AVOIDING COMMON PITFALLS OF KERBEROS

Kerberos has evolved over the period of time to become the de facto standard for strong authentication of large as well as relatively small Hadoop systems. Hadoop implementers have chosen Kerberos over SSL owing to some of its amazing features like authentication without transferring the password over the network, use time-sensitive tickets that are generated using...

FORMAT PRESERVATION ENCRYPTION

INTRODUCTION: FPE is a special type of encryption. While generating the cipher text there is a lot of interest in preserving the type and length so that the cipher text also looks like original text. For example consider phone number, because the phone number is PII field it cannot be visible to everyone. The easy way to...

METADATA AND ITS CHALLENGES

 Before jumping onto why we require metadata and the importance of metadata for its Business Users, let us take a step back and explore what exactly is “Metadata”.The term metadata was coined in 1969 by Jack E. Myers for his Metamodel product line. The term got quickly endorsed and found its use in computer world with...

APACHE RANGER AUTHORIZATION ON HDFS

Authorization, a function of specifying access rights to resources related to information security. Once the user is successfully authenticated, Authorization shall tell us what any given user can or cannot do inside Hadoop cluster. In HDFS this is primarily governed by file permissions. HDFS file permissions are very similar to BSD file permissions. If you’ve ever run...

BIG DATA 101

INTRODUCTION Big Data is the ocean of information we swim in every day – vast zettabytes of data flowing from our computers, mobile devices, and machine sensors. With the right solutions, organizations can dive into all that data and gain valuable insights that were previously unimaginable.WHAT IS BIG DATAWhile the term “big data” is relatively new, the...

Top