Data: Review”, International Journal of aAdvanced Research in Computer Science, Vol.6, No.6, (2015).