Role-Based Access Control Technique with Trino for restriction in Hive-based Data Warehouse

被引:0
|
作者
Georgiev, Angel [1 ]
Valkanov, Vladimir [1 ]
机构
[1] Univ Plovdiv Paisii Hilendarski, Fac Math & Informat, Plovdiv, Bulgaria
关键词
Data Warehouse; data; data consistency; data encryption; data maintenance; data masking; data security; informa tionsecurity; role based access; SQL;
D O I
10.1109/ICEST62335.2024.10639702
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the fast-changing field of big data analytics, it is crucial to have strong security and access control measures. This paper presents a new Role-Based Access Control (RBAC) technique that is specifically designed for Hive-based data warehouses, using Trino as a query engine. Our method is intended to effectively manage and enforce detailed access policies, addressing the ever-changing requirements of data security in large-scale data environments. The text describes the challenges of data warehouse security and the limitations of current access control methods in Hive data warehouses. It then presents a proposed RBAC model that integrates with Trino to provide a secure, flexible, and scalable solution. The model includes user authentication, role assignment, permission grants, and access controls. It allows for customized roles to fit different user profiles and data access requirements, ensuring the protection of sensitive data while maintaining flexibility for diverse analytical needs. The efficacy of the model is demonstrated through a series of tests, evaluating its performance in terms of security, scalability, and impact on query execution times.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [2] Data access control in virtual organisations - Role-Based Access Control patterns
    Bertok, P
    Kodituwakku, SR
    DIGITAL ENTERPRISE CHALLENGES: LIFE-CYCLE APPROACH TO MANAGEMENT AND PRODUCTION, 2002, 77 : 394 - 405
  • [3] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [4] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [5] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [6] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [7] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [8] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136
  • [9] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [10] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487