SlideShare a Scribd company logo
Wadoop
Xtensible Security
Framework for Hadoop
Vivek Shrivastava, Murlidhar Iyer
BigDataCamp Los Angeles
June 14th, 2014
Agenda
• Brief overview of data security in Hadoop
• BDAs are the new DBAs
• Data Security Problems in Big Data
Administration
• Introducing Wadoop
• Raffle for some data science books
www.wipro.com
> whoami
• Architect at Wipro Technology
• Responsible for Banking and Insurance Clients
• Previously worked at Yahoo!, Shopzilla, HRL
www.wipro.com
A bit about Wipro
• Indian multinational information
technology (IT), consulting and
service company
• 147,000 employees serving over
900 clients with a presence in 57
countries
• Multiple ongoing bigdata projects
in Hi-Technology, energy and
financial area
www.wipro.com
Why Security is Important
• Information Asset
Protection
• Regulatory Compliance
• Data Sharing
• Regulatory
• BIG Data
www.wipro.com
Threats
• Hackers – data breaches
• Access by privileged
users
• Application releases
• Faster changing
landscape of
applications
www.wipro.com
Components for Security
• Isolation
• Access Control
• Strong Authentication
– LDAP
– Kerberos
• Logging – Audit
• Encryption
– Network
– Disk
www.wipro.com
BDAs are the new DBAs
• Emerging role of Big Data Administrator
– Administrator
• Administration
• Optimal utilization
• Space management
– Developer
• Fast changing software landscape
– Data Analysts
• New tools
• Interaction with data
– Data Stewards
• Space allocation and management
• Directory ownership
• Data movement
• Data lineage
www.wipro.com
Problems with Big Data Administration
• Gartner predicts that, through 2016, more than 80 percent of
organizations will fail to develop a consolidated data security policy
• Missing a unified platform for big data management
• Most of the tools are focused towards operational reporting or data
computation
• Businesses have traditionally managed data within structured and
unstructured silos
• Need to collaborate and manage an enterprise data security
• Information security and identity and access management departments
don’t always work together to reduce the risks that lead to breaches
caused by insiders
Ref : http://www.indiainfoline.com/Markets/News/Gartner/5939357116
Ref: https://in.finance.yahoo.com/news/insight-senior-executives-top-security-130000034.html
www.wipro.com
Introducing Wadoop
• Framework focused for data management
• Xtensible to work with future products
• Delivers the “AAA of security”:
• Authentication
• Authorization and
• Auditing
• Non intrusive setup and installation
– Active mode
– Passive mode
• Rich set of security features
• Distribution independent
• Near realtime reporting for critical functions
www.wipro.com
Architecture of Wadoop
www.wipro.com
User Manager – Brings all the users
• User manager collects
all the users
• Search users by any of
the attributes
www.wipro.com
Unified Access View
• One place to view
access to different
software and Hadoop
proxy user ACL
• Access list with each
component ( e.g. HDFS,
Hive,HBase, ACL)
www.wipro.com
Unified Report of Access
• One place see access
report for different
softwares and whether
it should have been
allowed and disallowed
• Conflict resolution is in
the roadmap
www.wipro.com
Data Zone – Logical Grouping
• Provides logical
management without
affecting physical
directory layout
• Easier to maintain
ownership
• Simple Space
management and
chargeback
www.wipro.com
Dashboard – It has reporting too
• Visual report of
sensitive and public
data
• Space utilization
• Heatmap of overall
usage
• Resource utilization
www.wipro.com
Dashboard - It has reporting too
• Visual report of
sensitive and public
data
• Space utilization
• Heatmap of overall
usage
• Resource utilization
www.wipro.com
Common Questions
• How old Wadoop is?
• Can I touch it?
• How can I contribute?
• By the way, Who is
using it?
www.wipro.com
Thank You
vivek.shrivastava2@wipro.com
@vivshrivastava
#Wadoop

More Related Content

PPTX
CASBs - A New Hope
PPTX
Office 365 Security: How to Safeguard Your Data
PPTX
4 Essential Components of Office 365 Security
PPTX
Webinar Express: What is a CASB?
PPTX
O365 security and privacy de_novo_event_july2014
PPTX
Bridging the Office 365 Security Gap - Redmond Media
PDF
Into the Fluffs: Security Comliance and Audit in the Cloud
PPTX
securing the cloud for financial services
CASBs - A New Hope
Office 365 Security: How to Safeguard Your Data
4 Essential Components of Office 365 Security
Webinar Express: What is a CASB?
O365 security and privacy de_novo_event_july2014
Bridging the Office 365 Security Gap - Redmond Media
Into the Fluffs: Security Comliance and Audit in the Cloud
securing the cloud for financial services

What's hot (20)

PPTX
The Future of CASBs - A Cloud Security Force Awakens
PPTX
5 Security Questions To Ask When Deploying O365
PDF
CloudZone company profile
PPTX
The New Framework for Modern Data Privacy and Security
PPTX
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
PPTX
CASB Cases: How Your Peers are Securing the Cloud
PPTX
Webinar bitglass - complete deck-2
PDF
#MFSummit2016 Secure: Introduction to identity, access and security
PPTX
Picking the right Single Sign On Tool to protect your network
PDF
CIS 2015 The IDaaS Dating Game - Sean Deuby
PPTX
Bitglass Webinar - Top 6 CASB Use Cases
PPTX
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
PPTX
Developing a Secure and Compliant Cloud Strategy for Financial Services
PPTX
CASBs and Office 365: The Security Menace
PPT
How to keep track of cloud costs
PPTX
Cloud Computing & Privacy Protection
PDF
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
PPTX
The Future of integrated Identity and Access Management
PPTX
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
The Future of CASBs - A Cloud Security Force Awakens
5 Security Questions To Ask When Deploying O365
CloudZone company profile
The New Framework for Modern Data Privacy and Security
Beyond the Firewall: Securing the cloud with a CASB (in partnership with CSA)
CASB Cases: How Your Peers are Securing the Cloud
Webinar bitglass - complete deck-2
#MFSummit2016 Secure: Introduction to identity, access and security
Picking the right Single Sign On Tool to protect your network
CIS 2015 The IDaaS Dating Game - Sean Deuby
Bitglass Webinar - Top 6 CASB Use Cases
Bitglass Webinar - 5 Cloud Security Best Practices for 2018
Developing a Secure and Compliant Cloud Strategy for Financial Services
CASBs and Office 365: The Security Menace
How to keep track of cloud costs
Cloud Computing & Privacy Protection
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
The Future of integrated Identity and Access Management
Closing the Cloud Security Gap with a CASB (in partnership with Forrester)
Ad

Similar to Wadoop vivek shrivastava (20)

PPTX
Hadoop Security Features that make your risk officer happy
PPTX
Hadoop Security Features That make your risk officer happy
PPTX
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
PDF
110307 cloud security requirements gourley
PPTX
Addvantum Oracle Profile OFMW
PPTX
Fighting cyber fraud with hadoop
PDF
A Study in Borderless Over Perimeter
PPTX
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
PPTX
GDPR Part 3: Practical Quest
PDF
The New Assure Security: Complete IBM i Compliance and Security
PDF
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
PPTX
Government Webinar: Five Essential IT Tools You Need Today
PDF
Securing The Clouds with The Standard Best Practices-1.pdf
PPTX
Cloud Security for Regulated Firms - Securing my cloud and proving it
PPTX
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
Alta 3-2013
PPTX
Cloud Security: A matter of trust?
PPTX
Government Webinar: Improving Security Compliance with IT Monitoring Tools
PPT
Private cloud with vmware
Hadoop Security Features that make your risk officer happy
Hadoop Security Features That make your risk officer happy
Comprehensive Hadoop Security for the Enterprise | Part I | Compliance Ready ...
110307 cloud security requirements gourley
Addvantum Oracle Profile OFMW
Fighting cyber fraud with hadoop
A Study in Borderless Over Perimeter
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
GDPR Part 3: Practical Quest
The New Assure Security: Complete IBM i Compliance and Security
VMworld 2013: VMware Horizon Workspace at Scale: Deploying to 15,000 VMware E...
Government Webinar: Five Essential IT Tools You Need Today
Securing The Clouds with The Standard Best Practices-1.pdf
Cloud Security for Regulated Firms - Securing my cloud and proving it
Comprehensive Security for the Enterprise IV: Visibility Through a Single End...
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Alta 3-2013
Cloud Security: A matter of trust?
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Private cloud with vmware
Ad

More from Data Con LA (20)

PPTX
Data Con LA 2022 Keynotes
PPTX
Data Con LA 2022 Keynotes
PDF
Data Con LA 2022 Keynote
PPTX
Data Con LA 2022 - Startup Showcase
PPTX
Data Con LA 2022 Keynote
PDF
Data Con LA 2022 - Using Google trends data to build product recommendations
PPTX
Data Con LA 2022 - AI Ethics
PDF
Data Con LA 2022 - Improving disaster response with machine learning
PDF
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
PDF
Data Con LA 2022 - Real world consumer segmentation
PPTX
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
PPTX
Data Con LA 2022 - Moving Data at Scale to AWS
PDF
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
PDF
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
PDF
Data Con LA 2022 - Intro to Data Science
PDF
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
PPTX
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
PPTX
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
PPTX
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
PPTX
Data Con LA 2022 - Data Streaming with Kafka
Data Con LA 2022 Keynotes
Data Con LA 2022 Keynotes
Data Con LA 2022 Keynote
Data Con LA 2022 - Startup Showcase
Data Con LA 2022 Keynote
Data Con LA 2022 - Using Google trends data to build product recommendations
Data Con LA 2022 - AI Ethics
Data Con LA 2022 - Improving disaster response with machine learning
Data Con LA 2022 - What's new with MongoDB 6.0 and Atlas
Data Con LA 2022 - Real world consumer segmentation
Data Con LA 2022 - Modernizing Analytics & AI for today's needs: Intuit Turbo...
Data Con LA 2022 - Moving Data at Scale to AWS
Data Con LA 2022 - Collaborative Data Exploration using Conversational AI
Data Con LA 2022 - Why Database Modernization Makes Your Data Decisions More ...
Data Con LA 2022 - Intro to Data Science
Data Con LA 2022 - How are NFTs and DeFi Changing Entertainment
Data Con LA 2022 - Why Data Quality vigilance requires an End-to-End, Automat...
Data Con LA 2022-Perfect Viral Ad prediction of Superbowl 2022 using Tease, T...
Data Con LA 2022- Embedding medical journeys with machine learning to improve...
Data Con LA 2022 - Data Streaming with Kafka

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Hybrid model detection and classification of lung cancer
PPT
Geologic Time for studying geology for geologist
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
The various Industrial Revolutions .pptx
PDF
Unlock new opportunities with location data.pdf
PDF
Five Habits of High-Impact Board Members
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
August Patch Tuesday
PPTX
Tartificialntelligence_presentation.pptx
PPTX
Modernising the Digital Integration Hub
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
NewMind AI Weekly Chronicles – August ’25 Week III
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Hybrid model detection and classification of lung cancer
Geologic Time for studying geology for geologist
Taming the Chaos: How to Turn Unstructured Data into Decisions
Getting Started with Data Integration: FME Form 101
Benefits of Physical activity for teenagers.pptx
Chapter 5: Probability Theory and Statistics
Group 1 Presentation -Planning and Decision Making .pptx
CloudStack 4.21: First Look Webinar slides
The various Industrial Revolutions .pptx
Unlock new opportunities with location data.pdf
Five Habits of High-Impact Board Members
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
August Patch Tuesday
Tartificialntelligence_presentation.pptx
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
A novel scalable deep ensemble learning framework for big data classification...

Wadoop vivek shrivastava

  • 1. Wadoop Xtensible Security Framework for Hadoop Vivek Shrivastava, Murlidhar Iyer BigDataCamp Los Angeles June 14th, 2014
  • 2. Agenda • Brief overview of data security in Hadoop • BDAs are the new DBAs • Data Security Problems in Big Data Administration • Introducing Wadoop • Raffle for some data science books www.wipro.com
  • 3. > whoami • Architect at Wipro Technology • Responsible for Banking and Insurance Clients • Previously worked at Yahoo!, Shopzilla, HRL www.wipro.com
  • 4. A bit about Wipro • Indian multinational information technology (IT), consulting and service company • 147,000 employees serving over 900 clients with a presence in 57 countries • Multiple ongoing bigdata projects in Hi-Technology, energy and financial area www.wipro.com
  • 5. Why Security is Important • Information Asset Protection • Regulatory Compliance • Data Sharing • Regulatory • BIG Data www.wipro.com
  • 6. Threats • Hackers – data breaches • Access by privileged users • Application releases • Faster changing landscape of applications www.wipro.com
  • 7. Components for Security • Isolation • Access Control • Strong Authentication – LDAP – Kerberos • Logging – Audit • Encryption – Network – Disk www.wipro.com
  • 8. BDAs are the new DBAs • Emerging role of Big Data Administrator – Administrator • Administration • Optimal utilization • Space management – Developer • Fast changing software landscape – Data Analysts • New tools • Interaction with data – Data Stewards • Space allocation and management • Directory ownership • Data movement • Data lineage www.wipro.com
  • 9. Problems with Big Data Administration • Gartner predicts that, through 2016, more than 80 percent of organizations will fail to develop a consolidated data security policy • Missing a unified platform for big data management • Most of the tools are focused towards operational reporting or data computation • Businesses have traditionally managed data within structured and unstructured silos • Need to collaborate and manage an enterprise data security • Information security and identity and access management departments don’t always work together to reduce the risks that lead to breaches caused by insiders Ref : http://www.indiainfoline.com/Markets/News/Gartner/5939357116 Ref: https://in.finance.yahoo.com/news/insight-senior-executives-top-security-130000034.html www.wipro.com
  • 10. Introducing Wadoop • Framework focused for data management • Xtensible to work with future products • Delivers the “AAA of security”: • Authentication • Authorization and • Auditing • Non intrusive setup and installation – Active mode – Passive mode • Rich set of security features • Distribution independent • Near realtime reporting for critical functions www.wipro.com
  • 12. User Manager – Brings all the users • User manager collects all the users • Search users by any of the attributes www.wipro.com
  • 13. Unified Access View • One place to view access to different software and Hadoop proxy user ACL • Access list with each component ( e.g. HDFS, Hive,HBase, ACL) www.wipro.com
  • 14. Unified Report of Access • One place see access report for different softwares and whether it should have been allowed and disallowed • Conflict resolution is in the roadmap www.wipro.com
  • 15. Data Zone – Logical Grouping • Provides logical management without affecting physical directory layout • Easier to maintain ownership • Simple Space management and chargeback www.wipro.com
  • 16. Dashboard – It has reporting too • Visual report of sensitive and public data • Space utilization • Heatmap of overall usage • Resource utilization www.wipro.com
  • 17. Dashboard - It has reporting too • Visual report of sensitive and public data • Space utilization • Heatmap of overall usage • Resource utilization www.wipro.com
  • 18. Common Questions • How old Wadoop is? • Can I touch it? • How can I contribute? • By the way, Who is using it? www.wipro.com