Academic literature on the topic 'Kafka Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Kafka Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Kafka Security"

1

Xu, Junya, Jiaqi Yin, Huibiao Zhu, and Lili Xiao. "Formalization and verification of Kafka messaging mechanism using CSP." Computer Science and Information Systems, no. 00 (2022): 57. http://dx.doi.org/10.2298/csis210707057x.

Full text
Abstract:
Apache Kafka is an open source distributed messaging system based on the publish-subscribe model, which achieves low latency, high throughput and good load balancing. As a popular messaging system, the transmission of messages between applications is one of the core functions of Kafka. Therefore, the reliability and security of data in the process of message transmission in Kafka have become the focus of attention. The formal methods can analyze whether a model is highly credible. Therefore, it is significant to analyze Kafka messaging mechanism which describes the communication process and rules between each module entity in Kafka from the perspective of formal methods. In this paper, we apply the process algebra CSP (Communicating Sequential Processes) and the model checking tool PAT (Process Analysis Toolkit) to analyze Kafka messaging mechanism. The results of verification show that the model caters for its specification and guarantees the reliability of messages in the normal communication process. Moreover, in order to further analyze the security of Kafka messaging mechanism, we add the intruder model and the authentication protocol Kerberos model and compare the verification results of Kafka messaging mechanism with or without the secure protocol Kerberos. The results show that the Kerberos protocol has improved the security of Kafka messaging mechanism in some aspects, but there are still some security loopholes.
APA, Harvard, Vancouver, ISO, and other styles
2

Leang, Bunrong, Sokchomrern Ean, Ga-Ae Ryu, and Kwan-Hee Yoo. "Improvement of Kafka Streaming Using Partition and Multi-Threading in Big Data Environment." Sensors 19, no. 1 (2019): 134. http://dx.doi.org/10.3390/s19010134.

Full text
Abstract:
The large amount of programmable logic controller (PLC) sensing data has rapidly increased in the manufacturing environment. Therefore, a large data store is necessary for Big Data platforms. In this paper, we propose a Hadoop ecosystem for the support of many features in the manufacturing industry. In this ecosystem, Apache Hadoop and HBase are used as Big Data storage and handle large scale data. In addition, Apache Kafka is used as a data streaming pipeline which contains many configurations and properties that are used to make a better-designed environment and a reliable system, such as Kafka offset and partition, which is used for program scaling purposes. Moreover, Apache Spark closely works with Kafka consumers to create a real-time processing and analysis of the data. Meanwhile, data security is applied in the data transmission phase between the Kafka producers and consumers. Public-key cryptography is performed as a security method which contains public and private keys. Additionally, the public-key is located in the Kafka producer, and the private-key is stored in the Kafka consumer. The integration of these above technologies will enhance the performance and accuracy of data storing, processing, and securing in the manufacturing environment.
APA, Harvard, Vancouver, ISO, and other styles
3

Purshotam, Singh Yadav. "Latency Reduction Techniques in Kafka for Real- Time Data Processing Applications." European Journal of Advances in Engineering and Technology 8, no. 9 (2021): 115–17. https://doi.org/10.5281/zenodo.13762396.

Full text
Abstract:
Apache Kafka has become a cornerstone in modern distributed systems, particularly for real-time data processing applications. However, as data volumes and processing demand increase, minimizing latency becomes crucial for maintaining system performance and responsiveness. This research article explores various techniques for reducing latency in Kafka-based systems, focusing on both producer-side and consumer-side optimizations, as well as broker configurations. We examine strategies such as batching, compression, partitioning schemes, and consumer group designs, and their impact on overall system latency. Our findings suggest that a combination of these techniques, when properly implemented, can significantly reduce end-to-end latency in Kafka- based real-time data processing applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Raghavendra Kurva. "Real-Time Data Integrity Validation Using Blockchain for Autonomous Vehicles." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 1275–82. https://doi.org/10.32628/cseit25112455.

Full text
Abstract:
This article presents a comprehensive framework for implementing blockchain-based data integrity validation in autonomous vehicles. The proposed system addresses critical challenges in securing real-time sensor data through a hybrid architecture combining Hyperledger Fabric with Apache Kafka. By integrating distributed ledger technology with optimized data processing mechanisms, the system achieves both security and performance requirements essential for autonomous vehicle operations. The architecture incorporates smart contracts for data validation, multi-layered security protocols, and efficient data streaming capabilities. Results demonstrate that the proposed solution successfully balances the competing demands of data security and real-time processing, making it suitable for deployment in production autonomous vehicle environments.
APA, Harvard, Vancouver, ISO, and other styles
5

Theofanis, Raptis, and Passarella Andrea. "A Survey on Networked Data Streaming With Apache Kafka." IEEE Access 11 (August 30, 2023): 85333–50. https://doi.org/10.5281/zenodo.8300814.

Full text
Abstract:
Apache Kafka has become a popular solution for managing networked data streaming in a variety of applications, from industrial to general purpose. This paper systematically surveys the research literature in this field by carefully classifying it into key macro areas, namely algorithms, networks, data, cyber-physical systems, and security. Through this meticulous classification, the paper aims to identify and analyze the optimization aspects relevant to each area, drawing upon practical applications as the basis for analysis. In this respect, the paper synthesizes and consolidates existing knowledge, saving researchers valuable time and effort in searching for relevant information across multiple sources. The tangible benefits of this survey paper include providing a consolidated knowledge base about research-intensive Apache Kafka topics, highlighting practical insights and novel approaches, pointing up cross-domain applications, identifying related research challenges, and serving as a trusted reference for the Apache Kafka community.
APA, Harvard, Vancouver, ISO, and other styles
6

Researcher. "ADVANCING IOT AND NETWORK SECURITY: EXPLORING KAFKA, SECURE PROXIES, AND MODERN ARCHITECTURES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 549–59. https://doi.org/10.5281/zenodo.13320092.

Full text
Abstract:
This comprehensive article explores the synergistic relationship between Apache Kafka and secure proxies in the context of Internet of Things (IoT) applications and network security. The article delves into Kafka's robust capabilities for data ingestion, real-time processing, and analytics in IoT environments, while also examining the critical role of secure proxies in ensuring data privacy compliance and enhancing overall security posture. Through an in-depth analysis of streaming analytics with KSQL, the extension of Kafka's functionality via Kafka Connect, and the performance implications of secure proxy deployments, the paper provides valuable insights for organizations seeking to optimize their IoT infrastructures. Furthermore, it investigates the intricate interplay between secure proxies and end-to-end encryption protocols, offering strategies to maintain data confidentiality while leveraging proxy benefits. The article also addresses the mitigation of Man-in-the-Middle (MITM) attacks using secure proxies and explores the implementation of Zero Trust architectures in modern network environments. By synthesizing theoretical concepts with practical implementation guidelines and real-world case studies, this article serves as a comprehensive resource for researchers, engineers, and decision-makers navigating the complex landscape of IoT data management and security in the era of stringent data privacy regulations.
APA, Harvard, Vancouver, ISO, and other styles
7

Janakiram Meka. "Financial Services Cloud Transformation: Securing Sensitive Data in Kafka Event Streams." Journal of Computer Science and Technology Studies 7, no. 4 (2025): 1023–28. https://doi.org/10.32996/jcsts.2025.7.4.115.

Full text
Abstract:
This article examines Apache Kafka's implementation for secure event streaming in financial services organizations. Financial institutions face unique challenges when adopting cloud-native event streaming architectures due to sensitive data handling requirements and strict regulatory compliance. Drawing on implementation experiences from SAP Labs and other financial deployments, the article addresses critical security components, including Access Control List management, authentication strategies, encryption mechanisms for data in transit and at rest, secure key management systems, and regulatory compliance frameworks. Real-world examples demonstrate how financial institutions can leverage Kafka capabilities while maintaining security standards. The documented patterns have successfully passed regulatory scrutiny while enabling high-performance event streaming necessary for modern financial operations. The integration of these security controls creates a defense-in-depth architecture that protects sensitive financial data throughout its lifecycle, from production through consumption and storage. Financial organizations implementing these patterns report significant improvements in security posture while maintaining the performance characteristics required for mission-critical transaction processing. As financial services continue their digital transformation journey, secure event streaming architectures represent a critical foundation for innovation that balances regulatory requirements with operational excellence and customer experience.
APA, Harvard, Vancouver, ISO, and other styles
8

Taiwo Joseph Akinbolaji, Godwin Nzeako, David Akokodaripon, Akorede Victor Aderoju, and Rahman Akorede Shittu. "Enhancing fault tolerance and scalability in multi-region Kafka clusters for high-demand cloud platforms." World Journal of Advanced Research and Reviews 18, no. 1 (2023): 1248–62. http://dx.doi.org/10.30574/wjarr.2023.18.1.0629.

Full text
Abstract:
This study examines strategies for enhancing fault tolerance and scalability in multi-region Kafka clusters, essential for supporting high-demand cloud environments. As cloud-based applications expand globally, achieving seamless data streaming across regions requires advanced configurations in Apache Kafka. This paper provides a thorough analysis of key approaches, including replication strategies, dynamic resource management, and real-time monitoring techniques tailored for multi-region deployments. Through a comprehensive literature review and real-world case studies, the study identifies critical challenges in managing latency, data consistency, and resilience within distributed Kafka clusters. Findings reveal that fault tolerance can be significantly improved through hybrid replication models that balance latency and data integrity, while advanced partitioning and load balancing techniques optimize Kafka’s scalability under fluctuating demands. The integration of container orchestration tools such as Kubernetes has also proven effective in automating resource scaling and failover across distributed environments. Furthermore, the paper highlights future research directions, including edge computing integration, predictive scaling, and enhanced security protocols to address evolving data privacy requirements. In conclusion, while multi-region Kafka deployments offer robust solutions for distributed data streaming, achieving optimal performance and resilience requires a combination of adaptive replication, proactive resource management, and secure, compliant data flows. Future research should focus on refining edge-compatible solutions and regulatory-compliant frameworks to sustain Kafka’s role in global, real-time data processing.
APA, Harvard, Vancouver, ISO, and other styles
9

Kowsick Venkatachalapathi. "Event-Driven Architecture: Harnessing Kafka and Spring Boot for Scalable, Real-Time Applications." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 10, no. 6 (2024): 474–86. http://dx.doi.org/10.32628/cseit24106193.

Full text
Abstract:
This comprehensive article explores the transformative impact of Event-Driven Architecture (EDA) in modern financial services, focusing on its implementation using Apache Kafka and Spring Boot. The article examines how financial institutions have revolutionized their transaction processing capabilities through EDA adoption, achieving significant improvements in system performance, reliability, and customer experience. Through a detailed examination of real-world implementations, the analysis demonstrates how EDA has enabled banks to handle unprecedented transaction volumes while substantially reducing system latency and improving resource utilization. The integration of Kafka and Spring Boot has proven particularly effective, with major financial institutions leveraging these technologies to achieve superior performance metrics and system availability. The article further explores critical patterns, including event sourcing, CQRS, and saga patterns, alongside cloud-based best practices for monitoring, performance optimization, and security implementations. By examining various implementation strategies and their outcomes, this article provides a comprehensive framework for building scalable, resilient financial systems that meet the demanding requirements of modern banking operations while ensuring regulatory compliance and maintaining high security and reliability standards.
APA, Harvard, Vancouver, ISO, and other styles
10

Swami, Amarnath. "Design and Development of Optimized Video Stream processing for Surveillance." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3766–69. http://dx.doi.org/10.22214/ijraset.2022.45854.

Full text
Abstract:
Abstract: The majority of current surveillance systems require human participation, with security personnel watching the monitor system & constantly spotting security breaches brought on by operator distraction or the potential for missing persons being discovered. Due to these difficulties, automated video surveillance is required in order to track, detect, and record security vulnerabilities in a monitored environment. We have reviewed the automation of monitoring using IP cameras in this paper. There are many uses for video surveillance. With the usage of Kafka, we have concentrated primarily on live streaming of video surveillance, face detection, and motion/object identification.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Kafka Security"

1

Rothwell, William. Kafka Implementation Guide: From Designing Distributed Streaming Platforms to Security. Pearson Education, Limited, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jr, Hasian Marouf A., and Marouf A. Hasian. Kafkaesque Laws, Nisour Square, and the Trials of the Former Blackwater Guards. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kafka's Indictment of Modern Law. University Press of Kansas, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Litowitz, Douglas E. Kafka's Indictment of Modern Law. University Press of Kansas, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Kafka Security"

1

Mager, Thomas. "Big Data Forensics on Apache Kafka." In Information Systems Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-49099-6_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kassahun, Teowdroes, and Svane Bender. "Food Security in the Face of Climate Change at Kafa Biosphere Reserve, Ethiopia." In Climate Change Management. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-36875-3_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hamilton, John T. "Handle with Care." In Security. Princeton University Press, 2013. http://dx.doi.org/10.23943/princeton/9780691157528.003.0003.

Full text
Abstract:
This chapter considers one of Kafka's last stories, Der Bau (The Burrow, 1923–24). In the story, the tiny, foraging animal knows all too well that the protection of his day-to-day life demands constant awareness. Although he has completed the construction of what appears to be an impenetrable, inviolable refuge, he realizes that he can “scarcely pass an hour in complete tranquility.” In brief, Kafka's creature is terrified, and it is this terror that motivates all his cares. From the very opening sentence of Der Bau, Kafka immediately, albeit lightly, alludes to the necessary imperfection that riddles but also constitutes every security project: “Ich habe den Bau eingerichet und er scheint wohlgelungen” (I have constructed the burrow and it appears quite successful). Needless to say, what merely appears to be secure can never be entirely foolproof; and, in fact, for the remainder of Kafka's story, the subterranean creature wrestles with gnawing doubts and troubling concerns.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Kafka Security"

1

Silva, Fábio, Matteus Silva, and Andrey Brito. "KafkaProxy: data-at-rest encryption and confidentiality support for Kafka clusters." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19241.

Full text
Abstract:
Apache Kafka has become a popular tool for building distributed systems. It supports a diversity of use cases that benefit from decoupled N-to-M communication such as publishing IoT data, decoupling and load-balancing microservices, and serve as a central hub for data in a distributed application. Nevertheless, Kafka's security is restricted to encrypted communications and authentication, leaving data unprotected in memory and on the disks. In this work, we design and implement a transparent, drop-in component that provides encryption to incoming and outgoing data in a Kafka cluster. Our component leverages confidential computing techniques not only to ensure data-at-rest encryption, but also to protect data and encryption keys from the operators of the Kafka Cluster. Our evaluation shows that the KafkaProxy can handle message streams with latency overhead of around 10%. Finally, in cases where throughput is impacted, simple replication of the KafkaProxy can mitigate the issue.
APA, Harvard, Vancouver, ISO, and other styles
2

Peddireddy, Kiran. "Streamlining Enterprise Data Processing, Reporting and Realtime Alerting using Apache Kafka." In 2023 11th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2023. http://dx.doi.org/10.1109/isdfs58141.2023.10131800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alothali, Eiman, Hany Alashwal, Motamen Salih, and Kadhim Hayawi. "Real Time Detection of Social Bots on Twitter Using Machine Learning and Apache Kafka." In 2021 5th Cyber Security in Networking Conference (CSNet). IEEE, 2021. http://dx.doi.org/10.1109/csnet52717.2021.9614282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Farkas, Zoltán, and Róbert Lovas. "Reference Architecture for IoT Platforms towards Cloud Continuum based on Apache Kafka and Orchestration Methods." In 7th International Conference on Internet of Things, Big Data and Security. SCITEPRESS - Science and Technology Publications, 2022. http://dx.doi.org/10.5220/0011071300003194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wiska, Rindra, Novian Habibie, Ari Wibisono, Widijanto Satyo Nugroho, and Petrus Mursanto. "Big sensor-generated data streaming using Kafka and Impala for data storage in Wireless Sensor Network for CO2 monitoring." In 2016 International Workshop on Big Data and Information Security (IWBIS). IEEE, 2016. http://dx.doi.org/10.1109/iwbis.2016.7872896.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhukova, M. "PLATFORMS FOR PROCESSING STREAMING DATA AND THEIR APPLICATION IN JSC «RUSSIAN RAILWAYS»." In Digital transformation in the economy of the transport complex. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/conferencearticle_67893107a23a05.54689001.

Full text
Abstract:
The article examines the key aspects of big data processing platforms, highlighting their importance in the modern world of business and research. Discusses key technologies and tools such as Hadoop, Apache Spark, Apache Kafka, as well as machine learning methods and analysis algorithms that allow extracting valuable information from huge volumes of data. Particular attention is paid to the application of Big Data in various industries, including marketing, trend forecasting and price optimization. Issues and challenges associated with big data processing are also addressed, including financial costs, data quality, security, and data integration. Finally, the prospects for the development of data processing technologies are discussed, including improving algorithms, expanding application areas and increasing the role of artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
7

Sun, Li, ZhiGang Han, and Zhulei Huang. "Design and Implememtation of Blockchain-Based Digital Collection Trading Platform." In 12th International Conference on Software Engineering & Trends. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.140802.

Full text
Abstract:
A blockchain-based digital collection trading platform has been developed, with a frontend design rooted in the Vue.js framework and Element UI component library. This frontend implementation encompasses various functionalities such as a search box, navigation bar, collection list, detail page, and transaction process. On the other hand, the back-end is constructed using the Springboot framework, mysql database, and kafka, integrated with a custom-built blockchain system operating on the Linux platform. In the design of this blockchain system, the traditional "mining" function, which competes for the right to create blocks, has been eliminated. Instead, the main server assumes the responsibility of block creation. Leveraging the characteristics of the Merkel tree and the Merkel Patricia tree, the platform explores the application of a coalition chain that aligns more closely with the concept of centralisation. Furthermore, this platform places significant emphasis on the security design of the transaction system, ensuring robust and secure transactions within the digital collection trading environment.
APA, Harvard, Vancouver, ISO, and other styles
8

Giblin, Chris, Sean Rooney, Pascal Vetsch, and Adrian Preston. "Securing Kafka with Encryption-at-Rest." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671388.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!