Hadoop is also beautiful in terms of business opportunities brought about by security risks

Source: Internet
Author: User
Keywords Very very very good.

Hadoop, a large, hyped data tool designed to index web search engines rather than credit card numbers, is not a key concern. For this reason, many companies have a taste for Hadoop. Currently, several Hadoop distributors, including Cloudera and Intel, are implementing or developing security plans.

Patents and Patches

Zettaset, a company that provides security features for the Hadoop release, said: "Many companies this year are interested in Hadoop technology, but a large part of it is discouraged by security issues." When it comes to measuring the viability of a technology in an enterprise or a broader market, security issues must be considered. ”

According to Vogt, Zettaset has patented methods for managing and controlling cryptographic key technologies distributed across multiple servers in a Hadoop cluster. In order to achieve security on Hadoop, minimizing performance degradation, Zettaset will launch a system to implement priority data storage in the cluster next year. If a block of data is frequently accessed, it is faster to put this part of the data on SSD than on the hard drive. Of course, by pointing out existing deficiencies that make users aware that their infrastructure is unsafe, the immediate beneficiaries must be zettaset and other companies providing security services.

Charles Zedlewski, vice president of Cloudera products, believes that security issues are mainly designed in four aspects:

Authentication: How to verify that you are a user of a system. Authorization: Controls the information that the user can read and the actions that are available to users of a particular data. Audit: Audits can provide documentation support to meet regulatory requirements to see if there is a violation. Encryption: Provides more protection for data security.

At present, native Apache Hadoop provides some of these features in MapReduce, HBase, Hive, and other Hadoop programs. Hadoop, for example, has a rigorous authentication mechanism. Zedlewski that what we need to improve from a customer perspective is to make it easier to install and configure.

"Encryption is another matter," Zedlewski said. Data can be encrypted over the course of a network transfer, a feature that was implemented two years ago. Involving the encryption of ' static ' data, some companies use off-the-shelf cryptographic libraries, such as those provided by security providers such as Gazzang and Vormetric. "Cloudera is considering adding encryption to its products, so customers don't have to look for other security service providers." Cloudera, as the leader in the Hadoop market, is commendable.

Zedlewski that Hadoop is not mature enough in terms of authorization. Cloudera wants customers to be able to determine the authorization granularity of a table on their own. For example, a table of 10,000 credit card numbers, if you have permission to view part of the data, then based on the table granularity authorization mechanism, you do not have access to the table's permissions, and based on the record granularity authorization mechanism, you can see 50 specific range of data. In other words, fine-grained authorization mechanisms enable more employees to gain access.

Rhino Project

About 3 months ago, Intel, which had just joined the Hadoop camp, listed the security features that were expected to be implemented in Hadoop under the Rhino project.

In the area of authentication, implement a new internal system that does not rely on external sources, while providing better single sign-on capabilities. Licensing mechanisms can span many Hadoop applications, from batch mapreduce to HBase databases. These features are added to Intel's Hadoop release and can be added as patches in other distributions.

Knox Project

Several engineers from Hortonworks have been active in an incubator project called Knox this year. Shaun Connolly, vice president of corporate strategy at Hortonworks, explains that the project is like constructing a large virtual enclosure around a server in the Hadoop cluster, with only one security gateway for available Hadoop services.

Jack Norris, chief marketing officer at MapR, said: "MapR is trying to add encryption key management capabilities, including" static "data. Just as CLOUDERA,MAPR wants to make security issues easier, especially in the process of data encryption and authentication. "(Compile/Zhou Xiaolu revisers/Zhonghao)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.