[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3078861.3084173acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article
Public Access

Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

Published: 07 June 2017 Publication History

Abstract

Apache Hadoop is a predominant software framework to store and process vast amount of data, produced in varied formats. Data stored in Hadoop multi-tenant data lake often includes sensitive data such as social security numbers, intelligence sources and medical particulars, which should only be accessed by legitimate users. Apache Ranger and Apache Sentry are important authorization systems providing fine-grained access control across several Hadoop ecosystem services. In this paper, we provide a comprehensive explanation for the authorization framework offered by Hadoop ecosystem, incorporating core Hadoop 2.x native access control features and capabilities offered by Apache Ranger, with prime focus on data services including Apache Hive and Hadoop 2.x core services. A multi-layer authorization system is discussed and demonstrated, reflecting access control for services, data, applications and infrastructure resources inside a representative Hadoop ecosystem instance. A concrete use case is discussed to underline the application of aforementioned access control points. We use Hortonworks Hadoop distribution HDP 2.5 to exhibit this multi-layer access control framework.

References

[1]
Apache Ambari. https://ambari.apache.org/.
[2]
Apache Atlas. http://atlas.apache.org/.
[3]
Apache Hadoop. http://hadoop.apache.org/.
[4]
Apache Knox. https://knox.apache.org/.
[5]
Apache Ranger. http://ranger.apache.org/.
[6]
Apache Sentry. http://sentry.apache.org/.
[7]
Cloudera. Cloudera Distribution Hadoop. https://www.cloudera.com/.
[8]
Devaraj Das, Owen O'Malley, Sanjay Radia, and Kan Zhang. 2011. Adding Security to Apache Hadoop. Hortonworks, IBM (2011).
[9]
Balaji Ganeshan and Alok Nath. 2015. Dynamic Policy Hooks in Ranger. https://cwiki.apache.org/confluence/display/RANGER/Dynamic+Policy+Hooks+in+Ranger+-+Configure+and+Use. (2015).
[10]
John Gantz et al. 2012. Digital universe in 2020: Big data, bigger digital shadows, and biggest growth in the far east. IDC iView: IDC Analyze the future (2012).
[11]
Maanak Gupta, Farhan Patwa, and Ravi Sandhu. 2017. Object-Tagged RBAC Model for the Hadoop Ecosystem. In Proc. of IFIP DBSec (To appear). Springer, 18 Pages.
[12]
Maanak Gupta, Farhan Patwa, and Ravi Sandhu. 2017. POSTER: Access Control Model for the Hadoop Ecosystem. In Proc. of ACM SACMAT (To appear). ACM, 3 Pages.
[13]
Maanak Gupta and Ravi Sandhu. 2016. The GURAG Administrative Model for User and Group Attribute Assignment. In Proc. of NSS. Springer, 318--332.
[14]
Hortonworks. Hortonworks Data Platform. https://hortonworks.com/.
[15]
Robert Hryniewicz. 2016. Best Practices in HDFS Autorization with Apache Ranger. https://hortonworks.com/blog/best-practices-in-hdfs-authorization-with-apache-ranger/. (2016).
[16]
Robert Hryniewicz. 2016. Best Practices in Hive Autorization with Apache Ranger. https://hortonworks.com/blog/best-practices-for-hive-authorization-using-apache-ranger -in-hdp-2--2/. (2016).
[17]
MapR. Converged Data Platform. https://mapr.com/.
[18]
Madhan Neethiraj. 2016. Geo-location based policies. https://cwiki.apache.org/confluence/display/RANGER/Geo-location+based+policies. (2016).
[19]
Owen O'Malley, Kan Zhang, Sanjay Radia, Ram Marti, and Christopher Harrell. 2009. Hadoop Security Design. Yahoo, Inc., Tech. Rep (2009).
[20]
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. 1996. Role-based access control models. IEEE Computer 29, 2 (1996), 38--47.
[21]
Ben Spivey and Joey Echeverria. 2015. Hadoop Security. Protecting your Platform. "O'Reilly Media, Inc."
[22]
Tom White. 2012. Hadoop: The Definitive Guide. "O'Reilly Media, Inc.".
[23]
Chandhu Yalla et al. 2016. Big Data: Intel IT's Secure Hadoop Platform. (2016).

Cited By

View all
  • (2020)Security and Privacy in Smart Farming: Challenges and OpportunitiesIEEE Access10.1109/ACCESS.2020.29751428(34564-34584)Online publication date: 2020
  • (2020)The implementation of data storage and analytics platform for big data lake of electricity usage with sparkThe Journal of Supercomputing10.1007/s11227-020-03505-6Online publication date: 13-Nov-2020
  • (2019)Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart CarsProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300048(61-72)Online publication date: 13-Mar-2019
  • Show More Cited By

Index Terms

  1. Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
        June 2017
        276 pages
        ISBN:9781450347020
        DOI:10.1145/3078861
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 07 June 2017

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. access control
        2. attributes
        3. big data
        4. data lake
        5. hadoop ecosystem
        6. object tags
        7. role based

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        SACMAT'17
        Sponsor:

        Acceptance Rates

        SACMAT '17 Abstracts Paper Acceptance Rate 14 of 50 submissions, 28%;
        Overall Acceptance Rate 177 of 597 submissions, 30%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)127
        • Downloads (Last 6 weeks)11
        Reflects downloads up to 13 Dec 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Security and Privacy in Smart Farming: Challenges and OpportunitiesIEEE Access10.1109/ACCESS.2020.29751428(34564-34584)Online publication date: 2020
        • (2020)The implementation of data storage and analytics platform for big data lake of electricity usage with sparkThe Journal of Supercomputing10.1007/s11227-020-03505-6Online publication date: 13-Nov-2020
        • (2019)Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart CarsProceedings of the Ninth ACM Conference on Data and Application Security and Privacy10.1145/3292006.3300048(61-72)Online publication date: 13-Mar-2019
        • (2019)Big Data Security Frameworks Meet the Intelligent Transportation Systems Trust Challenges2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)10.1109/TrustCom/BigDataSE.2019.00117(807-813)Online publication date: Aug-2019
        • (2019)Attack Models for Big Data Platform Hadoop2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS)10.1109/BigDataSecurity-HPSC-IDS.2019.00037(154-159)Online publication date: May-2019
        • (2019)MapReduce: an infrastructure review and research insightsThe Journal of Supercomputing10.1007/s11227-019-02907-575:10(6934-7002)Online publication date: 1-Oct-2019
        • (2018)An Attribute-Based Access Control Model for Secure Big Data Processing in Hadoop EcosystemProceedings of the Third ACM Workshop on Attribute-Based Access Control10.1145/3180457.3180463(13-24)Online publication date: 14-Mar-2018
        • (2018)Evaluating Text Analytic Frameworks for Mental Health Surveillance2018 IEEE 34th International Conference on Data Engineering Workshops (ICDEW)10.1109/ICDEW.2018.00014(39-47)Online publication date: Apr-2018
        • (2017)POSTERProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3084164(125-127)Online publication date: 7-Jun-2017
        • (2017)Object-Tagged RBAC Model for the Hadoop EcosystemData and Applications Security and Privacy XXXI10.1007/978-3-319-61176-1_4(63-81)Online publication date: 22-Jun-2017
        • Show More Cited By

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media