[go: up one dir, main page]

Behera et al., 2018 - Google Patents

Big data security threats and prevention measures in cloud and Hadoop

Behera et al., 2018

Document ID
7738113603247566109
Author
Behera M
Rasool A
Publication year
Publication venue
Data Management, Analytics and Innovation: Proceedings of ICDMAI 2018, Volume 1

External Links

Snippet

Big Data, collection of huge data sets is a widely used concept in present world. Although being stored and analyzed by Cloud services, it poses the greatest challenge of security threats, occurring in the exposure of enormous amount of data. This paper we are going to …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores

Similar Documents

Publication Publication Date Title
US12143395B2 (en) Low trust privileged access management
US20200228574A1 (en) Policy management for data migration
US11757850B2 (en) Distributed logging for securing non-repudiable multi-party transactions
BR112016015458B1 (en) SYSTEM AND METHOD FOR BIOMETRIC PROTOCOL STANDARDS
US11575499B2 (en) Self auditing blockchain
CN118260264A (en) A user-friendly encrypted storage system and method for distributed file systems
Meetei et al. Security issues in cloud computing
Mehak et al. Security aspects of database-as-a-service (DBaaS) in cloud computing
Kaur et al. Enhancing features of cloud computing using cloud access security brokers to avoid data breaches
Behera et al. Big data security threats and prevention measures in cloud and Hadoop
US11880482B2 (en) Secure smart containers for controlling access to data
Ngo et al. Serverless computing architecture security and quality analysis for back-end development
Lakhe Practical Hadoop Security
Shahin et al. Big data platform privacy and security, a review
Madhura et al. Designing an optimized confidential-data management system using preeminent access-control and block-chain
Belhadaoui et al. A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem.
Kirkman et al. Bridging the cloud trust gap: Using orcon policy to manage consumer trust between different clouds
Solsol et al. Security mechanisms in NoSQL dbms’s: A technical review
Beleuta Data privacy and security in Business Intelligence and Analytics
Karlzén An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis
Sánchez et al. An Intercepting API-Based Access Control Approach for Mobile Applications.
Medvinsky et al. From social engineering to quantum threats: safeguarding user wallets with FailSafe
Vijay Chaurasiya., et al
Chu Apache Hadoop: A Review on Security Issues and Solutions for HDFS
LEBDAOUI et al. Preliminary Analysis of HDFS Read Operation, Threats Impacts and Mitigation