Book Image

Scalable Data Architecture with Java

By : Sinchan Banerjee
Book Image

Scalable Data Architecture with Java

By: Sinchan Banerjee

Overview of this book

Java architectural patterns and tools help architects to build reliable, scalable, and secure data engineering solutions that collect, manipulate, and publish data. This book will help you make the most of the architecting data solutions available with clear and actionable advice from an expert. You’ll start with an overview of data architecture, exploring responsibilities of a Java data architect, and learning about various data formats, data storage, databases, and data application platforms as well as how to choose them. Next, you’ll understand how to architect a batch and real-time data processing pipeline. You’ll also get to grips with the various Java data processing patterns, before progressing to data security and governance. The later chapters will show you how to publish Data as a Service and how you can architect it. Finally, you’ll focus on how to evaluate and recommend an architecture by developing performance benchmarks, estimations, and various decision metrics. By the end of this book, you’ll be able to successfully orchestrate data architecture solutions using Java and related technologies as well as to evaluate and present the most suitable solution to your clients.
Table of Contents (19 chapters)
1
Section 1 – Foundation of Data Systems
5
Section 2 – Building Data Processing Pipelines
11
Section 3 – Enabling Data as a Service
14
Section 4 – Choosing Suitable Data Architecture

Solution and tools available for data security

In the previous section, we briefly discussed what data security is and why it is needed. We also looked at a few common data security threats. The solutions and tools described here help mitigate or minimize the risk from the threats discussed in the previous section:

  • Data discovery and classification: To ensure data security, it is important to discover sensitive information. This technique uses data discovery to classify data into various security labels (such as confidential, public, and so on). Once classification is done, security policies can be applied to the various classifications of data according to the organization’s needs.
  • Firewalls: This is the first line of defense against any network intrusions. They exclude any undesirable traffic from entering the network. They also help open specific ports to the external network, which gives hackers less of a chance to enter the network.
  • Backup and recovery:...