An Execution for Security Scheme in Hadoop
Abstract
Full Text:
PDFReferences
S. Ghemawat, H. Gobioff, and S.-T. Leung, ``The Google _le system,'' in Proc. 19th ACM Symp. Oper. Syst. Principles (SOSP), 2003, pp. 29_43.
S. Ghemawat and J. Dean, ``MapReduce: Simpli_ed data processing on large clusters,'' ACM Commun. Mag., vol. 51, no. 1, pp. 107_113, Jan. 2008.
D. Borthakur, ``The Hadoop distributed _le system: Architecture and design,'' Hadoop Project Website, vol. 11, p. 21, Aug. 2007
T. White, Hadoop: The De_nitive Guide. Farnham, U.K.: O'Reilly, 2012.
D. de Roos, P. C. Zikopoulos, R. B. Melnyk, B. Brown, and R. Coss, Hadoop For Dummies. Hoboken, NJ, USA: Wiley, 2014.
B. Lakhe, Practical Hadoop Security. New York, NY, USA: Apress, 2014, pp. 19_46.
Apache Hadoop, accessed Dec. 2016. [Online]. Available: https://en.wikipedia.org/wiki/Apache_Hadoop#History
P. P. Sharma and C. P. Navdeti, ``Securing big data Hadoop: A review of security issues, threats and solution,'' Int. J. Comput. Sci. Inf. Technol., vol. 5, no. 2, pp. 2126_2131, 2014.
Apache Hadoop 2.7.3_Transparent Encryption in HDFS, accessed Feb. 2017. [Online]. Available: https://hadoop.apache.org/docs/r2.7.2/
hadoop-project-dist/hadoop-hdfs/TransparentEncryption.html
HDFS Data At Rest Encryption, accessed Feb. 2017. [Online]. Available: https://www.cloudera.com/documentation/enterprise/5-4-
x/topics/cdh_sg_hdfs_encryption.html
Refbacks
- There are currently no refbacks.