Safe & Efficient Privacy-policy Enforcement on Hadoop

被引:0
|
作者
Jo, Insoon [1 ]
Jung, Eunjin [2 ]
Currim, Faiz [3 ]
Jung, Im Young [1 ]
Yeom, Heon Y. [1 ]
机构
[1] Seoul Natl Univ, Sch Comp Sci & Engn, Seoul 151742, South Korea
[2] Univ San Francisco, Dept Comp Sci, San Francisco, CA 94117 USA
[3] Univ Arizona, Dept Management Informat Syst, Tucson, AZ 85721 USA
关键词
Cloud Security; Hadoop; MapReduce; Fine-Grained Access Control;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Hadoop's lack of an effective access control system raises questions about whether confidentiality and integrity can be maintained for sensitive user data in the cloud. Researchers have begun to address this need for access control, but current solutions either have unacceptable performance overhead for efficient processing, do not provide any clear understanding on levels of privacy provided or are limited in application scope. This paper proposes a lightweight access control layer on top of Hadoop for access control on shared data. Our work targets query engines built on Hadoop, which use SQL-like query languages to directly query datasets. We provide much needed fine-grained access control (FGAC), to provide a secure interface between users and target systems without noticeable overhead.
引用
收藏
页码:1973 / 1984
页数:12
相关论文
共 50 条
  • [1] The Rhetoric of Misdirection in Corporate Privacy-Policy Statements
    Markel, Mike
    [J]. TECHNICAL COMMUNICATION QUARTERLY, 2005, 14 (02) : 197 - 214
  • [2] PVDetector: A Detector of Privacy-Policy Violations for Android Apps
    Slavin, Rocky
    Wang, Xiaoyin
    Hosseini, Mitra Bokaei
    Hester, James
    Krishnan, Ram
    Bhatia, Jaspreet
    Breaux, Travis D.
    Niu, Jianwei
    [J]. 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, : 299 - 300
  • [3] Data-Driven Envelopment with Privacy-Policy Tying
    Condorelli, Daniele
    Padilla, Jorge
    [J]. ECONOMIC JOURNAL, 2024, 134 (658): : 515 - 536
  • [4] Exploiting Privacy-Policy and -Management Features on Social Networks: A User's Perspective
    Ismail, Mohd Ishak
    Rahman, Md Arafatur
    Azad, Saiful
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 66 - 71
  • [5] Privacy Enforcement Through Policy Extension
    Arunkumar, Saritha
    Srivatsa, Mudhakar
    Soyluoglu, Berker
    Sensoy, Murat
    Cerutti, Federico
    [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1096 - 1100
  • [6] Privacy Policy Enforcement for Ambient Ubiquitous Services
    Oyomno, Were
    Jappinen, Pekka
    Kerttula, Esa
    [J]. AMBIENT INTELLIGENCE, 2010, 6439 : 265 - 269
  • [7] A Multi-privacy Policy Enforcement System
    Fatema, Kaniz
    Chadwick, David W.
    Lievens, Stijn
    [J]. PRIVACY AND IDENTITY MANAGEMENT FOR LIFE, 2011, 352 : 297 - 310
  • [8] Privacy policy enforcement in enterprises with identity management solutions
    Mont, Marco
    Thyne, Robert
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (02) : 133 - 163
  • [9] Confidentiality, privacy and trust policy enforcement for the semantic web
    Thuraisingham, Bhavani
    [J]. Eighth IEEE International Workshop on Policies for Distributed Systems and Networks - Proceedings, 2007, : 8 - 11
  • [10] Privacy Control in the Cloud based on Multilevel Policy Enforcement
    Betge-Brezetz, Stephane
    Kamga, Guy-Bertrand
    Ghorbel, Mahmoud
    Dupont, Marie-Pascale
    [J]. 2012 IEEE 1ST INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2012,