Security and Ownership in User-Defined Data Meshes

被引:0
|
作者
Pingos, Michalis [1 ]
Christodoulou, Panayiotis [2 ]
Andreou, Andreas S. [1 ]
机构
[1] Cyprus Univ Technol, Fac Engn & Technol, Dept Elect Engn Comp Engn & Informat, CY-3036 Limassol, Cyprus
[2] Univ Nicosia, Inst Future, Sch Business, Dept Digital Innovat, CY-2417 Nicosia, Cyprus
关键词
big data; smart data processing; systems of deep insight; data meshes; data lakes; data products; blockchain; NFT; data blueprints; BIG DATA;
D O I
10.3390/a17040169
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Data meshes are an approach to data architecture and organization that treats data as a product and focuses on decentralizing data ownership and access. It has recently emerged as a field that presents quite a few challenges related to data ownership, governance, security, monitoring, and observability. To address these challenges, this paper introduces an innovative algorithmic framework leveraging data blueprints to enable the dynamic creation of data meshes and data products in response to user requests, ensuring that stakeholders have access to specific portions of the data mesh as needed. Ownership and governance concerns are addressed through a unique mechanism involving Blockchain and Non-Fungible Tokens (NFTs). This facilitates the secure and transparent transfer of data ownership, with the ability to mint time-based NFTs. By combining these advancements with the fundamental tenets of data meshes, this research offers a comprehensive solution to the challenges surrounding data ownership and governance. It empowers stakeholders to navigate the complexities of data management within a decentralized architecture, ensuring a secure, efficient, and user-centric approach to data utilization. The proposed framework is demonstrated using real-world data from a poultry meat production factory.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Benchmarking user-defined security configuration of mobile devices
    Vecchiato, Daniel
    Martins, Eliane
    [J]. 2016 SEVENTH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE COMPUTING (LADC), 2016, : 172 - 175
  • [2] FABLE: A language for enforcing user-defined security policies
    Swamy, Nikhil
    Corcoran, Brian J.
    Hicks, Michael
    [J]. PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, : 369 - 383
  • [3] User-defined data types and operators in occam
    Wood, DC
    Moores, J
    [J]. ARCHITECTURES, LANGUAGES AND TECHNIQUES FOR CONCURRENT SYSTEMS, 1999, 57 : 121 - 146
  • [4] Adequacy of a User-Defined Vocabulary to the Data Structure
    Lesot, Marie-Jeanne
    Smits, Gregory
    Pivert, Olivier
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ - IEEE 2013), 2013,
  • [5] Supporting User-Defined Functions on Uncertain Data
    Tran, Thanh T. L.
    Diao, Yanlei
    Sutton, Charles
    Liu, Anna
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2013, 6 (06): : 469 - 480
  • [6] User-defined Instrument
    Ye, Weidong
    Du, Yongwei
    [J]. PROCEEDINGS OF THE 2016 JOINT INTERNATIONAL INFORMATION TECHNOLOGY, MECHANICAL AND ELECTRONIC ENGINEERING, 2016, 59 : 560 - 563
  • [7] On user-defined features
    Hoffmann, CM
    Joan-Arinyo, R
    [J]. COMPUTER-AIDED DESIGN, 1998, 30 (05) : 321 - 332
  • [8] Risk Assessment of User-Defined Security Configurations for Android Devices
    Vecchiato, Daniel
    Vieira, Marco
    Martins, Eliane
    [J]. 2016 IEEE 27TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2016, : 467 - 477
  • [9] A Framework for Managing User-defined Security Policies to Support Network Security Functions
    Kim, Eunsoo
    Kim, Kuyju
    Lee, Seungjin
    Jeong, Jaehoon
    Kim, Hyoungshick
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION MANAGEMENT AND COMMUNICATION (IMCOM 2018), 2018,
  • [10] Data Recovery of User-defined Procedures in Binary Translation
    Liu, Xiaonan
    Zhao, Rongcai
    Pang, Jianmin
    Yin, Meijuan
    Wei, Zhenfang
    [J]. PROCEEDINGS OF THE 2013 6TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI 2013), VOLS 1 AND 2, 2013, : 634 - 638