Impact of Information Security measures on the Velocity of Big Data Infrastructures

被引:0
|
作者
Dupre, Lionel [1 ]
Demchenko, Yuri [2 ]
机构
[1] EBRC, Luxembourg, Luxembourg
[2] Univ Amsterdam, NL-1012 WX Amsterdam, Netherlands
关键词
Big Data Infrastructure; Big Data Security; Data Encryption; Hadoop; Big Data Applications Performance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is often viewed as a major drawback which hinders the performance of processing systems. This perception is not wrong; encrypted storage, memory and communications usually perform much slower than systems which process data in the clear. Big Data applications is no exception to the rule: it was designed with Volume and Velocity requirements in mind, and security (i.e. encryption) was initially not considered; perimeter security was deemed sufficient, and Big Data systems were confined to back-end operations. Considering the recent developments in the field (AES-NI processors, Key Management Servers, homomorphic encryption), the encryption vs performance paradigm needs to be actually measured to reevaluate preconceived reservation. This research found that encryption is no longer an obstacle to efficient and fast Big Data processing, thanks to massive processing parallelisation (which distributes also the encryption payload), new CPU technologies which allow encryption instructions to perform much faster, the use of SSD storage, and finally the clever data-centric use of encryption in HDFS. The paper provides analysis of four strategies in using data encryption in Hadoop based Big Data applications, which have been tested on the testbed built on Amazon Web Services (AWS) platform using advanced AWS monitoring data. Tests were performed on datasets of relatively modest size (about 5-20 Gigabytes), and performance was measured as all data could fit in each node's RAM. On larger datasets (e.g. of Terabytes scale), data partitioning may be required to obtain similar results.
引用
收藏
页码:484 / 491
页数:8
相关论文
共 50 条
  • [1] Network Information Security and Protection Measures in the Age of Big Data
    Gao Wenling
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 191 - 193
  • [2] Big data and information security
    Gene Badia, Joan
    Gallo de Puelles, Pedro
    de Lecuona, Itziar
    ATENCION PRIMARIA, 2018, 50 (01): : 3 - 5
  • [3] Big Data: Big Promises for Information Security
    Alguliyev, Rasim
    Imamverdiyev, Yadigar
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2014, : 216 - 219
  • [4] Fortifying big data infrastructures to face security and privacy issues
    Department of Electrical Engineering, Universitas Ahmad Dahlan, Yogyakarta, Indonesia
    不详
    不详
    Telkomnika Telecomun. Compt. Electr. Control, 4 (751-752):
  • [5] Big Data Analytics for Information Security
    Szczypiorski, Krzysztof
    Wang, Liqiang
    Luo, Xiangyang
    Ye, Dengpan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Information Security on the Background of Big Data
    Yang, Huijie
    PROCEEDINGS OF THE 2016 JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING, 2016, 59 : 337 - 341
  • [7] Information Security in Big Data Mining
    Revathi, T.
    Sudharsana, V
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2045 - 2049
  • [8] Survey of Big Data Information Security
    Miloslavskaya, Natalia
    Makhmudova, Aida
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 133 - 138
  • [9] Information Security in Big Data: Privacy and Data Mining
    Xu, Lei
    Jiang, Chunxiao
    Wang, Jian
    Yuan, Jian
    Ren, Yong
    IEEE ACCESS, 2014, 2 : 1149 - 1176
  • [10] Research on the security technology of big data information
    Zhu, Hong
    Xu, Zheng
    Huang, Yingzhen
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT INNOVATION, 2015, 28 : 1041 - 1044