SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
Protect Your Big Data with Intel® Xeon®
Processors and Intel® Software Products
for Apache* Hadoop*

Bing Wang, Product Manager, Intel
Tianyou Li, System Architect & Engineering Manager, Intel
Haidong Xia, Cloud Security Designer, Intel

 BIGS003
Agenda

    • Big Data Security Trend
    • Intel® Distribution for Apache Hadoop*
    • Intel Distribution for Apache Hadoop Encryption
    • Intel Distribution for Apache Hadoop Role Based
      Access Control
    • Summary/Call to Action


    The PDF for this Session presentation is available from our
    Technical Session Catalog at the end of the day at:
    intel.com/go/idfsessionsBJ
    URL is on top of Session Agenda Pages in Pocket Guide


2
Agenda

    • Big Data Security Trend
    • Intel® Distribution for Apache Hadoop*
    • Intel Distribution for Apache Hadoop Encryption
    • Intel Distribution for Apache Hadoop Role Based
      Access Control
    • Summary/Call to Action




3
Big Data Insights … New Frontier for Innovation
                                        Billions                                      >3000      exabytes    690%               Storage
                                        connected users and                           of new integrated      growth
                                        devices sharing                               devices & Cloud         Volume

                                                                                      traffic                                  Sensed data


     Arrival of                           Skype*
                                                                   Facebook*
                                                                     629m
                                                                                                                        Scientific data

    massive data                          663m             Cell                                                                              Unstructured
                                                                                                                        Social data
                                                          Phones                                                                                 data
                                                          5.3 bn                                                                             Structured
                                                                                                               Network data
                                                                                                                                                data
                                                                    Hotmail*                                  Corporate data
                                                 Yahoo*              364m
                                                 273m
                                                                                                                                               Time




                                                                   Traditional MPP - $50K
                              Dramatic                                          Data processing
                                ROI                                             costs
                                                                               per terabyte


                                                                                                   New analytics tools &
                                                                            Biz info               processing
                                                                          products &
                                                                           insights


      690 percent growth in storage capacity based off Intel analysis and IDC data,
      between 2010 (26,066 petabytes) to 2015 (179,327) which is ~690%
4
Big Data Security Concerns



    Data Protection                           Access Control
    • How to protect sensitive
                                              • Who can access the
      data:
                                                data?
       −PII, customer info, IP,
                                                 −Need granular control
         credit card, …
                                                  for data access
    • Regulatory and compliance
      requirments

    • Encryption is method        BIG DATA
      of choice for data
      protection                             • No built-in access
    • Encryption was                           control in current Big
      infeasible due to                        Data framework
      performance
      overhead


5
Agenda

    • Big Data Security Trend
    • Intel® Distribution for Apache Hadoop*
    • Intel Distribution for Apache Hadoop Encryption
    • IDH Role Based Access Control
    • Summary/Call to Action




6
Intel® Distribution for Apache
    Hadoop* Software

                                  This session
                                      focus
                                                                                                                           Automatic tuning of              Multi-site scalability and
    Industry’s 1st hardware-                                                     Role-based access control
                                                                                                                             Hadoop* cluster                 adaptive replication in
      assisted encryption                                                        & granular ACLs in HBase*
                                                                                                                              configuration                           HBase

                                                                                       Intel® Manager for Apache Hadoop* software
                                                                                    Deployment, Configuration, Monitoring, Alerts, and Security


                                                                                                                       Mahout*
                                    Data Exchange
                          Sqoop* 1.4.1




                                                                                      Oozie*            Pig*                               R             Hive*
                                                                                                                         0.7




                                                                                                                                                                       HBase 0.94.1
                                                                                      3.3.0            0.9.2                           connectors        0.9.0




                                                                                                                                                                                 Columnar Store
                                                                                                                        Machine
                                                                                     Workflow         Scripting                         Statistics      SQL Query
                                                    ZooKeeper* 3.4.5




                                                                                                                        Learning
                                                                  Coordination




                                                                                                               YARN (MRv2)
                                                                                                     Distributed Processing Framework
                          Flume* 1.3.0
                                    Log Collector




                                                                                                                    HDFS 2.0.3
                                                                                                            Hadoop Distributed File System


          Intel proprietary                                                       Intel enhancements contributed back to open source       Open source components included without change




7
Hadoop* Encryption: Protect Data from
    “Disk Leak”


       &$!@... Data             I have the key
       was encrypted,           and passphrase,
       how can I crack          I can recover
       it?                      the data via
                                Intel tool




8
Agenda

    • Big Data Security Trend
    • Intel® Distribution for Apache Hadoop*
    • Intel Distribution for Apache Hadoop Encryption
    • Intel Distribution for Apache Hadoop Role Based
      Access Control
    • Summary/Call to Action




9
Data Protection with Intel® AES-NI
      Efficient Ways to Use Encryption for Data Protection

      Intel® AES-NI:                                                        Data at Rest
                                                                            Full disk encryption software
     • 7 instructions that                                                  protects data while saving to disk


       expose special                                  Data in Motion
                                                       Secure transactions used
       math functions                                  pervasively in
                                                       ecommerce, banking, etc.
       built in the
       processor                                               Internet                      Intranet

       accelerate AES

     • Makes enabled
       encryption
       software faster                                        Data in Process
       and stronger                                           Most enterprise and cloud applications offer
                                                              encryption options to secure information and
                                                              protect confidentiality



10     Intel® Advanced Encryption Standard New Instructions
Intel® Distribution for Apache Hadoop*
     Software: Encryption Framework

                  HDFS           MapReduce
                   Derivative    RecordReader
                   Decrypt
       Encrypt                       Map

                                  Combiner
       Client
                                  Partitioner
                                                Local
       Decrypt                   Merge & Sort

                                   Reduce
                    Derivative
                    Encrypt
                                 RecordWriter




11
11
Crypto Codec Framework
     • Extends compression codec and establishes a
       common abstraction of the API level that can be
       shared by all crypto codec implementations as well
       as users that use the API
        CryptoCodec cryptoCodec = (CryptoCodec) ReflectionUtils.newInstance(codecClass,
      conf);
      CryptoContext cryptoContext = new CryptoContext();
      ...
      cryptoCodec.setCryptoContext(cryptoContext);
          CompressionInputStream input = cryptoCodec.createInputStream(inputStream);
      …

     • Provides a foundation for other components in
       Hadoop* such as MapReduce or HBase* to support
       encryption features


12
Crypto Codec Framework: Class
     Hierarchy
        <<Java Interface>>           <<Java Interface>>          <<Java Interface>>
          Compressor                Compression Code              Decompressor




        <<Java Interface>>           <<Java Interface>>          <<Java Interface>>

           Encryptor                  Crypto Codec                  Decryptor




                                      <<Java Class>>
                                      Crypto Context


                             0..1                         0..1
                                              0..1


         <<Java Class>>              <<Java Interface>>           <<Java Class>>

              Key                   Key ProfileResolver             KeyProfile




        <<Java Interface>>
         Key Provider


13
Crypto Codec File Format

            Block           Block          Block             Block               …


            Sync            Block         Algorithm          Original       Encrypted
            Mark           header          header             Size          Size (4 byte)
           (16 byte)                                           (4 byte)

                                     Encryption data …




                                           Stream
             Version     Key     Exten-
                                           header     Stream       IV (16
               (4      profile    sion
                                          length (4   header        byte)
              byte)    header    header
                                            byte)


          Encryption Data
          Compressed         Compressed      Compressed            Compressed
                                                                                      …
          Size (4 byte)         data         Size (4 byte)            data




14
Crypto Codec: API Example
     The usage is aligned with compression codec but with context
     supporting.

     Configuration conf = new Configuration();
     CryptoCodec cryptoCodec =
     (CryptoCodec) ReflectionUtils.newInstance(AESCodec.class, conf);

     CryptoContext cryptoContext = new CryptoContext();
     cryptoContext.setKey(Key.derive(password));
     cryptoCodec.setCryptoContext(cryptoContext);

     DataInputStream input = inputFile.getFileSystem(conf).open(inputFile);
     DataOutputStream outputStream = outputFile.getFileSystem(conf).create(outputFile);
     CompressionOutputStream output = cryptoCodec.createOutputStream(outputStream);

     // encrypt the stream
     writeStream(input, output);

     input.close();
     output.close();




15
Crypto Codec: A Simple MapReduce
     Example
     The usage is aligned with compression codec usage in MapReduce
     job but with context resolving.

     Job job = Job.getInstance(conf, "example");
      JobConf jobConf = (JobConf)job.getConfiguration();

      FileMatches fileMatches = new FileMatches(
        KeyContext.refer("KEY00", Key.KeyType.SYMMETRIC_KEY, "AES", 128));
      fileMatches.addMatch("^.*/input1.intelaes$",
        KeyContext.refer("KEY01", Key.KeyType.SYMMETRIC_KEY, "AES", 128));

      String keyStoreFile = "file:///" + secureDir + "/my.keystore";
      String keyStorePasswordFile = "file:///" + secureDir + "/my.keystore.passwords";

      KeyProviderConfig keyProviderConfig =
      KeyProviderCryptoContextProvider.getKeyStoreKeyProviderConfig(
      keyStoreFile, "JCEKS", null, keyStorePasswordFile, true);

      KeyProviderCryptoContextProvider.setInputCryptoContextProvider(
       jobConf, fileMatches, true, keyProviderConfig);



16
Key Distribution and Protection for
     MapReduce
     • Targets
       – A framework at MapReduce side for enabling crypto codec in
         MapReduce job such as key context resolving, distribution
         and protection
       – Enabling different key storage or management systems to
         plug-in for providing keys
       – Satisfying the common requirements that stage and file of a
         single job may use different keys
     • A complete key management system is not part of
       Intel® Distribution for Apache Hadoop* Software
       – An API to integrate with an external key manage system is
         included


17
Test Environment

     Processor           Intel® Xeon® processor E5-2690 @2.90GHz (32
                         core, only 1 core is used)
     Software            Intel® Distribution for Apache Hadoop* version
                         2.3
     Memory              32GB
     Operating System    CentOS* 6.3
     Encryption          OpenSSL* 1.0.1c (Intel® AES-NI enabled)
     Software
     File System         Apache Hadoop Distributed File System
                         (HDFS*)—namemode, datanode, and the test
                         program were all run on the same server
     Storage             240 GB Intel® Solid-State Drive (SSD) 320 Series
     Test Input          1 GB text file
     Input Buffer Size   64K, 4K, 1K – data size for calling
                         encryption/decryption interface each time


18
Encryption in Memory
                                                               AES Encryption
                                                                    Higher is better
                           500                                                                                                                    Up to
                           450
                           400
                                                                                                                                                  5.3x
                           350
         Speed(MB/s)




                           300
                           250
                           200
                           150
                           100
                            50
                             0
                                                   64k                                         4k                                         1k
                       AES-NI                      460                                        457                                        454
                       No AES-NI                    87                                         87                                         86


     AES = Intel® Advanced Encryption Standard New Instructions
     Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance
     tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions.
                                 19         4/10/2013
     Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you
     in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more
19   information go to http://www.intel.com/performance.
Decryption in Memory
                                                              AES-Decryption
                                                                    Higher is better
                          1400                                                                                                                    Up to
                          1200                                                                                                                    19.8x
                          1000
         Speed(MB/s)




                           800

                           600

                           400

                           200

                             0
                                                   64k                                         4k                                         1k
                       AES-NI                     1266                                       1259                                       1253
                       No AES-NI                   64                                         63                                         63


     AES = Intel® Advanced Encryption Standard New Instructions
     Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance
     tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions.
                                 20         4/10/2013
     Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you
     in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more
20   information go to http://www.intel.com/performance.
Combining Encryption with Compression
     (Memory-to-HDFS Transfer)
                         600                                                     Higher is better

                         500                                                                   489
                                               475                                                468                                         464
                                                 436                                                                                             435

                         400
     Throughput (MB/s)




                                                     292                                            282
                         300                                                                                                                       280



                         200


                               114                                             113                                            115
                         100         84                                              86                                             89
                                          58               56 53 52 57 55 52              59              55 52 51 56 55 53              58              55 53 51 56 55 52


                           0
                                                       64k                                              4k                                             1k
                                      hdfs io write                             aes   w/ AES-NI                           aes   w/o AES-NI
                                      snappy + hdfs io                          aes   + snappy w/ AES-NI                  aes   + snappy w/o AES-NI
                                      gzip + hdfs io                            aes   + gzip w/ AES-NI                    aes   + gzip w/o AES-NI
                                      zlib + hdfs io                            aes   + zlib w/ AES-NI                    aes   + zlib w/o AES-NI

                                                        Up to 1.5X faster with Intel® AES-NI
          Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as
          SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors
          may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including
          the performance of that product when combined with other products. For more information go to http://www.intel.com/performance.
21        aes = Intel® Advanced Encryption Standard New Instructions, HDFS = Hadoop* Distributed File System
Combining Decryption with Decompression
(HDFS-to-Memory File Transfer)
                               1400                                         Higher is better
                                                                                      1287
                                                                                                                                1231
                                               1199
                               1200
                                                                                        1104
                                                   1072                                                                            1048
                               1000
           Throughput (MB/s)




                               800
                                                                  661                                   677                                           661
                                                                    611                                   635                                           624
                               600    565                                   566                                      557
                                                          466
                                                            456                                476
                                                                                                 461                                       471
                                                                                                                                             455
                                        410                                     409                                      417
                               400                                    365                                      369                                            367
                                                      322                                    324                                        325
                                                               299                                   300                                           299

                               200
                                              57                                   56                                        56

                                  0
                                                         64k                                  4k                                    1k
                                            hdfs io read                  aes   w/ AES-NI                   aes   w/o AES-NI
                                            snappy + hdfs io              aes   + snappy w/ AES-NI          aes   + snappy w/o AES-NI
                                            gzip + hdfs io                aes   + gzip w/ AES-NI            aes   + gzip w/o AES-NI
                                            zlib + hdfs io                aes   + zlib w/ AES-NI            aes   + zlib w/o AES-NI


                                                      Up to 3.3X faster with Intel® AES-NI
     Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark*
     and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the
     results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance
     of that product when combined with other products. For more information go to http://www.intel.com/performance.
22   aes = Intel® Advanced Encryption Standard New Instructions, HDFS = Hadoop* Distributed File System
Where to Find the Source Code…
     • Patch and design document already submit to
       HADOOP-9331
     • A working fork of Hadoop* with encryption
       framework can be found in GitHub project




23
Agenda

     • Big Data Security Trend
     • Intel® Distribution for Apache Hadoop*
     • Intel Distribution for Apache Hadoop Encryption
     • Intel Distribution for Apache Hadoop Role Based
       Access Control
     • Summary/Call to Action




24
Role Based Access Control (RBAC):
     Overview
                                   Intel Manager
                                                             HDFS
                                                          Permissions

                                                            HBase*
                                          Users
                                                          Permissions
                                                   Role
                                                             Hive*
                                         Groups           Permissions

                                                          MapReduce
                                                          Permissions

 Active Directory

                                                                • User/Group & Roles will
                                                                  be translated into
                                                                  configuration files
                                                                • ACL configurations will
                                                                  be pushed into every
                                                                  required node



      HDFS = Hadoop* Distributed File System
25
RBAC: Role Definition

     • Role is a collection of permissions
     • Permission can have resource parameters
     • Role can be associate to users/groups
     • One user/group can have multiple roles
     • Currently we do not support role nesting




26
RBAC: Role Definition




27
RBAC: User Association




28
Beyond This…Project Rhino!
     • A common authorization framework for the Hadoop*
       ecosystem
     • Token based authentication and single sign on
     • Extend Hbase* support for ACLs to the cell level
     • Improve audit logging

     Please visit:
         https://github.com/intel-hadoop/project-rhino/




29
Agenda

     • Big Data Security Trend
     • Intel® Distribution for Apache Hadoop*
     • Intel Distribution for Apache Hadoop Encryption
     • Intel Distribution for Apache Hadoop Role Based
       Access Control
     • Summary/Call to Action




30
Summary/Call to Action

     • Intel® Xeon® processor based servers
       provide a strong foundation for big data
       workloads
     • Intel® Distribution for Apache Hadoop* with
       Intel Xeon processors provides breakthrough
       data security and access control for big data
       analytics
     • Develop applications to leverage Intel
       Distribution for Apache Hadoop Security
       capabilities
     • Deploy big data solutions with Intel
       Distribution for Apache Hadoop on Intel
       Xeon processor-based servers



31
Additional Resources
     •       Intel® AES-NI Website
     •       Intel® Distribution for Apache Hadoop* Website
     •       Intel AES-NI animation
     •       Secure Cloud with High Performing Intel® Data
             Protection Technologies animation
     •       “The Rijndael Cipher” - an AES tutorial animation
     •       Shay Gueron, “Advanced Encryption Standard (AES)
             Instruction Set rev 2”, Intel whitepaper, June 2009.
     •       Shay Gueron, Michael Kounavis, “Carry-less
             multiplication and its usage for computing the GCM
             Mode”, Intel whitepaper, August 2009
     •       Intel AES-NI use with IBM DB2 database white paper



32       Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)
Legal Disclaimer
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS
PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER
AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING
LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY
PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
• A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in
  personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL
  APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND
  THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES
  AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY,
  PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL
  OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF
  ITS PARTS.
• Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the
  absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future
  definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The
  information here is subject to change without notice. Do not finalize a design with this information.
• The products described in this document may contain design defects or errors known as errata which may cause the product to
  deviate from published specifications. Current characterized errata are available on request.
• Intel product plans in this presentation do not constitute Intel plan of record product roadmaps. Please contact your Intel
  representative to obtain Intel's current plan of record product roadmaps.
• Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor
  family, not across different processor families. Go to: http://www.intel.com/products/processor_number.
• Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
• Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be
  obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm
• Code names featured are used internally within Intel to identify products that are in development and not yet publicly
  announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in
  advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole
  risk of the user
• Intel, Xeon, Sponsors of Tomorrow and the Intel logo are trademarks of Intel Corporation in the United States and other
   countries.

• *Other names and brands may be claimed as the property of others.
• Copyright ©2013 Intel Corporation.


33
Legal Disclaimer
 •   Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute
     the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your
     reseller or system manufacturer. For more information, see Intel® Advanced Encryption Standard Instructions (AES-NI)
 •   Intel® Trusted Execution Technology (Intel® TXT): No computer system can provide absolute security under all
     conditions. Intel® TXT requires a computer with Intel® Virtualization Technology, an Intel TXT enabled processor,
     chipset, BIOS, Authenticated Code Modules and an Intel TXT compatible measured launched environment (MLE). Intel
     TXT also requires the system to contain a TPM v1.s. For more information, visit
     http://www.intel.com/technology/security.
 •   Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and
     virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and
     software configurations. Software applications may not be compatible with all operating systems. Consult your PC
     manufacturer. For more information, visit http://www.intel.com/go/virtualization.
 •   Software and workloads used in performance tests may have been optimized for performance only on Intel
     microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer
     systems, components, software, operations and functions. Any change to any of those factors may cause the results to
     vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated
     purchases, including the performance of that product when combined with other products. For more information go to
     http://www.intel.com/performance.
 •   Any software source code reprinted in this document is furnished under a software license and may only be used or
     copied in accordance with the terms of that license.
 •   Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated
     documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to
     use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to
     whom the Software is furnished to do so, subject to the following conditions:
     THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT
     NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
     NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM,
     DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT
     OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.




34
Risk Factors
 The above statements and any others in this document that refer to plans and expectations for the first quarter, the year and the
 future are forward-looking statements that involve a number of risks and uncertainties. Words such as “anticipates,” “expects,”
 “intends,” “plans,” “believes,” “seeks,” “estimates,” “may,” “will,” “should” and their variations identify forward-looking
 statements. Statements that refer to or are based on projections, uncertain events or assumptions also identify forward-looking
 statements. Many factors could affect Intel’s actual results, and variances from Intel’s current expectations regarding such factors
 could cause actual results to differ materially from those expressed in these forward-looking statements. Intel presently considers the
 following to be the important factors that could cause actual results to differ materially from the company’s expectations. Demand
 could be different from Intel's expectations due to factors including changes in business and economic conditions; customer acceptance
 of Intel’s and competitors’ products; supply constraints and other disruptions affecting customers; changes in customer order patterns
 including order cancellations; and changes in the level of inventory at customers. Uncertainty in global economic and financial
 conditions poses a risk that consumers and businesses may defer purchases in response to negative financial events, which could
 negatively affect product demand and other related matters. Intel operates in intensely competitive industries that are characterized by
 a high percentage of costs that are fixed or difficult to reduce in the short term and product demand that is highly variable and difficult
 to forecast. Revenue and the gross margin percentage are affected by the timing of Intel product introductions and the demand for and
 market acceptance of Intel's products; actions taken by Intel's competitors, including product offerings and introductions, marketing
 programs and pricing pressures and Intel’s response to such actions; and Intel’s ability to respond quickly to technological
 developments and to incorporate new features into its products. The gross margin percentage could vary significantly from
 expectations based on capacity utilization; variations in inventory valuation, including variations related to the timing of qualifying
 products for sale; changes in revenue levels; segment product mix; the timing and execution of the manufacturing ramp and
 associated costs; start-up costs; excess or obsolete inventory; changes in unit costs; defects or disruptions in the supply of materials
 or resources; product manufacturing quality/yields; and impairments of long-lived assets, including manufacturing, assembly/test and
 intangible assets. Intel's results could be affected by adverse economic, social, political and physical/infrastructure conditions in
 countries where Intel, its customers or its suppliers operate, including military conflict and other security risks, natural disasters,
 infrastructure disruptions, health concerns and fluctuations in currency exchange rates. Expenses, particularly certain marketing and
 compensation expenses, as well as restructuring and asset impairment charges, vary depending on the level of demand for Intel's
 products and the level of revenue and profits. Intel’s results could be affected by the timing of closing of acquisitions and divestitures.
 Intel’s current chief executive officer plans to retire in May 2013 and the Board of Directors is working to choose a successor. The
 succession and transition process may have a direct and/or indirect effect on the business and operations of the company. In
 connection with the appointment of the new CEO, the company will seek to retain our executive management team (some of whom are
 being considered for the CEO position), and keep employees focused on achieving the company’s strategic goals and objectives. Intel's
 results could be affected by adverse effects associated with product defects and errata (deviations from published specifications), and
 by litigation or regulatory matters involving intellectual property, stockholder, consumer, antitrust, disclosure and other issues, such as
 the litigation and regulatory matters described in Intel's SEC reports. An unfavorable ruling could include monetary damages or an
 injunction prohibiting Intel from manufacturing or selling one or more products, precluding particular business practices, impacting
 Intel’s ability to design its products, or requiring other remedies such as compulsory licensing of intellectual property. A detailed
 discussion of these and other factors that could affect Intel’s results is included in Intel’s SEC filings, including the company’s most
 recent Form 10-Q, report on Form 10-K and earnings release.
     Rev. 1/17/13


35
Backup




36
Pillars & Challenges of Big Data

                Massive scale and growth of unstructured data
                 80%~90% of total data
     Volume      Growing 10x~50x faster than structured (relational) data
                 10x~100x of traditional data warehousing

                Heterogeneity and variable nature of Big Data
                 Many different forms (text, document, image, video...)
     Variety     No schema or weak schema
                 Inconsistent syntax and semantics

                Real-time rather than batch-style analysis
     Velocity    Data streamed in, tortured, and discarded
                 Making impact on the spot rather than
                  after-the-fact

                Predictive analytics for future trends and patterns
     Value       Deep, complex analysis (machine learning, statistic modeling,
                  graph algorithms…) versus
                 Traditional business intelligence (querying, reporting…)



37
HDFS File Encryption: Architecture
     Overview


                               Key Management


 Input Data Stream                                                    Output Data Stream
                                                  Encrypt/Decrypt
                               Encryption Codec
                                                       Buffer




                                                  Native Crypto Lib




      HDFS = Hadoop* Distributed File System
38

Contenu connexe

Tendances

SQL-H a new way to enable SQL analytics
SQL-H a new way to enable SQL analyticsSQL-H a new way to enable SQL analytics
SQL-H a new way to enable SQL analyticsDataWorks Summit
 
"A Study of I/O and Virtualization Performance with a Search Engine based on ...
"A Study of I/O and Virtualization Performance with a Search Engine based on ..."A Study of I/O and Virtualization Performance with a Search Engine based on ...
"A Study of I/O and Virtualization Performance with a Search Engine based on ...Lucidworks (Archived)
 
IBM-Why Big Data?
IBM-Why Big Data?IBM-Why Big Data?
IBM-Why Big Data?Kun Le
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high levelJames Findlay
 
Introduction to Microsoft HDInsight and BI Tools
Introduction to Microsoft HDInsight and BI ToolsIntroduction to Microsoft HDInsight and BI Tools
Introduction to Microsoft HDInsight and BI ToolsDataWorks Summit
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentationMassTLC
 
Integrating Hadoop Into the Enterprise
Integrating Hadoop Into the EnterpriseIntegrating Hadoop Into the Enterprise
Integrating Hadoop Into the EnterpriseDataWorks Summit
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageAccenture
 
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4Frazer Clement
 
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...Cloudera, Inc.
 
Solving Compliance for Big Data
Solving Compliance for Big DataSolving Compliance for Big Data
Solving Compliance for Big Datafbeckett1
 
hadoop 101 aug 21 2012 tohug
 hadoop 101 aug 21 2012 tohug hadoop 101 aug 21 2012 tohug
hadoop 101 aug 21 2012 tohugAdam Muise
 
Monitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service ProvidersMonitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service ProvidersDataWorks Summit
 
Investigative Analytics- What's in a Data Scientists Toolbox
Investigative Analytics- What's in a Data Scientists ToolboxInvestigative Analytics- What's in a Data Scientists Toolbox
Investigative Analytics- What's in a Data Scientists ToolboxData Science London
 
Introduction to Hortonworks Data Platform for Windows
Introduction to Hortonworks Data Platform for WindowsIntroduction to Hortonworks Data Platform for Windows
Introduction to Hortonworks Data Platform for WindowsHortonworks
 
The Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureThe Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureInside Analysis
 

Tendances (18)

Bird&Bird
Bird&BirdBird&Bird
Bird&Bird
 
Forrester
ForresterForrester
Forrester
 
SQL-H a new way to enable SQL analytics
SQL-H a new way to enable SQL analyticsSQL-H a new way to enable SQL analytics
SQL-H a new way to enable SQL analytics
 
"A Study of I/O and Virtualization Performance with a Search Engine based on ...
"A Study of I/O and Virtualization Performance with a Search Engine based on ..."A Study of I/O and Virtualization Performance with a Search Engine based on ...
"A Study of I/O and Virtualization Performance with a Search Engine based on ...
 
IBM-Why Big Data?
IBM-Why Big Data?IBM-Why Big Data?
IBM-Why Big Data?
 
01 im overview high level
01 im overview high level01 im overview high level
01 im overview high level
 
Introduction to Microsoft HDInsight and BI Tools
Introduction to Microsoft HDInsight and BI ToolsIntroduction to Microsoft HDInsight and BI Tools
Introduction to Microsoft HDInsight and BI Tools
 
Big data ibm keynote d advani presentation
Big data ibm keynote d advani presentationBig data ibm keynote d advani presentation
Big data ibm keynote d advani presentation
 
Integrating Hadoop Into the Enterprise
Integrating Hadoop Into the EnterpriseIntegrating Hadoop Into the Enterprise
Integrating Hadoop Into the Enterprise
 
Silverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storageSilverton cleversafe-object-based-dispersed-storage
Silverton cleversafe-object-based-dispersed-storage
 
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4
200 million qps on commodity hardware : Getting started with MySQL Cluster 7.4
 
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...
Hadoop World 2011: Unlocking the Value of Big Data with Oracle - Jean-Pierre ...
 
Solving Compliance for Big Data
Solving Compliance for Big DataSolving Compliance for Big Data
Solving Compliance for Big Data
 
hadoop 101 aug 21 2012 tohug
 hadoop 101 aug 21 2012 tohug hadoop 101 aug 21 2012 tohug
hadoop 101 aug 21 2012 tohug
 
Monitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service ProvidersMonitizing Big Data at Telecom Service Providers
Monitizing Big Data at Telecom Service Providers
 
Investigative Analytics- What's in a Data Scientists Toolbox
Investigative Analytics- What's in a Data Scientists ToolboxInvestigative Analytics- What's in a Data Scientists Toolbox
Investigative Analytics- What's in a Data Scientists Toolbox
 
Introduction to Hortonworks Data Platform for Windows
Introduction to Hortonworks Data Platform for WindowsIntroduction to Hortonworks Data Platform for Windows
Introduction to Hortonworks Data Platform for Windows
 
The Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information ArchitectureThe Comprehensive Approach: A Unified Information Architecture
The Comprehensive Approach: A Unified Information Architecture
 

En vedette

Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudAcquia
 
Startup UCLA - Accelerator Skills Presentation
Startup UCLA - Accelerator Skills PresentationStartup UCLA - Accelerator Skills Presentation
Startup UCLA - Accelerator Skills PresentationCourtney Hemphill
 
Big Data Scotland
Big Data ScotlandBig Data Scotland
Big Data ScotlandRay Bugg
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWSAmazon Web Services
 

En vedette (6)

Goto berlin 10-2014
Goto berlin 10-2014Goto berlin 10-2014
Goto berlin 10-2014
 
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the CloudThree Key Steps to Ensure Security Compliance with Drupal in the Cloud
Three Key Steps to Ensure Security Compliance with Drupal in the Cloud
 
Startup UCLA - Accelerator Skills Presentation
Startup UCLA - Accelerator Skills PresentationStartup UCLA - Accelerator Skills Presentation
Startup UCLA - Accelerator Skills Presentation
 
Big Data Scotland
Big Data ScotlandBig Data Scotland
Big Data Scotland
 
Cod preso
Cod presoCod preso
Cod preso
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 

Similaire à Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..

Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10keirdo1
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyHitachi Vantara
 
Ensuring Mobile BI Success
Ensuring Mobile BI SuccessEnsuring Mobile BI Success
Ensuring Mobile BI SuccessBirst
 
Big Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureBig Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureOdinot Stanislas
 
Martin Wildberger Presentation
Martin Wildberger PresentationMartin Wildberger Presentation
Martin Wildberger PresentationMauricio Godoy
 
2012.04.26 big insights streams im forum2
2012.04.26 big insights streams im forum22012.04.26 big insights streams im forum2
2012.04.26 big insights streams im forum2Wilfried Hoge
 
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)Will Gardella
 
Big Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the FutureBig Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the FutureOdinot Stanislas
 
Big Data and HPC
Big Data and HPCBig Data and HPC
Big Data and HPCNetApp
 
Intel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntelAPAC
 
Big Data 視覺化分析解決方案
Big Data 視覺化分析解決方案Big Data 視覺化分析解決方案
Big Data 視覺化分析解決方案Etu Solution
 
Cutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellCutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellAMD
 
IBM Big Data Platform, 2012
IBM Big Data Platform, 2012IBM Big Data Platform, 2012
IBM Big Data Platform, 2012Rob Thomas
 
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...BigMine
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the ApplicationCisco Security
 
DataPortal Presentation
DataPortal Presentation DataPortal Presentation
DataPortal Presentation DataPortal
 
Talk IT_ Oracle_김태완_110831
Talk IT_ Oracle_김태완_110831Talk IT_ Oracle_김태완_110831
Talk IT_ Oracle_김태완_110831Cana Ko
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumIntelAPAC
 

Similaire à Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a.. (20)

Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10Accel Partners New Data Workshop 7-14-10
Accel Partners New Data Workshop 7-14-10
 
Big Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage StrategyBig Data, Big Content, and Aligning Your Storage Strategy
Big Data, Big Content, and Aligning Your Storage Strategy
 
Ensuring Mobile BI Success
Ensuring Mobile BI SuccessEnsuring Mobile BI Success
Ensuring Mobile BI Success
 
Big Data and Implications on Platform Architecture
Big Data and Implications on Platform ArchitectureBig Data and Implications on Platform Architecture
Big Data and Implications on Platform Architecture
 
Martin Wildberger Presentation
Martin Wildberger PresentationMartin Wildberger Presentation
Martin Wildberger Presentation
 
2012.04.26 big insights streams im forum2
2012.04.26 big insights streams im forum22012.04.26 big insights streams im forum2
2012.04.26 big insights streams im forum2
 
Kurukshetra - Big Data
Kurukshetra - Big DataKurukshetra - Big Data
Kurukshetra - Big Data
 
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)
SAP HANA and Apache Hadoop for Big Data Management (SF Scalable Systems Meetup)
 
Big Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the FutureBig Data Beyond Hadoop*: Research Directions for the Future
Big Data Beyond Hadoop*: Research Directions for the Future
 
Secure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & IntelSecure Big Data Analytics - Hadoop & Intel
Secure Big Data Analytics - Hadoop & Intel
 
Big Data and HPC
Big Data and HPCBig Data and HPC
Big Data and HPC
 
Intel Cloud Summit: Big Data
Intel Cloud Summit: Big DataIntel Cloud Summit: Big Data
Intel Cloud Summit: Big Data
 
Big Data 視覺化分析解決方案
Big Data 視覺化分析解決方案Big Data 視覺化分析解決方案
Big Data 視覺化分析解決方案
 
Cutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and DellCutting Big Data Down to Size with AMD and Dell
Cutting Big Data Down to Size with AMD and Dell
 
IBM Big Data Platform, 2012
IBM Big Data Platform, 2012IBM Big Data Platform, 2012
IBM Big Data Platform, 2012
 
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...
Big Data Analytics: Applications and Opportunities in On-line Predictive Mode...
 
Defending the Data Center: Managing Users from the Edge to the Application
Defending the Data Center:  Managing Users from the Edge to the ApplicationDefending the Data Center:  Managing Users from the Edge to the Application
Defending the Data Center: Managing Users from the Edge to the Application
 
DataPortal Presentation
DataPortal Presentation DataPortal Presentation
DataPortal Presentation
 
Talk IT_ Oracle_김태완_110831
Talk IT_ Oracle_김태완_110831Talk IT_ Oracle_김태완_110831
Talk IT_ Oracle_김태완_110831
 
Big Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick BuddenbaumBig Data launch keynote Singapore Patrick Buddenbaum
Big Data launch keynote Singapore Patrick Buddenbaum
 

Plus de Odinot Stanislas

Silicon Photonics and datacenter
Silicon Photonics and datacenterSilicon Photonics and datacenter
Silicon Photonics and datacenterOdinot Stanislas
 
Using a Field Programmable Gate Array to Accelerate Application Performance
Using a Field Programmable Gate Array to Accelerate Application PerformanceUsing a Field Programmable Gate Array to Accelerate Application Performance
Using a Field Programmable Gate Array to Accelerate Application PerformanceOdinot Stanislas
 
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...Odinot Stanislas
 
SDN/NFV: Service Chaining
SDN/NFV: Service Chaining SDN/NFV: Service Chaining
SDN/NFV: Service Chaining Odinot Stanislas
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Odinot Stanislas
 
SNIA : Swift Object Storage adding EC (Erasure Code)
SNIA : Swift Object Storage adding EC (Erasure Code)SNIA : Swift Object Storage adding EC (Erasure Code)
SNIA : Swift Object Storage adding EC (Erasure Code)Odinot Stanislas
 
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesPCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesOdinot Stanislas
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Odinot Stanislas
 
Software Defined Storage - Open Framework and Intel® Architecture Technologies
Software Defined Storage - Open Framework and Intel® Architecture TechnologiesSoftware Defined Storage - Open Framework and Intel® Architecture Technologies
Software Defined Storage - Open Framework and Intel® Architecture TechnologiesOdinot Stanislas
 
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Odinot Stanislas
 
Accelerate the SDN with Intel ONP
Accelerate the SDN with Intel ONPAccelerate the SDN with Intel ONP
Accelerate the SDN with Intel ONPOdinot Stanislas
 
Moving to PCI Express based SSD with NVM Express
Moving to PCI Express based SSD with NVM ExpressMoving to PCI Express based SSD with NVM Express
Moving to PCI Express based SSD with NVM ExpressOdinot Stanislas
 
Intel Cloud Builder : Siveo
Intel Cloud Builder : SiveoIntel Cloud Builder : Siveo
Intel Cloud Builder : SiveoOdinot Stanislas
 
Configuration and deployment guide for SWIFT on Intel Architecture
Configuration and deployment guide for SWIFT on Intel ArchitectureConfiguration and deployment guide for SWIFT on Intel Architecture
Configuration and deployment guide for SWIFT on Intel ArchitectureOdinot Stanislas
 
Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?Odinot Stanislas
 
Configuration and Deployment Guide For Memcached on Intel® Architecture
Configuration and Deployment Guide For Memcached on Intel® ArchitectureConfiguration and Deployment Guide For Memcached on Intel® Architecture
Configuration and Deployment Guide For Memcached on Intel® ArchitectureOdinot Stanislas
 
Améliorer OpenStack avec les technologies Intel
Améliorer OpenStack avec les technologies IntelAméliorer OpenStack avec les technologies Intel
Améliorer OpenStack avec les technologies IntelOdinot Stanislas
 
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...Odinot Stanislas
 
Big Data and Intel® Intelligent Systems Solution for Intelligent transportation
Big Data and Intel® Intelligent Systems Solution for Intelligent transportationBig Data and Intel® Intelligent Systems Solution for Intelligent transportation
Big Data and Intel® Intelligent Systems Solution for Intelligent transportationOdinot Stanislas
 
Big Data Solutions for Healthcare
Big Data Solutions for HealthcareBig Data Solutions for Healthcare
Big Data Solutions for HealthcareOdinot Stanislas
 

Plus de Odinot Stanislas (20)

Silicon Photonics and datacenter
Silicon Photonics and datacenterSilicon Photonics and datacenter
Silicon Photonics and datacenter
 
Using a Field Programmable Gate Array to Accelerate Application Performance
Using a Field Programmable Gate Array to Accelerate Application PerformanceUsing a Field Programmable Gate Array to Accelerate Application Performance
Using a Field Programmable Gate Array to Accelerate Application Performance
 
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...
Hands-on Lab: How to Unleash Your Storage Performance by Using NVM Express™ B...
 
SDN/NFV: Service Chaining
SDN/NFV: Service Chaining SDN/NFV: Service Chaining
SDN/NFV: Service Chaining
 
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
Ceph: Open Source Storage Software Optimizations on Intel® Architecture for C...
 
SNIA : Swift Object Storage adding EC (Erasure Code)
SNIA : Swift Object Storage adding EC (Erasure Code)SNIA : Swift Object Storage adding EC (Erasure Code)
SNIA : Swift Object Storage adding EC (Erasure Code)
 
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesPCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
 
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
Bare-metal, Docker Containers, and Virtualization: The Growing Choices for Cl...
 
Software Defined Storage - Open Framework and Intel® Architecture Technologies
Software Defined Storage - Open Framework and Intel® Architecture TechnologiesSoftware Defined Storage - Open Framework and Intel® Architecture Technologies
Software Defined Storage - Open Framework and Intel® Architecture Technologies
 
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
Virtualizing the Network to enable a Software Defined Infrastructure (SDI)
 
Accelerate the SDN with Intel ONP
Accelerate the SDN with Intel ONPAccelerate the SDN with Intel ONP
Accelerate the SDN with Intel ONP
 
Moving to PCI Express based SSD with NVM Express
Moving to PCI Express based SSD with NVM ExpressMoving to PCI Express based SSD with NVM Express
Moving to PCI Express based SSD with NVM Express
 
Intel Cloud Builder : Siveo
Intel Cloud Builder : SiveoIntel Cloud Builder : Siveo
Intel Cloud Builder : Siveo
 
Configuration and deployment guide for SWIFT on Intel Architecture
Configuration and deployment guide for SWIFT on Intel ArchitectureConfiguration and deployment guide for SWIFT on Intel Architecture
Configuration and deployment guide for SWIFT on Intel Architecture
 
Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?Intel IT Open Cloud - What's under the Hood and How do we Drive it?
Intel IT Open Cloud - What's under the Hood and How do we Drive it?
 
Configuration and Deployment Guide For Memcached on Intel® Architecture
Configuration and Deployment Guide For Memcached on Intel® ArchitectureConfiguration and Deployment Guide For Memcached on Intel® Architecture
Configuration and Deployment Guide For Memcached on Intel® Architecture
 
Améliorer OpenStack avec les technologies Intel
Améliorer OpenStack avec les technologies IntelAméliorer OpenStack avec les technologies Intel
Améliorer OpenStack avec les technologies Intel
 
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
Scale-out Storage on Intel® Architecture Based Platforms: Characterizing and ...
 
Big Data and Intel® Intelligent Systems Solution for Intelligent transportation
Big Data and Intel® Intelligent Systems Solution for Intelligent transportationBig Data and Intel® Intelligent Systems Solution for Intelligent transportation
Big Data and Intel® Intelligent Systems Solution for Intelligent transportation
 
Big Data Solutions for Healthcare
Big Data Solutions for HealthcareBig Data Solutions for Healthcare
Big Data Solutions for Healthcare
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

Protect Your Big Data with Intel<sup>®</sup> Xeon<sup>®</sup> Processors a..

  • 1. Protect Your Big Data with Intel® Xeon® Processors and Intel® Software Products for Apache* Hadoop* Bing Wang, Product Manager, Intel Tianyou Li, System Architect & Engineering Manager, Intel Haidong Xia, Cloud Security Designer, Intel BIGS003
  • 2. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • Intel Distribution for Apache Hadoop Role Based Access Control • Summary/Call to Action The PDF for this Session presentation is available from our Technical Session Catalog at the end of the day at: intel.com/go/idfsessionsBJ URL is on top of Session Agenda Pages in Pocket Guide 2
  • 3. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • Intel Distribution for Apache Hadoop Role Based Access Control • Summary/Call to Action 3
  • 4. Big Data Insights … New Frontier for Innovation Billions >3000 exabytes 690% Storage connected users and of new integrated growth devices sharing devices & Cloud Volume traffic Sensed data Arrival of Skype* Facebook* 629m Scientific data massive data 663m Cell Unstructured Social data Phones data 5.3 bn Structured Network data data Hotmail* Corporate data Yahoo* 364m 273m Time Traditional MPP - $50K Dramatic Data processing ROI costs per terabyte New analytics tools & Biz info processing products & insights 690 percent growth in storage capacity based off Intel analysis and IDC data, between 2010 (26,066 petabytes) to 2015 (179,327) which is ~690% 4
  • 5. Big Data Security Concerns Data Protection Access Control • How to protect sensitive • Who can access the data: data? −PII, customer info, IP, −Need granular control credit card, … for data access • Regulatory and compliance requirments • Encryption is method BIG DATA of choice for data protection • No built-in access • Encryption was control in current Big infeasible due to Data framework performance overhead 5
  • 6. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • IDH Role Based Access Control • Summary/Call to Action 6
  • 7. Intel® Distribution for Apache Hadoop* Software This session focus Automatic tuning of Multi-site scalability and Industry’s 1st hardware- Role-based access control Hadoop* cluster adaptive replication in assisted encryption & granular ACLs in HBase* configuration HBase Intel® Manager for Apache Hadoop* software Deployment, Configuration, Monitoring, Alerts, and Security Mahout* Data Exchange Sqoop* 1.4.1 Oozie* Pig* R Hive* 0.7 HBase 0.94.1 3.3.0 0.9.2 connectors 0.9.0 Columnar Store Machine Workflow Scripting Statistics SQL Query ZooKeeper* 3.4.5 Learning Coordination YARN (MRv2) Distributed Processing Framework Flume* 1.3.0 Log Collector HDFS 2.0.3 Hadoop Distributed File System Intel proprietary Intel enhancements contributed back to open source Open source components included without change 7
  • 8. Hadoop* Encryption: Protect Data from “Disk Leak” &$!@... Data I have the key was encrypted, and passphrase, how can I crack I can recover it? the data via Intel tool 8
  • 9. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • Intel Distribution for Apache Hadoop Role Based Access Control • Summary/Call to Action 9
  • 10. Data Protection with Intel® AES-NI Efficient Ways to Use Encryption for Data Protection Intel® AES-NI: Data at Rest Full disk encryption software • 7 instructions that protects data while saving to disk expose special Data in Motion Secure transactions used math functions pervasively in ecommerce, banking, etc. built in the processor Internet Intranet accelerate AES • Makes enabled encryption software faster Data in Process and stronger Most enterprise and cloud applications offer encryption options to secure information and protect confidentiality 10 Intel® Advanced Encryption Standard New Instructions
  • 11. Intel® Distribution for Apache Hadoop* Software: Encryption Framework HDFS MapReduce Derivative RecordReader Decrypt Encrypt Map Combiner Client Partitioner Local Decrypt Merge & Sort Reduce Derivative Encrypt RecordWriter 11 11
  • 12. Crypto Codec Framework • Extends compression codec and establishes a common abstraction of the API level that can be shared by all crypto codec implementations as well as users that use the API CryptoCodec cryptoCodec = (CryptoCodec) ReflectionUtils.newInstance(codecClass, conf); CryptoContext cryptoContext = new CryptoContext(); ... cryptoCodec.setCryptoContext(cryptoContext); CompressionInputStream input = cryptoCodec.createInputStream(inputStream); … • Provides a foundation for other components in Hadoop* such as MapReduce or HBase* to support encryption features 12
  • 13. Crypto Codec Framework: Class Hierarchy <<Java Interface>> <<Java Interface>> <<Java Interface>> Compressor Compression Code Decompressor <<Java Interface>> <<Java Interface>> <<Java Interface>> Encryptor Crypto Codec Decryptor <<Java Class>> Crypto Context 0..1 0..1 0..1 <<Java Class>> <<Java Interface>> <<Java Class>> Key Key ProfileResolver KeyProfile <<Java Interface>> Key Provider 13
  • 14. Crypto Codec File Format Block Block Block Block … Sync Block Algorithm Original Encrypted Mark header header Size Size (4 byte) (16 byte) (4 byte) Encryption data … Stream Version Key Exten- header Stream IV (16 (4 profile sion length (4 header byte) byte) header header byte) Encryption Data Compressed Compressed Compressed Compressed … Size (4 byte) data Size (4 byte) data 14
  • 15. Crypto Codec: API Example The usage is aligned with compression codec but with context supporting. Configuration conf = new Configuration(); CryptoCodec cryptoCodec = (CryptoCodec) ReflectionUtils.newInstance(AESCodec.class, conf); CryptoContext cryptoContext = new CryptoContext(); cryptoContext.setKey(Key.derive(password)); cryptoCodec.setCryptoContext(cryptoContext); DataInputStream input = inputFile.getFileSystem(conf).open(inputFile); DataOutputStream outputStream = outputFile.getFileSystem(conf).create(outputFile); CompressionOutputStream output = cryptoCodec.createOutputStream(outputStream); // encrypt the stream writeStream(input, output); input.close(); output.close(); 15
  • 16. Crypto Codec: A Simple MapReduce Example The usage is aligned with compression codec usage in MapReduce job but with context resolving. Job job = Job.getInstance(conf, "example"); JobConf jobConf = (JobConf)job.getConfiguration(); FileMatches fileMatches = new FileMatches( KeyContext.refer("KEY00", Key.KeyType.SYMMETRIC_KEY, "AES", 128)); fileMatches.addMatch("^.*/input1.intelaes$", KeyContext.refer("KEY01", Key.KeyType.SYMMETRIC_KEY, "AES", 128)); String keyStoreFile = "file:///" + secureDir + "/my.keystore"; String keyStorePasswordFile = "file:///" + secureDir + "/my.keystore.passwords"; KeyProviderConfig keyProviderConfig = KeyProviderCryptoContextProvider.getKeyStoreKeyProviderConfig( keyStoreFile, "JCEKS", null, keyStorePasswordFile, true); KeyProviderCryptoContextProvider.setInputCryptoContextProvider( jobConf, fileMatches, true, keyProviderConfig); 16
  • 17. Key Distribution and Protection for MapReduce • Targets – A framework at MapReduce side for enabling crypto codec in MapReduce job such as key context resolving, distribution and protection – Enabling different key storage or management systems to plug-in for providing keys – Satisfying the common requirements that stage and file of a single job may use different keys • A complete key management system is not part of Intel® Distribution for Apache Hadoop* Software – An API to integrate with an external key manage system is included 17
  • 18. Test Environment Processor Intel® Xeon® processor E5-2690 @2.90GHz (32 core, only 1 core is used) Software Intel® Distribution for Apache Hadoop* version 2.3 Memory 32GB Operating System CentOS* 6.3 Encryption OpenSSL* 1.0.1c (Intel® AES-NI enabled) Software File System Apache Hadoop Distributed File System (HDFS*)—namemode, datanode, and the test program were all run on the same server Storage 240 GB Intel® Solid-State Drive (SSD) 320 Series Test Input 1 GB text file Input Buffer Size 64K, 4K, 1K – data size for calling encryption/decryption interface each time 18
  • 19. Encryption in Memory AES Encryption Higher is better 500 Up to 450 400 5.3x 350 Speed(MB/s) 300 250 200 150 100 50 0 64k 4k 1k AES-NI 460 457 454 No AES-NI 87 87 86 AES = Intel® Advanced Encryption Standard New Instructions Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. 19 4/10/2013 Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more 19 information go to http://www.intel.com/performance.
  • 20. Decryption in Memory AES-Decryption Higher is better 1400 Up to 1200 19.8x 1000 Speed(MB/s) 800 600 400 200 0 64k 4k 1k AES-NI 1266 1259 1253 No AES-NI 64 63 63 AES = Intel® Advanced Encryption Standard New Instructions Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. 20 4/10/2013 Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more 20 information go to http://www.intel.com/performance.
  • 21. Combining Encryption with Compression (Memory-to-HDFS Transfer) 600 Higher is better 500 489 475 468 464 436 435 400 Throughput (MB/s) 292 282 300 280 200 114 113 115 100 84 86 89 58 56 53 52 57 55 52 59 55 52 51 56 55 53 58 55 53 51 56 55 52 0 64k 4k 1k hdfs io write aes w/ AES-NI aes w/o AES-NI snappy + hdfs io aes + snappy w/ AES-NI aes + snappy w/o AES-NI gzip + hdfs io aes + gzip w/ AES-NI aes + gzip w/o AES-NI zlib + hdfs io aes + zlib w/ AES-NI aes + zlib w/o AES-NI Up to 1.5X faster with Intel® AES-NI Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. 21 aes = Intel® Advanced Encryption Standard New Instructions, HDFS = Hadoop* Distributed File System
  • 22. Combining Decryption with Decompression (HDFS-to-Memory File Transfer) 1400 Higher is better 1287 1231 1199 1200 1104 1072 1048 1000 Throughput (MB/s) 800 661 677 661 611 635 624 600 565 566 557 466 456 476 461 471 455 410 409 417 400 365 369 367 322 324 325 299 300 299 200 57 56 56 0 64k 4k 1k hdfs io read aes w/ AES-NI aes w/o AES-NI snappy + hdfs io aes + snappy w/ AES-NI aes + snappy w/o AES-NI gzip + hdfs io aes + gzip w/ AES-NI aes + gzip w/o AES-NI zlib + hdfs io aes + zlib w/ AES-NI aes + zlib w/o AES-NI Up to 3.3X faster with Intel® AES-NI Software and workloads used in performance tests may have been optimized for performance only on Intel® microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. 22 aes = Intel® Advanced Encryption Standard New Instructions, HDFS = Hadoop* Distributed File System
  • 23. Where to Find the Source Code… • Patch and design document already submit to HADOOP-9331 • A working fork of Hadoop* with encryption framework can be found in GitHub project 23
  • 24. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • Intel Distribution for Apache Hadoop Role Based Access Control • Summary/Call to Action 24
  • 25. Role Based Access Control (RBAC): Overview Intel Manager HDFS Permissions HBase* Users Permissions Role Hive* Groups Permissions MapReduce Permissions Active Directory • User/Group & Roles will be translated into configuration files • ACL configurations will be pushed into every required node HDFS = Hadoop* Distributed File System 25
  • 26. RBAC: Role Definition • Role is a collection of permissions • Permission can have resource parameters • Role can be associate to users/groups • One user/group can have multiple roles • Currently we do not support role nesting 26
  • 29. Beyond This…Project Rhino! • A common authorization framework for the Hadoop* ecosystem • Token based authentication and single sign on • Extend Hbase* support for ACLs to the cell level • Improve audit logging Please visit: https://github.com/intel-hadoop/project-rhino/ 29
  • 30. Agenda • Big Data Security Trend • Intel® Distribution for Apache Hadoop* • Intel Distribution for Apache Hadoop Encryption • Intel Distribution for Apache Hadoop Role Based Access Control • Summary/Call to Action 30
  • 31. Summary/Call to Action • Intel® Xeon® processor based servers provide a strong foundation for big data workloads • Intel® Distribution for Apache Hadoop* with Intel Xeon processors provides breakthrough data security and access control for big data analytics • Develop applications to leverage Intel Distribution for Apache Hadoop Security capabilities • Deploy big data solutions with Intel Distribution for Apache Hadoop on Intel Xeon processor-based servers 31
  • 32. Additional Resources • Intel® AES-NI Website • Intel® Distribution for Apache Hadoop* Website • Intel AES-NI animation • Secure Cloud with High Performing Intel® Data Protection Technologies animation • “The Rijndael Cipher” - an AES tutorial animation • Shay Gueron, “Advanced Encryption Standard (AES) Instruction Set rev 2”, Intel whitepaper, June 2009. • Shay Gueron, Michael Kounavis, “Carry-less multiplication and its usage for computing the GCM Mode”, Intel whitepaper, August 2009 • Intel AES-NI use with IBM DB2 database white paper 32 Intel® Advanced Encryption Standard New Instructions (Intel® AES-NI)
  • 33. Legal Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. • A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. • Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The information here is subject to change without notice. Do not finalize a design with this information. • The products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. Current characterized errata are available on request. • Intel product plans in this presentation do not constitute Intel plan of record product roadmaps. Please contact your Intel representative to obtain Intel's current plan of record product roadmaps. • Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. Go to: http://www.intel.com/products/processor_number. • Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. • Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm • Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion or marketing of any product or services and any such use of Intel's internal code names is at the sole risk of the user • Intel, Xeon, Sponsors of Tomorrow and the Intel logo are trademarks of Intel Corporation in the United States and other countries. • *Other names and brands may be claimed as the property of others. • Copyright ©2013 Intel Corporation. 33
  • 34. Legal Disclaimer • Intel® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on select Intel® processors. For availability, consult your reseller or system manufacturer. For more information, see Intel® Advanced Encryption Standard Instructions (AES-NI) • Intel® Trusted Execution Technology (Intel® TXT): No computer system can provide absolute security under all conditions. Intel® TXT requires a computer with Intel® Virtualization Technology, an Intel TXT enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security. • Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, and virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization. • Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark* and MobileMark*, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. For more information go to http://www.intel.com/performance. • Any software source code reprinted in this document is furnished under a software license and may only be used or copied in accordance with the terms of that license. • Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 34
  • 35. Risk Factors The above statements and any others in this document that refer to plans and expectations for the first quarter, the year and the future are forward-looking statements that involve a number of risks and uncertainties. Words such as “anticipates,” “expects,” “intends,” “plans,” “believes,” “seeks,” “estimates,” “may,” “will,” “should” and their variations identify forward-looking statements. Statements that refer to or are based on projections, uncertain events or assumptions also identify forward-looking statements. Many factors could affect Intel’s actual results, and variances from Intel’s current expectations regarding such factors could cause actual results to differ materially from those expressed in these forward-looking statements. Intel presently considers the following to be the important factors that could cause actual results to differ materially from the company’s expectations. Demand could be different from Intel's expectations due to factors including changes in business and economic conditions; customer acceptance of Intel’s and competitors’ products; supply constraints and other disruptions affecting customers; changes in customer order patterns including order cancellations; and changes in the level of inventory at customers. Uncertainty in global economic and financial conditions poses a risk that consumers and businesses may defer purchases in response to negative financial events, which could negatively affect product demand and other related matters. Intel operates in intensely competitive industries that are characterized by a high percentage of costs that are fixed or difficult to reduce in the short term and product demand that is highly variable and difficult to forecast. Revenue and the gross margin percentage are affected by the timing of Intel product introductions and the demand for and market acceptance of Intel's products; actions taken by Intel's competitors, including product offerings and introductions, marketing programs and pricing pressures and Intel’s response to such actions; and Intel’s ability to respond quickly to technological developments and to incorporate new features into its products. The gross margin percentage could vary significantly from expectations based on capacity utilization; variations in inventory valuation, including variations related to the timing of qualifying products for sale; changes in revenue levels; segment product mix; the timing and execution of the manufacturing ramp and associated costs; start-up costs; excess or obsolete inventory; changes in unit costs; defects or disruptions in the supply of materials or resources; product manufacturing quality/yields; and impairments of long-lived assets, including manufacturing, assembly/test and intangible assets. Intel's results could be affected by adverse economic, social, political and physical/infrastructure conditions in countries where Intel, its customers or its suppliers operate, including military conflict and other security risks, natural disasters, infrastructure disruptions, health concerns and fluctuations in currency exchange rates. Expenses, particularly certain marketing and compensation expenses, as well as restructuring and asset impairment charges, vary depending on the level of demand for Intel's products and the level of revenue and profits. Intel’s results could be affected by the timing of closing of acquisitions and divestitures. Intel’s current chief executive officer plans to retire in May 2013 and the Board of Directors is working to choose a successor. The succession and transition process may have a direct and/or indirect effect on the business and operations of the company. In connection with the appointment of the new CEO, the company will seek to retain our executive management team (some of whom are being considered for the CEO position), and keep employees focused on achieving the company’s strategic goals and objectives. Intel's results could be affected by adverse effects associated with product defects and errata (deviations from published specifications), and by litigation or regulatory matters involving intellectual property, stockholder, consumer, antitrust, disclosure and other issues, such as the litigation and regulatory matters described in Intel's SEC reports. An unfavorable ruling could include monetary damages or an injunction prohibiting Intel from manufacturing or selling one or more products, precluding particular business practices, impacting Intel’s ability to design its products, or requiring other remedies such as compulsory licensing of intellectual property. A detailed discussion of these and other factors that could affect Intel’s results is included in Intel’s SEC filings, including the company’s most recent Form 10-Q, report on Form 10-K and earnings release. Rev. 1/17/13 35
  • 37. Pillars & Challenges of Big Data Massive scale and growth of unstructured data  80%~90% of total data Volume  Growing 10x~50x faster than structured (relational) data  10x~100x of traditional data warehousing Heterogeneity and variable nature of Big Data  Many different forms (text, document, image, video...) Variety  No schema or weak schema  Inconsistent syntax and semantics Real-time rather than batch-style analysis Velocity  Data streamed in, tortured, and discarded  Making impact on the spot rather than after-the-fact Predictive analytics for future trends and patterns Value  Deep, complex analysis (machine learning, statistic modeling, graph algorithms…) versus  Traditional business intelligence (querying, reporting…) 37
  • 38. HDFS File Encryption: Architecture Overview Key Management Input Data Stream Output Data Stream Encrypt/Decrypt Encryption Codec Buffer Native Crypto Lib HDFS = Hadoop* Distributed File System 38