Loading

HBASE Data Security with AES Algorithm
Chetan Pandey1, Amit Juyal2, Neeraj Panwar3, Aditya Joshi4

1Chetan Pandey, Department of Computing, Graphic Era Hill Universtiy, Dehradun (Uttarakhand), India.
2Amit Juyal, Department of Computing, Graphic Era Hill Universtiy, Dehradun (Uttarakhand), India.
3Neeraj Panwar, Department of Computing, Graphic Era Hill Universtiy, Dehradun (Uttarakhand), India.
4Aditya Joshi, Department of Computer Science Engineering, Graphic Era Deemed to be University, Dehradun (Uttarakhand), India.
Manuscript received on 15 June 2019 | Revised Manuscript received on 22 June 2019 | Manuscript Published on 01 July 2020 | PP: 34-37 | Volume-8 Issue-2S12 September 2019 | Retrieval Number: B10050982S1219/2020©BEIESP | DOI: 10.35940/ijrte.B1005.0982S1219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Since last decade almost every organization is focusing more on collecting their data (big data) and making analysis of it also applying the concluded valuable outcomes over their organization. The use of smartphones and smart gadgets fasten the gathering of data and enhances the three basic Vs (Volume/ Velocity/ Variety) of big data. This paper focuses on big data security but without fourth V i.e. Value within data, there is no need of securing big data. Perhaps this may be the reason why Hadoop have no security mechanism within its architecture since initially the focus of big data is on the basis of three basic Vs only. With this paper, here authors’ try to provide security to big data by using AES algorithm over HBase database. Authors just giving an idea of big data security methodology and for that the main focus of data security is only on valuable contents of the database.
Keywords: Big Data, AES, Hadoop, HDFS, HBase, NoSQL Database.
Scope of the Article: Big Data Security