Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hadoop Blueprints

You're reading from   Hadoop Blueprints Use Hadoop to solve business problems by learning from a rich set of real-life case studies

Arrow left icon
Product type Paperback
Published in Sep 2016
Publisher Packt
ISBN-13 9781783980307
Length 316 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Authors (3):
Arrow left icon
Sudheesh Narayan Sudheesh Narayan
Author Profile Icon Sudheesh Narayan
Sudheesh Narayan
Tanmay Deshpande Tanmay Deshpande
Author Profile Icon Tanmay Deshpande
Tanmay Deshpande
Anurag Shrivastava Anurag Shrivastava
Author Profile Icon Anurag Shrivastava
Anurag Shrivastava
Arrow right icon
View More author details
Toc

Table of Contents (9) Chapters Close

Preface 1. Hadoop and Big Data 2. A 360-Degree View of the Customer FREE CHAPTER 3. Building a Fraud Detection System 4. Marketing Campaign Planning 5. Churn Detection 6. Analyze Sensor Data Using Hadoop 7. Building a Data Lake 8. Future Directions

Hadoop security


When it was first created, Hadoop was not designed to work as the repository of an enterprise's entire store of data, as the data lake concept proposes. It was assumed that Hadoop will be operated in the trusted environment by the trusted users. Moreover, the early versions of Hadoop were used to store the data from public web logs, the confidentiality of which was not an issue. As Hadoop started getting positioned as the platform for enterprises, the Hadoop security concerns came to the forefront. To address these concerns, open source and proprietary solutions came on the market. These solutions focused upon a single security aspect such as data encryption and perimeter security, however they did not offer the fine-grained authorization on the data stored in Hadoop. A detailed discussion on Hadoop security is available at http://www.infoq.com/articles/HadoopSecurityModel.

HDFS permissions model

In our data lake use case, HDFS is the storage system for raw data. HDFS organizes...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime