TY - JOUR
T1 - Security Threats to Hadoop
T2 - Data Leakage Attacks and Investigation
AU - Fu, Xiao
AU - Gao, Yun
AU - Luo, Bin
AU - Du, Xiaojiang
AU - Guizani, Mohsen
N1 - Publisher Copyright:
© 1986-2012 IEEE.
PY - 2017/3/1
Y1 - 2017/3/1
N2 - As one of the most popular platforms for processing big data, Hadoop has low costs, convenience, and fast speed. However, it is also a significant target of data leakage attacks, as a growing number of businesses and individuals store and process their private data in it. How to investigate data leakage attacks in Hadoop is an important but long-neglected issue. This article first presents some possible data leakage attacks in Hadoop. Then an investigation framework is proposed and tested based on some simulated cases.
AB - As one of the most popular platforms for processing big data, Hadoop has low costs, convenience, and fast speed. However, it is also a significant target of data leakage attacks, as a growing number of businesses and individuals store and process their private data in it. How to investigate data leakage attacks in Hadoop is an important but long-neglected issue. This article first presents some possible data leakage attacks in Hadoop. Then an investigation framework is proposed and tested based on some simulated cases.
UR - http://www.scopus.com/inward/record.url?scp=85010190238&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85010190238&partnerID=8YFLogxK
U2 - 10.1109/MNET.2017.1500095NM
DO - 10.1109/MNET.2017.1500095NM
M3 - Article
AN - SCOPUS:85010190238
SN - 0890-8044
VL - 31
SP - 67
EP - 71
JO - IEEE Network
JF - IEEE Network
IS - 2
M1 - 7827929
ER -