HBASE Data Security with AES Algorithm

Chetan Pandey, Amit Juyal, Neeraj Panwar, Aditya Joshi
{"title":"HBASE Data Security with AES Algorithm","authors":"Chetan Pandey, Amit Juyal, Neeraj Panwar, Aditya Joshi","doi":"10.35940/ijrte.b1005.0982s1219","DOIUrl":null,"url":null,"abstract":"Since last decade almost every organization is\nfocusing more on collecting their data (big data) and making\nanalysis of it also applying the concluded valuable outcomes over\ntheir organization. The use of smartphones and smart gadgets\nfasten the gathering of data and enhances the three basic Vs\n(Volume/ Velocity/ Variety) of big data. This paper focuses on big\ndata security but without fourth V i.e. Value within data, there is\nno need of securing big data. Perhaps this may be the reason why\nHadoop have no security mechanism within its architecture since\ninitially the focus of big data is on the basis of three basic Vs\nonly. With this paper, here authors’ try to provide security to big\ndata by using AES algorithm over HBase database. Authors just\ngiving an idea of big data security methodology and for that the\nmain focus of data security is only on valuable contents of the\ndatabase.","PeriodicalId":220909,"journal":{"name":"International Journal of Recent Technology and Engineering","volume":"171 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Recent Technology and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35940/ijrte.b1005.0982s1219","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Since last decade almost every organization is focusing more on collecting their data (big data) and making analysis of it also applying the concluded valuable outcomes over their organization. The use of smartphones and smart gadgets fasten the gathering of data and enhances the three basic Vs (Volume/ Velocity/ Variety) of big data. This paper focuses on big data security but without fourth V i.e. Value within data, there is no need of securing big data. Perhaps this may be the reason why Hadoop have no security mechanism within its architecture since initially the focus of big data is on the basis of three basic Vs only. With this paper, here authors’ try to provide security to big data by using AES algorithm over HBase database. Authors just giving an idea of big data security methodology and for that the main focus of data security is only on valuable contents of the database.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用AES算法的HBASE数据安全
自过去十年以来,几乎每个组织都更加关注收集数据(大数据)并对其进行分析,并将总结的有价值的结果应用于他们的组织。智能手机和智能设备的使用加快了数据的收集,增强了大数据的三个基本v (Volume/ Velocity/ Variety)。本文关注的是大数据安全,但如果没有第四个V,即数据内的价值,就不需要保护大数据。也许这就是为什么hadoop在其架构中没有安全机制的原因,因为最初大数据的重点是基于三个基本的Vsonly。在本文中,作者尝试在HBase数据库上使用AES算法为大数据提供安全性。作者只是给出了大数据安全方法的一个概念,因此数据安全的主要焦点只放在数据库的有价值的内容上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Software Defect Estimation using Machine Learning Algorithms Plant Leaf Disease Detection and Classification using Optimized CNN Model Industrial Internet of Things (IIoT) of Forensic and Vulnerabilities Stabilization of Black cotton soil using Fly ash Effect of Admixing Fly Ash on Cementing Characteristics of Magnesium Oxychloride Cement
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1