International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 12, December 2017


Facing Security Problems in Big Data and Hadoop

P. S. Vijayalakshmi [3] | T. Arunambika [2]


Abstract: One of the biggest concerns in our present age revolves around the security and protection of sensitive information. In our current era of Big Data, our organizations are collecting, analyzing, and making decisions based on analysis of massive amounts of data sets from various sources, and security in this process is becoming increasingly more important. Big data that resides within a Hadoop environment can contain sensitive financial data in the form of credit card and bank account numbers. It may contain proprietary corporate information and personally identifiable information (PII) such as the names, addresses and social security numbers of clients, customers and employees.


Keywords: big data, Hadoop, authentication, security, Kerberos


Edition: Volume 6 Issue 12, December 2017,


Pages: 462 - 464


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

P. S. Vijayalakshmi, T. Arunambika, "Facing Security Problems in Big Data and Hadoop", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 462-464, https://www.ijsr.net/get_abstract.php?paper_id=ART20178678

Similar Articles with Keyword 'big data'

Downloads: 0

Review Papers, Computer Science & Engineering, India, Volume 13 Issue 3, March 2024

Pages: 1036 - 1039

An Investigation of the Applications of Artificial Intelligence and Other New Technologies in Smart Energy Infrastructure

Karan Chawla [5]

Share this Article

Downloads: 0

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1607 - 1610

Comprehensive Review on Automated Suspicious Activity Report Generation (SAR)

Ankur Mahida [7]

Share this Article
Top