A Comparative Study of Various Security Threats and Solutions for the Security of Hadoop Framework in Terms of Authentication and Authorization
Rahul Shahane1, Proddutur Shruthi2, B.R.V.V.N.L. Viswanadh3, Dirisala Abhilash4

1Rahul Shahane, Department of CSE, Koneru Lakshmaiah Education FoundationVaddeswaram (A.P), India
2Proddutur Shruthi, Department of CSE, Koneru Lakshmaiah Education Foundation Vaddeswaram (A.P), India
3B.R.V.V.N.L. Viswanadh, Department of CSE, Koneru Lakshmaiah Education Foundation Vaddeswaram (A.P), India
4Dirisala Abhilash, Department of CSE, Koneru Lakshmaiah Education Foundation Vaddeswaram (A.P), India
Manuscript received on 07 April 2019 | Revised Manuscript received on 20 April 2019 | Manuscript published on 30 April 2019 | PP: 1599-1602 | Volume-8 Issue-6, April 2019 | Retrieval Number: F3676048619/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In earlier days traditional relational database systems were used.This system cannot handle unstructured data generated by social media or some organization. To process this data Hadoop is used.Big data is the collection of large set data which hold the secured information which can be user’s medical records, security data, personal information etc.While we come to Hadoop it is used to store, manage and distribute the data among various nodes.In this we mainly focus on the security threats which arises in big data on the storage purpose and the techniques by which it can be resolved. This paper deals with the problems in security involved with big data in context with the Hadoop environment and the various solution techniques and technologies involving in securing the big data Hadoop.
Keyword: Big data, Clusters, HDFS, Unauthorized Client, Unauthorized User.
Scope of the Article: Authentication, Authorization, Accounting