Book Image

Scalable Data Architecture with Java

By : Sinchan Banerjee
Book Image

Scalable Data Architecture with Java

By: Sinchan Banerjee

Overview of this book

Java architectural patterns and tools help architects to build reliable, scalable, and secure data engineering solutions that collect, manipulate, and publish data. This book will help you make the most of the architecting data solutions available with clear and actionable advice from an expert. You’ll start with an overview of data architecture, exploring responsibilities of a Java data architect, and learning about various data formats, data storage, databases, and data application platforms as well as how to choose them. Next, you’ll understand how to architect a batch and real-time data processing pipeline. You’ll also get to grips with the various Java data processing patterns, before progressing to data security and governance. The later chapters will show you how to publish Data as a Service and how you can architect it. Finally, you’ll focus on how to evaluate and recommend an architecture by developing performance benchmarks, estimations, and various decision metrics. By the end of this book, you’ll be able to successfully orchestrate data architecture solutions using Java and related technologies as well as to evaluate and present the most suitable solution to your clients.
Table of Contents (19 chapters)
1
Section 1 – Foundation of Data Systems
5
Section 2 – Building Data Processing Pipelines
11
Section 3 – Enabling Data as a Service
14
Section 4 – Choosing Suitable Data Architecture

Understanding the need for data security

Before we understand the need for data security, let’s try to define what data security is. Data security is the process of protecting enterprise data and preventing any data loss from malicious or unauthorized access to data. Data security includes the following tasks:

  • Protecting sensitive data from attacks.
  • Protecting data and applications from any ransomware attacks.
  • Protecting against any attacks that can delete, modify, or corrupt corporate data.
  • Allowing access and control of data to the necessary user within the organization. Again, read-only, write, and delete access is provided to the data based on the role and its use.

Some industries may have stringent data security requirements. For example, a US health insurance company needs to ensure PHI data is extremely well protected according to HIPAA standards. Another example is that a financial firm such as Bank Of America has to ensure card and account...