SlideShare a Scribd company logo
1 of 19
Wadoop
Xtensible Security
Framework for Hadoop
Vivek Shrivastava, Murlidhar Iyer
BigDataCamp Los Angeles
June 14th, 2014
Agenda
• Brief overview of data security in Hadoop
• BDAs are the new DBAs
• Data Security Problems in Big Data
Administration
• Introducing Wadoop
• Raffle for some data science books
www.wipro.com
> whoami
• Architect at Wipro Technology
• Responsible for Banking and Insurance Clients
• Previously worked at Yahoo!, Shopzilla, HRL
www.wipro.com
A bit about Wipro
• Indian multinational information
technology (IT), consulting and
service company
• 147,000 employees serving over
900 clients with a presence in 57
countries
• Multiple ongoing bigdata projects
in Hi-Technology, energy and
financial area
www.wipro.com
Why Security is Important
• Information Asset
Protection
• Regulatory Compliance
• Data Sharing
• Regulatory
• BIG Data
www.wipro.com
Threats
• Hackers – data breaches
• Access by privileged
users
• Application releases
• Faster changing
landscape of
applications
www.wipro.com
Components for Security
• Isolation
• Access Control
• Strong Authentication
– LDAP
– Kerberos
• Logging – Audit
• Encryption
– Network
– Disk
www.wipro.com
BDAs are the new DBAs
• Emerging role of Big Data Administrator
– Administrator
• Administration
• Optimal utilization
• Space management
– Developer
• Fast changing software landscape
– Data Analysts
• New tools
• Interaction with data
– Data Stewards
• Space allocation and management
• Directory ownership
• Data movement
• Data lineage
www.wipro.com
Problems with Big Data Administration
• Gartner predicts that, through 2016, more than 80 percent of
organizations will fail to develop a consolidated data security policy
• Missing a unified platform for big data management
• Most of the tools are focused towards operational reporting or data
computation
• Businesses have traditionally managed data within structured and
unstructured silos
• Need to collaborate and manage an enterprise data security
• Information security and identity and access management departments
don’t always work together to reduce the risks that lead to breaches
caused by insiders
Ref : http://www.indiainfoline.com/Markets/News/Gartner/5939357116
Ref: https://in.finance.yahoo.com/news/insight-senior-executives-top-security-130000034.html
www.wipro.com
Introducing Wadoop
• Framework focused for data management
• Xtensible to work with future products
• Delivers the “AAA of security”:
• Authentication
• Authorization and
• Auditing
• Non intrusive setup and installation
– Active mode
– Passive mode
• Rich set of security features
• Distribution independent
• Near realtime reporting for critical functions
www.wipro.com
Architecture of Wadoop
www.wipro.com
User Manager – Brings all the users
• User manager collects
all the users
• Search users by any of
the attributes
www.wipro.com
Unified Access View
• One place to view
access to different
software and Hadoop
proxy user ACL
• Access list with each
component ( e.g. HDFS,
Hive,HBase, ACL)
www.wipro.com
Unified Report of Access
• One place see access
report for different
softwares and whether
it should have been
allowed and disallowed
• Conflict resolution is in
the roadmap
www.wipro.com
Data Zone – Logical Grouping
• Provides logical
management without
affecting physical
directory layout
• Easier to maintain
ownership
• Simple Space
management and
chargeback
www.wipro.com
Dashboard – It has reporting too
• Visual report of
sensitive and public
data
• Space utilization
• Heatmap of overall
usage
• Resource utilization
www.wipro.com
Dashboard - It has reporting too
• Visual report of
sensitive and public
data
• Space utilization
• Heatmap of overall
usage
• Resource utilization
www.wipro.com
Common Questions
• How old Wadoop is?
• Can I touch it?
• How can I contribute?
• By the way, Who is
using it?
www.wipro.com
Thank You
vivek.shrivastava2@wipro.com
@vivshrivastava
#Wadoop

More Related Content

What's hot

CloudZone company profile
CloudZone company profileCloudZone company profile
CloudZone company profile
Idan Tohami
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
Igor Zboran
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
mfrancis
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
Amazon Web Services
 

What's hot (20)

The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
SIEM & IAM
SIEM & IAMSIEM & IAM
SIEM & IAM
 
5 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O3655 Security Questions To Ask When Deploying O365
5 Security Questions To Ask When Deploying O365
 
CloudZone company profile
CloudZone company profileCloudZone company profile
CloudZone company profile
 
The New Framework for Modern Data Privacy and Security
The New Framework for Modern Data Privacy and SecurityThe New Framework for Modern Data Privacy and Security
The New Framework for Modern Data Privacy and Security
 
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
 
CASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the CloudCASB Cases: How Your Peers are Securing the Cloud
CASB Cases: How Your Peers are Securing the Cloud
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security#MFSummit2016 Secure: Introduction to identity, access and security
#MFSummit2016 Secure: Introduction to identity, access and security
 
Picking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your networkPicking the right Single Sign On Tool to protect your network
Picking the right Single Sign On Tool to protect your network
 
CIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean DeubyCIS 2015 The IDaaS Dating Game - Sean Deuby
CIS 2015 The IDaaS Dating Game - Sean Deuby
 
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use CasesBitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - Top 6 CASB Use Cases
 
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
 
Developing a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial ServicesDeveloping a Secure and Compliant Cloud Strategy for Financial Services
Developing a Secure and Compliant Cloud Strategy for Financial Services
 
CASBs and Office 365: The Security Menace
CASBs and Office 365: The Security MenaceCASBs and Office 365: The Security Menace
CASBs and Office 365: The Security Menace
 
How to keep track of cloud costs
How to keep track of cloud costsHow to keep track of cloud costs
How to keep track of cloud costs
 
Cloud Computing & Privacy Protection
Cloud Computing & Privacy ProtectionCloud Computing & Privacy Protection
Cloud Computing & Privacy Protection
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
The Future of integrated Identity and Access Management
The Future of integrated Identity and Access ManagementThe Future of integrated Identity and Access Management
The Future of integrated Identity and Access Management
 
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWSAWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS
 

Similar to Wadoop vivek shrivastava

Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
Addvantum
 

Similar to Wadoop vivek shrivastava (20)

Hadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happyHadoop Security Features That make your risk officer happy
Hadoop Security Features That make your risk officer happy
 
Hadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happyHadoop Security Features that make your risk officer happy
Hadoop Security Features that make your risk officer happy
 
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
 
Fighting cyber fraud with hadoop
Fighting cyber fraud with hadoopFighting cyber fraud with hadoop
Fighting cyber fraud with hadoop
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
GDPR Part 3: Practical Quest
GDPR Part 3: Practical QuestGDPR Part 3: Practical Quest
GDPR Part 3: Practical Quest
 
The New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and SecurityThe New Assure Security: Complete IBM i Compliance and Security
The New Assure Security: Complete IBM i Compliance and Security
 
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
 
Government Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need TodayGovernment Webinar: Five Essential IT Tools You Need Today
Government Webinar: Five Essential IT Tools You Need Today
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
Cloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving itCloud Security for Regulated Firms - Securing my cloud and proving it
Cloud Security for Regulated Firms - Securing my cloud and proving it
 
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
Alta 3-2013
Alta 3-2013Alta 3-2013
Alta 3-2013
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
Private cloud with vmware
Private cloud with vmwarePrivate cloud with vmware
Private cloud with vmware
 

More from Data Con LA

Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA
 

More from Data Con LA (20)

Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynotes
Data Con LA 2022 KeynotesData Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup ShowcaseData Con LA 2022 - Startup Showcase
Data Con LA 2022 - Startup Showcase
 
Data Con LA 2022 Keynote
Data Con LA 2022 KeynoteData Con LA 2022 Keynote
Data Con LA 2022 Keynote
 
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendationsData Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - Using Google trends data to build product recommendations
 
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - AI EthicsData Con LA 2022 - AI Ethics
Data Con LA 2022 - AI Ethics
 
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learningData Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - Improving disaster response with machine learning
 
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and AtlasData Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
 
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentationData Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Real world consumer segmentation
 
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
 
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWSData Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Moving Data at Scale to AWS
 
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AIData Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
 
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
 
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data ScienceData Con LA 2022 - Intro to Data Science
Data Con LA 2022 - Intro to Data Science
 
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing EntertainmentData Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
 
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
 
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
 
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
 
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with KafkaData Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 - Data Streaming with Kafka
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Wadoop vivek shrivastava

  • 1. Wadoop Xtensible Security Framework for Hadoop Vivek Shrivastava, Murlidhar Iyer BigDataCamp Los Angeles June 14th, 2014
  • 2. Agenda • Brief overview of data security in Hadoop • BDAs are the new DBAs • Data Security Problems in Big Data Administration • Introducing Wadoop • Raffle for some data science books www.wipro.com
  • 3. > whoami • Architect at Wipro Technology • Responsible for Banking and Insurance Clients • Previously worked at Yahoo!, Shopzilla, HRL www.wipro.com
  • 4. A bit about Wipro • Indian multinational information technology (IT), consulting and service company • 147,000 employees serving over 900 clients with a presence in 57 countries • Multiple ongoing bigdata projects in Hi-Technology, energy and financial area www.wipro.com
  • 5. Why Security is Important • Information Asset Protection • Regulatory Compliance • Data Sharing • Regulatory • BIG Data www.wipro.com
  • 6. Threats • Hackers – data breaches • Access by privileged users • Application releases • Faster changing landscape of applications www.wipro.com
  • 7. Components for Security • Isolation • Access Control • Strong Authentication – LDAP – Kerberos • Logging – Audit • Encryption – Network – Disk www.wipro.com
  • 8. BDAs are the new DBAs • Emerging role of Big Data Administrator – Administrator • Administration • Optimal utilization • Space management – Developer • Fast changing software landscape – Data Analysts • New tools • Interaction with data – Data Stewards • Space allocation and management • Directory ownership • Data movement • Data lineage www.wipro.com
  • 9. Problems with Big Data Administration • Gartner predicts that, through 2016, more than 80 percent of organizations will fail to develop a consolidated data security policy • Missing a unified platform for big data management • Most of the tools are focused towards operational reporting or data computation • Businesses have traditionally managed data within structured and unstructured silos • Need to collaborate and manage an enterprise data security • Information security and identity and access management departments don’t always work together to reduce the risks that lead to breaches caused by insiders Ref : http://www.indiainfoline.com/Markets/News/Gartner/5939357116 Ref: https://in.finance.yahoo.com/news/insight-senior-executives-top-security-130000034.html www.wipro.com
  • 10. Introducing Wadoop • Framework focused for data management • Xtensible to work with future products • Delivers the “AAA of security”: • Authentication • Authorization and • Auditing • Non intrusive setup and installation – Active mode – Passive mode • Rich set of security features • Distribution independent • Near realtime reporting for critical functions www.wipro.com
  • 12. User Manager – Brings all the users • User manager collects all the users • Search users by any of the attributes www.wipro.com
  • 13. Unified Access View • One place to view access to different software and Hadoop proxy user ACL • Access list with each component ( e.g. HDFS, Hive,HBase, ACL) www.wipro.com
  • 14. Unified Report of Access • One place see access report for different softwares and whether it should have been allowed and disallowed • Conflict resolution is in the roadmap www.wipro.com
  • 15. Data Zone – Logical Grouping • Provides logical management without affecting physical directory layout • Easier to maintain ownership • Simple Space management and chargeback www.wipro.com
  • 16. Dashboard – It has reporting too • Visual report of sensitive and public data • Space utilization • Heatmap of overall usage • Resource utilization www.wipro.com
  • 17. Dashboard - It has reporting too • Visual report of sensitive and public data • Space utilization • Heatmap of overall usage • Resource utilization www.wipro.com
  • 18. Common Questions • How old Wadoop is? • Can I touch it? • How can I contribute? • By the way, Who is using it? www.wipro.com