{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T12:05:36Z","timestamp":1725883536821},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319565378"},{"type":"electronic","value":"9783319565385"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-56538-5_54","type":"book-chapter","created":{"date-parts":[[2017,3,28]],"date-time":"2017-03-28T02:10:58Z","timestamp":1490667058000},"page":"528-537","source":"Crossref","is-referenced-by-count":1,"title":["Insider Attacks in a Non-secure Hadoop Environment"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Camacho","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Cabral","sequence":"additional","affiliation":[]},{"given":"Jorge","family":"Bernardino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"54_CR1","unstructured":"Gunelius, S.: The data explosion in 2014 minute by minute \u2013 Infographic. ACI (2014). http:\/\/aci.info\/2014\/07\/12\/the-data-explosion-in-2014-minute-by-minute-infographic . Accessed 3 July 2016"},{"key":"54_CR2","doi-asserted-by":"crossref","unstructured":"Bernardino, J., Neves, P.C.: Decision-making with big data using open source business intelligence systems. In: Human Development and Interaction in the Age of Ubiquitous Technology, pp. 120\u2013147. IGI Global (2016)","DOI":"10.4018\/978-1-5225-0556-3.ch006"},{"issue":"3","key":"54_CR3","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1109\/JPROC.2015.2388958","volume":"102","author":"S Yin","year":"2015","unstructured":"Yin, S., Kaynak, O.: Big data for modern industry: challenges and trends. Proc. IEEE 102(3), 143\u2013146 (2015)","journal-title":"Proc. IEEE"},{"key":"54_CR4","unstructured":"Gaddam, A.: Securing your big data environment. In: Black Hat, USA (2015)"},{"key":"54_CR5","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/978-1-4666-8505-5.ch002","volume-title":"Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence","author":"J Moura","year":"2015","unstructured":"Moura, J., Serr\u00e3o, C.: Security and privacy issues of big data. In: Hassan, M., Marquez, F. (eds.) Handbook of Research on Trends and Future Directions in Big Data and Web Intelligence, pp. 20\u201352. IGI Global, Hershey (2015)"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Duncan, A., Creese, S., Goldsmith, M.: An overview of insider attacks in cloud computing. In: Concurrency Computation: Practice and Experience, March 2014","DOI":"10.1002\/cpe.3243"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Aditham, S., Ranganathan, N.: A novel framework for mitigating insider attacks in big data systems. In: 2015 IEEE International Conference on Big Data (Big Data), pp. 1876\u20131885, October 2015","DOI":"10.1109\/BigData.2015.7363962"},{"key":"54_CR8","doi-asserted-by":"crossref","unstructured":"Claycomb, W.R., Nicoll, A.: Insider threats to cloud computing: directions for new research challenges. In: IEEE (COMPSAC), pp 387\u2013394 (2012)","DOI":"10.1109\/COMPSAC.2012.113"},{"key":"54_CR9","unstructured":"Ponemon Institute: Cost of data breach study: global analysis. IBM, June 2016. http:\/\/www-03.ibm.com\/security\/data-breach\/ . Accessed 5 Aug 2016"},{"key":"54_CR10","unstructured":"MIT Technology Review Custom and Oracle: Securing the big data life cycle (2015). http:\/\/files.technologyreview.com\/whitepapers\/Oracle-Securing-the-Big-Data-Life-Cycle.pdf . Accessed 1 Sept 2016"},{"key":"54_CR11","unstructured":"Welcome to Apache\u2122 Hadoop\u00ae! In: Apache (2014). http:\/\/hadoop.apache.org\/ . Accessed 10 Sept 2016"},{"key":"54_CR12","unstructured":"New approaches required for comprehensive Hadoop security. In: Dataguise, 27 February 2015. http:\/\/www.dataguise.com\/new-approaches-required-for-comprehensive-hadoop-security-3\/ . Accessed 10 Oct 2016"},{"key":"54_CR13","unstructured":"Apache Hadoop 2.7.2 (2016). https:\/\/hadoop.apache.org\/docs\/r2.7.2\/hadoop-project-dist\/hadoop-common\/SecureMode.html . Accessed 15 Oct 2016"},{"key":"54_CR14","unstructured":"King, T.: Getting started with Apache spark: the definitive guide. In: Best Data Integration Vendors, News & Reviews for Big Data, Applications. ETL and Hadoop (2015). http:\/\/solutionsreview.com\/data-integration\/getting-started-with-apache-spark-the-definitive-guide-2\/ . Accessed 25 Oct 2016"},{"key":"54_CR15","doi-asserted-by":"crossref","unstructured":"Li, R., Jin, C.: Meet-in-the-middle attacks on 10-round AES-256. In: Designs, Codes and Cryptography, pp. 1\u201313 (2015)","DOI":"10.1007\/s10623-015-0113-3"},{"issue":"19","key":"54_CR16","first-page":"33","volume":"67","author":"G Supriya","year":"2013","unstructured":"Supriya, G.: A study of encryption algorithms (RSA, DES 3DES, and AES) for information security. Int. J. Comput. Appl. 67(19), 33\u201338 (2013)","journal-title":"Int. J. Comput. Appl."},{"issue":"3","key":"54_CR17","first-page":"152","volume":"2","author":"OA Hamdan","year":"2010","unstructured":"Hamdan, O.A., Zaidan, B.B.: New comparative study between DES 3DES and AES within nine factors. J. Comput. 2(3), 152\u2013157 (2010)","journal-title":"J. Comput."}],"container-title":["Advances in Intelligent Systems and Computing","Recent Advances in Information Systems and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-56538-5_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,20]],"date-time":"2019-09-20T07:18:50Z","timestamp":1568963930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-56538-5_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319565378","9783319565385"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-56538-5_54","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017]]}}}