Open Access   Article

Anchoring Your Big Data Environment

S. Regha1 , M. Manimekalai2

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 28-34, Dec-2018

Online published on Dec 31, 2018

Copyright S. Regha, M. Manimekalai . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library


IEEE Style Citation: S. Regha, M. Manimekalai, Anchoring Your Big Data Environment, International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.28-34, 2018.

MLA Style Citation: S. Regha, M. Manimekalai "Anchoring Your Big Data Environment." International Journal of Computer Sciences and Engineering 06.11 (2018): 28-34.

APA Style Citation: S. Regha, M. Manimekalai, (2018). Anchoring Your Big Data Environment. International Journal of Computer Sciences and Engineering, 06(11), 28-34.



Security and protection issues are amplified by the volume, assortment, and speed of Big Data. The decent variety of information sources, arrangements, and information streams, joinExternalize data security when possible and d with the gushing idea of information procurement and high volume make one of kind security dangers. This paper points of interest the security challenges when associations begin moving touchy information to a Big Data store like Hadoop. It distinguishes the diverse danger models and the security control structure to address and alleviate security hazards because of the recognized risk conditions and use models. The system laid out in this paper is likewise intended to be circulation skeptic.

Key-Words / Index Term

Hadoop, Big Data, enterprise, defense, risk, Big Data Reference Framework, Security and Privacy, threat model


[1] EMC Big Data 2020 Projects http:// /big-data-2020.html
[2] NIST Special Publication 1500-1 NIST Big Data Interoperability Framework: Volume 1, Definitions http://
[3] Securosis Securing Big Data Security issues with Hadoop environments /securing-big-datasecurity-issues-with-hadoop-environments
[4] Top 10 Big Data Security and Privacy Challenges, Cloud Security Alliance,2012 https://downloads Big_Data_Top_Ten_v1.pdf
[5] Hadoop in Action, Second Edition by Manning Publications.ISBN:9781617291227http://www.manning. com/ lam2/