Skip to main content
USENIX
  • Conferences
  • Students
Sign in
  • Home
  • Attend
    • Registration Information
    • Registration Discounts
    • Venue, Hotel, and Travel
    • Students and Grants
    • Co-located Events
      • HotCloud '15
      • HotStorage '15
  • Program
    • At a Glance
    • Technical Sessions
  • Activities
    • Birds-of-a-Feather Sessions
    • Poster Session
  • Participate
    • Call for Papers
    • Call for Practitioner Talks
    • Instructions for Participants
  • Sponsorship
  • About
    • Conference Organizers
    • Questions
    • Services
    • Help Promote
    • Past Conferences
  • Home
  • Attend
  • Program
  • Activities
  • Participate
  • Sponsorship
  • About

sponsors

Gold Sponsor
Gold Sponsor
Gold Sponsor
Gold Sponsor
Silver Sponsor
Bronze Sponsor
Bronze Sponsor
Bronze Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Media Sponsor
Industry Partner
Industry Partner

help promote

USENIX ATC '15 button

Get more
Help Promote graphics!

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » A Reference Architecture for Securing Big Data Infrastructures
Tweet

connect with us

A Reference Architecture for Securing Big Data Infrastructures

Abhay Raman and Shezan Chagani, Ernst & Young LP

Abstract: 

Enterprise information repositories contain sensitive, and in some cases personally identifiable information that allows organizations to understand lifetime value of their customers, enable journey mapping to provide better and more targeted products and services, and improve their own internal operations by reducing cost of operations and driving profitability. Analysis of such large quantities of disparate data is possible today leveraging Hadoop and other Big data technologies. These large data sets create a very attractive target for hackers and are worth a lot of money in the cyber black market. Recent data breaches such as the ones at Anthem, Sony and others, drive the need to secure these infrastructures consistently and effectively.

In the form of a case study, we introduce the security requirements for such ecosystems, elaborate on the inherent security gaps and challenges in such environments and go on to propose a reference architecture for securing big data (Hadoop) infrastructures in financial institutions. The high-level requirements that drive the implementation of secure Hadoop implementations for the enterprise, including privacy issues, authentication, authorization, marking, key management, multi-tenancy, monitoring and current technologies available to the end user will be explored in detail. Furthermore, the case study will elaborate on how these requirements, enabled by the reference architecture are applied to actual systems implementations.

Abhay Raman, Ernst & Young LP

Shezan Chagani, Ernst & Young LP

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {208820,
author = {Abhay Raman and Shezan Chagani},
title = {A Reference Architecture for Securing Big Data Infrastructures},
year = {2015},
address = {Santa Clara, CA},
publisher = {USENIX Association},
month = jul,
}
Download
View the slides
  • Log in or    Register to post comments

Gold Sponsors

Silver Sponsors

Bronze Sponsors

Media Sponsors & Industry Partners

Open Access Publishing Partner

© USENIX

  • Privacy Policy
  • Contact Us