Document 278356

Data Spillage in Hadoop Clouds: An Overview
Adviser: Dr. Brandeis Marshall
Student: Dri Torres
Problem Statement
Motivation
What are possible Data Spill solutions in Hadoop, and
can they integrate with current Data Spill procedure?
Economic, Data Spill recovery costs millions.
Address Security downfalls in Hadoop
Significance
To harness the full potential of Big Data, Data Spillage must be
addressed
What is Data
Spillage?
The transfer
of classified
data onto an
unclassified
information
systems
Once
classified data
has leaked it is
dirty
What is Big
Data?
32% of
Companie
s use
Hadoop
A Buzz Word
Less than
50% think it is
clearly
defined
Processes
terabytes of
data in
minutes
Hadoop Stores
and processes
Big Data
Volume,
Velocity,
Variety (The 3
Vs)
NIST Procedure for Data Spillage
The Problem with
Hadoop is “it’s a
moving target”
Spillage and Cloud
Computing
Cloud Environments
A Top-Down
Approach
Standardization
Information
Sharing
Governments
should establish
an advanced
Analytics Agency
Standardized
Software and
Hardware
Leads to
Information
Securing
Standard skilled
and professional
staff
Always report a
spill. Fully
document and
publish work
• Public
• Private
• Separate Cloud
Technology
• Map Reduce
• Yet Another Resource
YARN(MR
Negotiator
v2)
• Adopted 2013
• Compatible with more
than MR
Long Term Storage
Big Data Analytics
Knowledge Systems for Metadata
Inter-Agency Collaboration
Solutions
Establish Big Data
control centers
Private
Hadoop
Networks
Sample Cases for
Analyzing Spills
References
Gang-Hoon Kim, Silvana Trimi, and Ji-Hyong Chung. 2014. Big-data applications in the
government sector. Commun. ACM 57, 3 (March 2014), 78-85. DOI=10.1145/2500873
http://doi.acm.org/10.1145/2500873
Lindner, Felix FX, and Sandro Gaycken. "Back to Basics: Beyond Network Hygiene." Best
Practices in Computer Network Defense: Incident Detection and Response (2014): 54-64.
Recurity Labs. IOS Press, 10 Feb. 2014. Web. 17 July 2014. <http://recurity-labs.com>.
Michael Stonebraker and Judy Robertson. 2013. Big data is 'buzzword du jour;' CS
academics 'have the best job'. Commun. ACM 56, 9 (September 2013), 10-11.
DOI=10.1145/2500468.2500471
This material is based upon work supported by the National Science Foundation under grant #1062970. Any opinions, findings,
and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views
of the National Science Foundation.
INSuRE is training students in information security research. Sponsored by the National Science Foundation with problems
provided by the National Security Agency.
`