Hdfs federation là gì
FUTURE: 5478 Please cite this article as: F.M. Awaysheh, M. Alazab, M. Gupta et al., Next-generation big data federation access control: A reference model, Future Generation Computer Systems (2020), https://doi.org/10.1016/j.future.2020.02.052. F.M. Awaysheh, M. Alazab, M. Gupta et al. / Future Generation Computer Systems xxx (xxxx) xxx 15 Appendix B 93 Algorithm 4: Performance relationship of two methods of write benchmarking with R tool 1initialization; 2while 3m1= c(16.55, 33.9, 48.7, 65.9, 84.43) 4m2= c(21, 43, 61.8, 83.69, 107.2) 5m= c(m1,m2) 6do 7x= seq(100,500,100) x1= c(x,x) grupo= as.factor(c(rep(’’A’’,5),rep(’’B’’,5))) grupo= relevel(grupo,ref="A") 8postscript(’’graficoferas.eps’’) plot(x,m1,col=’’red’’,ylim= c(0,130),xlim= c(100,500),xlab= ’’Size of the file (in MB)’’, ylab= ’’Operation Time (in Seconds)’’,pch=15) points(x,m2,col=’’blue’’,pch=17) 9legend(’’topleft’’,legend= c(’’Native WebHDFS’’,’’BDF Access Broker’’),col=c(’’Red’’,’’Blue’’),lwd=1, lty=c(0,0), pch=c(15,17),cex = 0.75) 10 abline(lm(m2 -1+x)) abline(lm(m1 -1+x)), dev.off() 11 mod1= lm(m1 -1+x) mod2= lm(m2 -1+x) 12 mod= lm(m -1+x1+grupo) 13 end 94 References1 [1] D. Cutting, M. Cafarella, Apache Hadoop, 2006, http://hadoop.apache.org.2 (Accessed 11 February 2020).3 [2] D. Borthakur, The Hadoop distributed file system: Architecture and design,4 Hadoop Proj. Website 11 (2007) (2007) 21.5 [3] HTCondor, Deploying high-throughput cluster using HTCondor over HDFS,6 HTCondor Manual, 2019, http://research.cs.wisc.edu/htcondor/manual/v8.7 8/index.html. (Accessed 11 February 2020).8 [4] M. Zaharia, M. Chowdhury, M.J. Franklin, S. Shenker, I. Stoica, Spark: Cluster9 computing with working sets, HotCloud 10 (10–10) (2010) 95.10 [5] P. Colombo, E. Ferrari, Access control in the era of big data: State of the art11 and research directions, in: Proceedings of the 23nd ACM on Symposium12 on Access Control Models and Technologies, ACM, 2018, pp. 185–192.13 [6] Cloudera, Scaling namespaces and optimizing data storage, 2017,14 https://docs.cloudera.com/HDPDocuments/HDP3/HDP-3.1.5/data-15 storage/content/scaling_a_cluster_using_hdfs_federation.html. (Accessed16 10 February 2020).17 [7] Apache Hadoop Project, YARN federation, 2016, https://hadoop.apache.org/18 docs/current3/hadoop-yarn/hadoop- yarn-site/Federation.html. (Accessed19 13 June 2019).20 [8] K. Shvachko, H. Kuang, S. Radia, R. Chansler, The Hadoop distributed file21 system, in: Mass Storage Systems and Technologies (MSST), 2010 IEEE 26th22 Symposium on, Ieee, 2010, pp. 1–10.23 [9] Apache Knox, REST API And application gateway for the apache hadoop24 ecosystem, 2019, https://knox.apache.org/. (Accessed 11 February 2020).25 [10] Apache Hadoop, Deploying Hadoop 3.x secure mode, 2019,26 https://hadoop.apache.org/docs/current3/hadoop-project- dist/hadoop-27 common/SecureMode.html. (Accessed 11 February 2020).28 [11] Apache Hadoop, Authentication for, Hadoop 3.x HTTP web con-29 soles, 2019, https://hadoop.apache.org/docs/current3/hadoop-project- dist/30 hadoop-common/HttpAuthentication.html. (Accessed 11 February 2020).31 [12] M. Gupta, F. Patwa, J. Benson, R. Sandhu, Multi-layer authorization32 framework for a representative Hadoop ecosystem deployment, in: Pro-33 ceedings of the 22nd ACM on Symposium on Access Control Models and34 Technologies, ACM, 2017, pp. 183–190.35 [13] Apache Atlas, Data governance and metadata framework for Hadoop, 2019,36 https://atlas.apache.org. (Accessed 11 February 2020).37 [14] D. Smiley, E. Pugh, K. Parisa, M. Mitchell, Apache Solr Enterprise Search38 Server, Packt Publishing Ltd, 2015.39 [15] Knoldus, HDFS erasure coding, Hadoop 3.x, 2018, https://blog.knoldus.com/40 hdfs-erasure- coding-hadoop- 3-0/. (Accessed 10 February 2020).41 [16] R.R. Parmar, S. Roy, D. Bhattacharyya, S.K. Bandyopadhyay, T.-H. Kim,42 Large-scale encryption in the hadoop environment: Challenges and43 solutions, IEEE Access 5 (2017) 7156–7163.44 [17] M. Gupta, F. Patwa, R. Sandhu, Object-tagged RBAC model for the Hadoop45 ecosystem, in: IFIP Annual Conference on Data and Applications Security46 and Privacy, Springer, 2017, pp. 63–81. 47 [18] M. Gupta, F. Patwa, R. Sandhu, An attribute-based access control model 48 for secure big data processing in Hadoop ecosystem, in: Proceedings of 49 the Third ACM Workshop on Attribute-Based Access Control, ACM, 2018, 50 pp. 13–24. 51 [19] P. Colombo, E. Ferrari, Enhancing MongoDB with purpose-based access 52 control, IEEE Trans. Dependable Secure Comput. 14 (6) (2017) 591–604. 53 [20] Intel, Big data: Securing intel it’s apache hadoop platform, 2016, 54 http://www.intel.com/content/dam/www/public/us/en/documents/white- 55 papers/big-data- securing-intel- it-apache- hadoop-platform- paper.pdf.56 (Accessed 11 February 2020). 57 [21] D. Das, O. O’Malley, S. Radia, K. Zhang, Adding Security to Apache Hadoop, 58 Hortonworks, IBM. 59 [22] O. O’Malley, K. Zhang, S. Radia, R. Marti, C. Harrell, Hadoop Security Design, 60 Yahoo, Inc. Tech. Rep. 61 [23] P.P. Sharma, C.P. Navdeti, Securing big data Hadoop: a review of security 62 issues, threats and solution, IJCSIT 5. 63 [24] P. Colombo, E. Ferrari, Privacy aware access control for big data: a research 64 roadmap, Big Data Res. 2 (4) (2015) 145–154. 65 [25] M. Gupta, R. Sandhu, The GURA_G administrative model for user and group 66 attribute assignment, in: Proc. of NSS, Springer, 2016, pp. 318–332. 67 [26] X. Jin, R. Krishnan, R. Sandhu, A unified attribute-based access control 68 model covering DAC, MAC and RBAC, in: IFIP Annual Conference on Data 69 and Applications Security and Privacy, Springer, 2012, pp. 41–55. 70 [27] M. Gupta, J. Benson, F. Patwa, R. Sandhu, Dynamic groups and attribute- 71 based access control for next-generation smart cars, in: Proceedings of the 72 Ninth ACM Conference on Data and Application Security and Privacy, ACM, 73 2019, pp. 61–72. 74 [28] H. Ulusoy, M. Kantarcioglu, E. Pattuk, K. Hamlen, Vigiles: Fine-grained 75 access control for MapReduce systems, in: Big Data (BigData Congress), 76 2014 IEEE International Congress on, IEEE, 2014, pp. 40–47. 77 [29] H. Ulusoy, P. Colombo, E. Ferrari, M. Kantarcioglu, E. Pattuk, GuardMR: 78 Fine-grained security policy enforcement for MapReduce systems, in: Proc. 79 of ACM ASIACCS, 2015, pp. 285–296. 80 [30] R. Lu, H. Zhu, X. Liu, J.K. Liu, J. Shao, Toward efficient and privacy- 81 preserving computing in big data era, IEEE Netw. 28 (4) (2014) 82 46–50. 83 [31] J. Soria-Comas, J. Domingo-Ferrer, Big data privacy: challenges to privacy 84 principles and models, Data Sci. Eng. 1 (1) (2016) 21–28. 85 [32] O. Tene, J. Polonetsky, Big data for all: Privacy and user control in the age 86 of analytics, Nw. J. Tech. Intell. Prop. 11 (2012) xxvii. 87 [33] F.M. Awaysheh, J.C. Cabaleiro, T.F. Pena, M. Alazab, Poster: A pluggable 88 authentication module for big data federation architecture, in: Proceedings 89 of the 24th ACM Symposium on Access Control Models and Technologies, 90 ACM, 2019, pp. 223–225. 91 [34] P. Colombo, E. Ferrari, Access control technologies for big data manage- 92 ment systems: literature review and future trends, Cybersecurity 2 (1) 93 (2019) 3. 94 [35] D. Kulkarni, A fine-grained access control model for key–value systems, in: 95 Proceedings of the Third ACM Conference on Data and Application Security 96 and Privacy, ACM, 2013, pp. 161–164. 97 [36] Y. Shalabi, E. Gudes, Cryptographically enforced role-based access control 98 for NoSQL distributed databases, in: IFIP Annual Conference on Data and 99 Applications Security and Privacy, Springer, 2017, pp. 3–19. 100 [37] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access 101 control models, Computer 29 (2) (1996) 38–47. 102 [38] A. Kayes, W. Rahayu, T. Dillon, E. Chang, J. Han, Context-aware access 103 control with imprecise context characterization for cloud-based data 104 resources, Future Gener. Comput. Syst. 93 (2019) 237–255. 105 [39] F. Awaysheh, J.C. Cabaleiro, T.F. Pena, M. Alazab, Big data security frame- 106 works meet the intelligent transportation systems trust challenges, in: 107 2019 18th IEEE International Conference on Trust, Security and Privacy 108 in Computing and Communications/13th IEEE International Conference on 109 Big Data Science and Engineering (TrustCom/BigDataSE), IEEE, 2019, pp. 110 807–813. 111 [40] Y. Zhou, D. Feng, Y. Hua, W. Xia, M. Fu, F. Huang, Y. Zhang, A similarity- 112 aware encrypted deduplication scheme with flexible access control in the 113 cloud, Future Gener. Comput. Syst. 84 (2018) 177–189. 114 [41] S. Fugkeaw, H. Sato, Scalable secure access control policy update for 115 outsourced big data, Future Gener. Comput. Syst. 79 (2018) 364–373. 116 [42] L. Qiu, F. Cai, G. Xu, Quantum digital signature for the access control of 117 sensitive data in the big data era, Future Gener. Comput. Syst. 86 (2018) 118 372–379. 119 [43] C.-S. Li, H. Franke, C. Parris, B. Abali, M. Kesavan, V. Chang, Composable 120 architecture for rack scale Big Data computing, Future Gener. Comput. Syst. 121 67 (2017) 180–193. 122 [44] A. Noury, M. Amini, An access and inference control model for time series 123 databases, Future Gener. Comput. Syst. 92 (2019) 93–108. 124 |