大数据新兴问题:Hadoop安全和隐私

Karim Abouelmehdi, A. B. Hssane, Hayat Khaloufi, M. Saadi
{"title":"大数据新兴问题:Hadoop安全和隐私","authors":"Karim Abouelmehdi, A. B. Hssane, Hayat Khaloufi, M. Saadi","doi":"10.1109/ICMCS.2016.7905621","DOIUrl":null,"url":null,"abstract":"With the growing development of data, it has become increasingly vulnerable and exposed to malicious attacks. These attacks can damage the essential properties such as confidentiality, integrity and availability of information systems. To deal with these malicious intents, it is necessary to develop effective protection mechanisms. In this paper we will indicate the main risks arising in Big Data and existing security mechanisms, we focus on Hadoop security and its components because it remains the required Framework for the management and the processing of big data.","PeriodicalId":345854,"journal":{"name":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Big data emerging issues: Hadoop security and privacy\",\"authors\":\"Karim Abouelmehdi, A. B. Hssane, Hayat Khaloufi, M. Saadi\",\"doi\":\"10.1109/ICMCS.2016.7905621\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growing development of data, it has become increasingly vulnerable and exposed to malicious attacks. These attacks can damage the essential properties such as confidentiality, integrity and availability of information systems. To deal with these malicious intents, it is necessary to develop effective protection mechanisms. In this paper we will indicate the main risks arising in Big Data and existing security mechanisms, we focus on Hadoop security and its components because it remains the required Framework for the management and the processing of big data.\",\"PeriodicalId\":345854,\"journal\":{\"name\":\"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICMCS.2016.7905621\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 5th International Conference on Multimedia Computing and Systems (ICMCS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICMCS.2016.7905621","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

随着数据量的不断增长,它也变得越来越脆弱,容易受到恶意攻击。这些攻击会破坏信息系统的机密性、完整性和可用性等基本属性。为了应对这些恶意行为,有必要建立有效的保护机制。在本文中,我们将指出大数据中出现的主要风险和现有的安全机制,我们将重点关注Hadoop安全性及其组件,因为它仍然是管理和处理大数据所需的框架。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Big data emerging issues: Hadoop security and privacy
With the growing development of data, it has become increasingly vulnerable and exposed to malicious attacks. These attacks can damage the essential properties such as confidentiality, integrity and availability of information systems. To deal with these malicious intents, it is necessary to develop effective protection mechanisms. In this paper we will indicate the main risks arising in Big Data and existing security mechanisms, we focus on Hadoop security and its components because it remains the required Framework for the management and the processing of big data.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Design of superdirective and compact antenna array Reconfigurable T-shaped antenna for S-band applications Design of a 5.8 GHZ rectenna by using metamaterial inspired small antenna The number of spanning trees in corona edge product of tree and S-linear chain map Meander-line UHF RFID tag antenna loaded with split ring rersonator
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1