Strategies to address secure storage of data include data encryption, user security authentication, data backup, use of tracking filters, and data recovery.
1, data encryption: firstly, in the design of big data security services, according to the needs of secure data storage, encrypt the big data before storing, for example, HBASE provides data encryption function, which is so detailed as to be able to encrypt a column of private data; secondly, it can be encrypted by link encryption, to realize the safe transferring big data between dataset nodes and applications.
The uploading and downloading of data streams is effectively protected during the transmission service. Finally, possible malicious users can be identified and blocked by the built-in audit trail and network data statistical analysis.
2. User security authentication: Through the management of user identity information and the introduction of third-party authentication servers such as KeyDistribution Center (KDC, KeyDistribution Center), identification and security authentication are performed for both internal and external access to the cluster to shield the malicious access of illegal users, thus further enhancing the security of data.
3. Data Backup: Through system disaster recovery, regular backup, data retrieval and automatic health diagnostics, data protection within the big data cluster is achieved to ensure that the impact and loss of the big data environment can be minimized in the event of damage.
4. Use tracking filters: for example, monitor the IPs to which the data is flowing and automatically block the data transmission once it is found to have left the allowed range.
5, data recovery: data recovery technology is to be damaged, or by hardware defects caused by inaccessibility or unavailability, or due to misuse, sudden power outages, natural disasters and other unexpected disasters caused by, or by criminals malicious damage and other reasons for the original data in the loss of the function of recovery. Data recovery technology mainly includes several categories: soft recovery, hard recovery, large database system recovery, heterogeneous system data recovery and data coverage recovery.