Cell security in Apache HBase

Here’s a good article about security in Apache HBase that I think some readers will love.

Apache HBase is a non-relational database for Hadoop.

Apache HBase

The article is written by Andrew Purtell, HBase Committer and member of the Intel HBase Team. Here’s an excerpt:

For some time Apache HBase has offered a strong security model based on Kerberos authentication and access control lists (ACLs). When Yahoo first made a version of Hadoop capable of strong authentication available in 2009, my team and I at a former employer, a commercial computer security vendor, were very interested. We needed a scale out platform for distributed computation, but we also needed one that could provide assurance against access of information by unauthorized users or applications.

Secure Hadoop was a good fit. We also found in HBase a datastore that could scale along with computation, and offered excellent Hadoop integration, except first we needed to add feature parity and integration with Secure Hadoop. Our work was contributed back to Apache as HBASE-2742 and ZOOKEEPER-938. We also contributed an ACL-based authorization engine as HBASE-3025, and the coprocessor framework upon which it was built as HBASE-2000 and others. As a result, in the Apache family of Big Data storage options, HBase was the first to offer strong authentication and access control. These features have been improved and evolved by the HBase community many times over since then.

You may read the complete article here.

Related Posts

How to install Cairo-Dock on Simply Linux 5 Simply Linux is an Xfce-based distro from the same Russian team that publishes ALT Linux. After the customizing simply linux 5 post, the next obvious ...
Geinimi, Sophisticated New Android Trojan Found in Wild The Threat: A new Trojan affecting Android devices has recently emerged in China. Dubbed “Geinimi” based on its first known incarnation, this Trojan ...
How to add an entry for a Linux distribution in Windows’ boot menu Dual-booting any version of Microsoft's Windows operating system with a Linux or BSD desktop or server distribution is a very common practice. For fir...
Use K3b and Audacity to convert an 8-CD audiobook to an Ogg file This tutorial presents a step-by-step guide on how I used K3b and Audacity to convert an eight (8) CD audiobook to a single Ogg file. As a bonus, the ...
Using Decision Trees to predict infant birth weights In this article, I will show you how to use decision trees to predict whether the birth weights of infants will be low or not. We will use the birthwt...
Manual disk partitioning guide for Linux Mint 9 and Ubuntu 10.04 The installation program on Ubuntu 10.04 and Linux Mint 9 are the same. And that's because Linux Mint is based on Ubuntu. So if you install one, which...

We Recommend These Vendors and Free Offers

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


Leave a Comment

Your email address will not be published. Required fields are marked *

*