Lakhe, 2014 - Google Patents
Practical Hadoop SecurityLakhe, 2014
- Document ID
- 10298151662819139863
- Author
- Lakhe B
- Publication year
External Links
Snippet
Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you …
- 238000009434 installation 0 abstract description 14
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Saleem et al. | Sok: Anatomy of data breaches | |
| CN111164948B (en) | Managing network security vulnerabilities using blockchain networks | |
| Ramachandran et al. | Towards performance evaluation of cloud service providers for cloud data security | |
| Bhathal et al. | Big Data: Hadoop framework vulnerabilities, security issues and attacks | |
| Natan | Implementing database security and auditing | |
| Dotson | Practical cloud security | |
| Gul et al. | Cloud computing security auditing | |
| Siriwardena | Advanced API security: OAuth 2.0 and beyond | |
| Bulusu et al. | A study on cloud computing security challenges | |
| Shimonski et al. | Security Strategies in Windows Platforms and Applications | |
| Kajiyama | Cloud computing security: how risks and threats are affecting cloud adoption decisions | |
| Lakhe | Practical Hadoop Security | |
| Sailakshmi | Analysis of Cloud Security Controls in AWS, Azure, and Google Cloud | |
| Kangwa | Prevention of personally identifiable information leakage in ecommerce using offline data minimization and online pseudonymisation. | |
| Aich | Secure query processing by blocking sql injection | |
| Dhondge | Lifecycle IoT Security for Engineers | |
| Yadav et al. | A Comprehensive Survey of IoT-Based Cloud Computing Cyber Security | |
| Ramirez | A framework to build secure microservice architecture | |
| Ottenheimer et al. | Securing the Virtual Environment: How to Defend the Enterprise Against Attack | |
| Karlzén | An Analysis of Security Information and Event Management Systems-The Use or SIEMs for Log Collection, Management and Analysis | |
| Reece | Multi-cloud identity security utilizing Self-Sovereign Identity | |
| Shaul et al. | Practical Oracle Security: Your Unauthorized Guide to Relational Database Security | |
| Wright | Protecting Oracle Database 12c | |
| Salim et al. | A Literature Review of Challenges and Solutions in Cloud Security | |
| Alqahtani | A novel approach to providing secure data storage using multi cloud computing |