Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special section: Recent trends, Challenges and Applications in Cognitive Computing for Intelligent Systems
Guest editors: Vijayakumar Varadarajan, Piet Kommers, Vincenzo Piuri and V. Subramaniyaswamy
Article type: Research Article
Authors: Revathy, P.a; * | Mukesh, Rajeswarib
Affiliations: [a] Cognizant Techmology Solutions, Changi Business Park Crescent, Singapore, Singapore | [b] Deparment of Computer Science, Hindustan University, Padur, Kelambakam, Chennai, Tamil Nadu, India
Correspondence: [*] Corresponding author. P. Revathy, Cognizant Techmology Solutions, Changi Business Park Crescent, 486025 Singapore, Singapore. E-mail: revamadhankr@gmail.com.
Abstract: Like many open-source technologies such as UNIX or TCP/IP, Hadoop was not created with Security in mind. Hadoop however evolved from the other tools over time and got widely adopted across large enterprises. Some of Hadoop’s architectural features present Hadoop its unique security issues. Given this security vulnerability and potential invasion of confidentiality due to malicious attackers or internal customers, organizations face challenges in implementing a strong security framework for Hadoop. Furthermore, given the method in which data is placed in Hadoop Cluster adds to the only growing list of these potential security vulnerabilities. Data privacy is compromised when these critical and data-sensitive blocks are accessed either by unauthorized users or for that matter even misuse by authorized users. In this paper, we intend to address the strategy of data block placement across the allotted DataNodes. Prescriptive analytics algorithms are used to determine the Sensitivity Index of the Data and thereby decide on data placement allocation to provide impenetrable access to an unauthorized user. This data block placement strategy aims to adaptively distribute the data across the cluster using innovative ML techniques to make the data infrastructure extra secured.
Keywords: Big data, Hadoop security, data placement strategy for sensitive data, sensitivity in Hadoop, prescriptive analytics
DOI: 10.3233/JIFS-189165
Journal: Journal of Intelligent & Fuzzy Systems, vol. 39, no. 6, pp. 8477-8486, 2020
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl