Impact of Information Security measures on the Velocity of Big Data Infrastructures

被引:0
|
作者
Dupre, Lionel [1 ]
Demchenko, Yuri [2 ]
机构
[1] EBRC, Luxembourg, Luxembourg
[2] Univ Amsterdam, NL-1012 WX Amsterdam, Netherlands
关键词
Big Data Infrastructure; Big Data Security; Data Encryption; Hadoop; Big Data Applications Performance;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Encryption is often viewed as a major drawback which hinders the performance of processing systems. This perception is not wrong; encrypted storage, memory and communications usually perform much slower than systems which process data in the clear. Big Data applications is no exception to the rule: it was designed with Volume and Velocity requirements in mind, and security (i.e. encryption) was initially not considered; perimeter security was deemed sufficient, and Big Data systems were confined to back-end operations. Considering the recent developments in the field (AES-NI processors, Key Management Servers, homomorphic encryption), the encryption vs performance paradigm needs to be actually measured to reevaluate preconceived reservation. This research found that encryption is no longer an obstacle to efficient and fast Big Data processing, thanks to massive processing parallelisation (which distributes also the encryption payload), new CPU technologies which allow encryption instructions to perform much faster, the use of SSD storage, and finally the clever data-centric use of encryption in HDFS. The paper provides analysis of four strategies in using data encryption in Hadoop based Big Data applications, which have been tested on the testbed built on Amazon Web Services (AWS) platform using advanced AWS monitoring data. Tests were performed on datasets of relatively modest size (about 5-20 Gigabytes), and performance was measured as all data could fit in each node's RAM. On larger datasets (e.g. of Terabytes scale), data partitioning may be required to obtain similar results.
引用
收藏
页码:484 / 491
页数:8
相关论文
共 50 条
  • [21] Information Security Risk Management Model for Big Data
    Yang, Min
    ADVANCES IN MULTIMEDIA, 2022, 2022
  • [22] Standardization of Ensuring Information Security for Big Data Technologies
    Miloslayskaya, Natalia
    Nikiforov, Andrey
    Budzko, Vladimir
    2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (W-FICLOUD 2018), 2018, : 56 - 63
  • [23] Email Information Security of Enterprise based on Big Data
    Wu, Ying
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2016), 2016, 56 : 257 - 260
  • [24] Study on Network Information Security Based on Big Data
    Jia, Wang
    PROCEEDINGS OF 2017 9TH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA), 2017, : 408 - 409
  • [25] Information security for big data using the NTRUEncrypt method
    Khalid Yousif M.
    Dallalbashi Z.E.
    Kareem S.W.
    Measurement: Sensors, 2023, 27
  • [26] Protection of Personal Information Security in the Age of Big Data
    Zou, Hui
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 586 - 589
  • [27] Emergent information security in critical infrastructures
    Daskapan, Semir
    Vree, Willem G.
    Wagenaar, Rene W.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2006, 2 (2-3) : 247 - 260
  • [28] UK DATA PROTECTION ACT - PRINCIPLE OF INFORMATION SECURITY AND SECURITY MEASURES
    INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2012, 4 (03): : 55 - 66
  • [29] Critical Information Infrastructures Security Modeling
    Erokhin, Sergey
    Petukhov, Andrey
    Pilyugin, Pavel
    PROCEEDINGS OF THE 24TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2019, : 82 - 88
  • [30] Big Data and Bad Data: On the Sensitivity of Security Policy to Imperfect Information
    Graves, James T.
    Acquisti, Alessandro
    Christin, Nicolas
    UNIVERSITY OF CHICAGO LAW REVIEW, 2016, 83 (01): : 117 - 137