{"title":"最先进的大数据安全分类","authors":"Madhan Kumar Srinivasan, P. Revathy","doi":"10.1145/3172871.3172886","DOIUrl":null,"url":null,"abstract":"Today's businesses accumulate an astonishing amount of digital data, which can be leveraged to unlock new sources of economic value and provide fresh insights into business trends. The real challenge in this process is the design of computing, storage infrastructure and algorithms needed to handle this \"Big Data\". Hence, organizations are looking at different ways in which they can make use of Big Data in their business. There's no doubt that the creation of a Hadoop-powered Data Lake can provide a robust foundation for a new generation of analytics and intuitive results. At the same time, it is also very necessary to consider security before launching or expanding a Hadoop initiative. As we move towards a stage where Hadoop is considered for real-time production scenarios rather than just experimentation levels, a major chunk of production data is normally sensitive, or subject to many industry regulations and governance controls. This paper analyzes the current security challenges in big data implementations based on state-of-the-art big data security taxonomies.","PeriodicalId":199550,"journal":{"name":"Proceedings of the 11th Innovations in Software Engineering Conference","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"State-of-the-art Big Data Security Taxonomies\",\"authors\":\"Madhan Kumar Srinivasan, P. Revathy\",\"doi\":\"10.1145/3172871.3172886\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today's businesses accumulate an astonishing amount of digital data, which can be leveraged to unlock new sources of economic value and provide fresh insights into business trends. The real challenge in this process is the design of computing, storage infrastructure and algorithms needed to handle this \\\"Big Data\\\". Hence, organizations are looking at different ways in which they can make use of Big Data in their business. There's no doubt that the creation of a Hadoop-powered Data Lake can provide a robust foundation for a new generation of analytics and intuitive results. At the same time, it is also very necessary to consider security before launching or expanding a Hadoop initiative. As we move towards a stage where Hadoop is considered for real-time production scenarios rather than just experimentation levels, a major chunk of production data is normally sensitive, or subject to many industry regulations and governance controls. This paper analyzes the current security challenges in big data implementations based on state-of-the-art big data security taxonomies.\",\"PeriodicalId\":199550,\"journal\":{\"name\":\"Proceedings of the 11th Innovations in Software Engineering Conference\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 11th Innovations in Software Engineering Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3172871.3172886\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 11th Innovations in Software Engineering Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3172871.3172886","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Today's businesses accumulate an astonishing amount of digital data, which can be leveraged to unlock new sources of economic value and provide fresh insights into business trends. The real challenge in this process is the design of computing, storage infrastructure and algorithms needed to handle this "Big Data". Hence, organizations are looking at different ways in which they can make use of Big Data in their business. There's no doubt that the creation of a Hadoop-powered Data Lake can provide a robust foundation for a new generation of analytics and intuitive results. At the same time, it is also very necessary to consider security before launching or expanding a Hadoop initiative. As we move towards a stage where Hadoop is considered for real-time production scenarios rather than just experimentation levels, a major chunk of production data is normally sensitive, or subject to many industry regulations and governance controls. This paper analyzes the current security challenges in big data implementations based on state-of-the-art big data security taxonomies.