{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T02:16:01Z","timestamp":1651889761258},"reference-count":16,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10,1]]},"abstract":"<p>In this article, a novel security model for the Hadoop environment has been developed to enhance security credentials of handheld systems. The proposed system deals with enabling Hadoop security in terms of a dataset and a user which is willing to access the content inside the Hadoop system. It deals with security in terms of three different features: encryption, confidentiality and authentication. The significance of the proposed model is it provides protection against malicious intent which allows only valid content into the Big data system; it enables authenticated users and people to enter into the system and make the dataset more secure; and if authentication is enhanced, then authorization can be easily gained in the Hadoop system which provides access control and access rights to resource which the user is willing to perform its function or operation. This model is implemented, and the performance has been validated using existing security variants.<\/p>","DOI":"10.4018\/ijhcr.2017100106","type":"journal-article","created":{"date-parts":[[2018,9,11]],"date-time":"2018-09-11T15:40:51Z","timestamp":1536680451000},"page":"58-71","source":"Crossref","is-referenced-by-count":1,"title":["Multi-Layered Security Model for Hadoop Environment"],"prefix":"10.4018","volume":"8","author":[{"given":"P. Victer","family":"Paul","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Vignan's Foundation for Science, Technology and Research, Pradesh, India"}]},{"given":"D.","family":"Veeraiah","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Vignan's Foundation for Science, Technology and Research, Pradesh, India"}]}],"member":"2432","reference":[{"key":"IJHCR.2017100106-0","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206827"},{"key":"IJHCR.2017100106-1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRTIT.2012.6206826"},{"key":"IJHCR.2017100106-2","doi-asserted-by":"crossref","unstructured":"Baskaran, R., Victer Paul, P., & Dhavachelvan, P. (2012, June). Ant Colony Optimization for Data Cache Technique in MANET. In International Conference on Advances in Computing (ICADC 2012) (pp 873-878). Springer.","DOI":"10.1007\/978-81-322-0740-5_104"},{"key":"IJHCR.2017100106-3","doi-asserted-by":"crossref","unstructured":"Cohen, J. C., & Acharya, S. (2014). Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection. Journal of information security and applications, 19(3), 224-244.","DOI":"10.1016\/j.jisa.2014.03.003"},{"issue":"3","key":"IJHCR.2017100106-4","doi-asserted-by":"crossref","first-page":"1147","DOI":"10.1109\/JSYST.2014.2308324","article-title":"An intelligent information forwarder for healthcare big data systems with distributed wearable sensors.","volume":"10","author":"P.Jiang","year":"2016","journal-title":"IEEE Systems Journal"},{"key":"IJHCR.2017100106-5","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1109\/IADCC.2009.4809240","article-title":"Numeric To numeric encryption of databases: using 3Kdec Algorithm.","author":"K.Kaur","year":"2009","journal-title":"IEEE International Advance Computing Conference IACC 2009"},{"key":"IJHCR.2017100106-6","first-page":"1","article-title":"Attribute relationship evaluation methodology for big data security.","author":"S. H.Kim","year":"2013","journal-title":"2013 International Conference on IT Convergence and Security (ICITCS)"},{"key":"IJHCR.2017100106-7","first-page":"26","article-title":"Integrating kerberos into apache hadoop.","author":"O.O\u2019Malley","year":"2010","journal-title":"Kerberos Conference"},{"key":"IJHCR.2017100106-8","doi-asserted-by":"crossref","first-page":"596","DOI":"10.1016\/j.procs.2015.04.091","article-title":"Big Data and Hadoop-A study in security perspective.","volume":"50","author":"B.Saraladevi","year":"2015","journal-title":"Procedia Computer Science"},{"key":"IJHCR.2017100106-9","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1016\/j.procs.2015.04.027","article-title":"Dynamic Preclusion of Encroachment in Hadoop Distributed File System.","volume":"50","author":"S.Saranya","year":"2015","journal-title":"Procedia Computer Science"},{"issue":"3","key":"IJHCR.2017100106-10","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/TETC.2014.2318177","article-title":"Toward energy efficient big data gathering in densely distributed sensor networks.","volume":"2","author":"D.Takaishi","year":"2014","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"issue":"3","key":"IJHCR.2017100106-11","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/TETC.2014.2318177","article-title":"Toward energy efficient big data gathering in densely distributed sensor networks.","volume":"2","author":"D.Takaishi","year":"2014","journal-title":"IEEE Transactions on Emerging Topics in Computing"},{"key":"IJHCR.2017100106-12","doi-asserted-by":"publisher","DOI":"10.1109\/ISCO.2015.7282349"},{"key":"IJHCR.2017100106-13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2015.7193199"},{"key":"IJHCR.2017100106-14","first-page":"1","article-title":"Hadoop security models - a study","author":"J.Vijayaraj","year":"2016","journal-title":"2016 Online International Conference on Green Engineering and Technologies (IC-GET)"},{"key":"IJHCR.2017100106-15","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUDCOM-ASIA.2013.107"}],"container-title":["International Journal of Handheld Computing Research"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=214024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:55:54Z","timestamp":1651888554000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJHCR.2017100106"}},"subtitle":["Security Model for Hadoop"],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijhcr.2017100106","relation":{},"ISSN":["1947-9158","1947-9166"],"issn-type":[{"value":"1947-9158","type":"print"},{"value":"1947-9166","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]}}}