An Access Control Scheme for Big Data Processing

被引:18
|
作者
Ru, Vincent C. [1 ]
Grance, Tim [1 ]
Ferraiolo, David F. [1 ]
Kuhn, D. Rick [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
关键词
Access Control; Authorization; Big Data; Distributed System;
D O I
10.4108/icst.collaboratecom.2014.257649
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the "three Vs" (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] A dynamic data access control scheme for hierarchical structures in big data
    Deng, Xinxin
    Peng, Changgen
    Yang, Haoxuan
    Peng, Zongfeng
    Zhong, Chongyi
    [J]. COMPUTER COMMUNICATIONS, 2024, 220 : 128 - 137
  • [2] A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds
    Hu, Chunqiang
    Li, Wei
    Cheng, Xiuzhen
    Yu, Jiguo
    Wang, Shengling
    Bie, Rongfang
    [J]. IEEE TRANSACTIONS ON BIG DATA, 2018, 4 (03) : 341 - 355
  • [3] Optimize Parallel Data Access in Big Data Processing
    Yin, Jiangling
    Wang, Jun
    [J]. 2015 15TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING, 2015, : 721 - 724
  • [4] Research on access control of big data
    Li H.
    Zhang M.
    Feng D.-G.
    Hui Z.
    [J]. 2017, Science Press (40): : 72 - 91
  • [5] A Fine-grained Access Control Scheme for Big Data Based on Classification Attributes
    Yang, Tengfei
    Shen, Peisong
    Tian, Xue
    Chen, Chi
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 238 - 245
  • [6] A Multi-level Access Control Scheme Based on Attribute Encryption for Big Data
    Li, Ruixia
    Peng, Wei
    [J]. 2019 4TH INTERNATIONAL CONFERENCE ON MECHANICAL, CONTROL AND COMPUTER ENGINEERING (ICMCCE 2019), 2019, : 694 - 698
  • [7] A Framework for Attribute-Based Access Control in Processing Big Data with Multiple Sensitivities
    Tall, Anne M.
    Zou, Cliff C.
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [8] Research on the Access Control and Communications Security Research Based on Hadoop Big Data Processing
    Hu, Yanhua
    [J]. PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTING TECHNOLOGY, 2016, 60 : 270 - 273
  • [9] Access Control for Big Data using Data Content
    Zeng, Wenrong
    Yang, Yuhao
    Luo, Bo
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON BIG DATA, 2013,
  • [10] Big Data Processing and Access Controls in cloud Environment
    Reddy, Yenumula B.
    [J]. 2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 25 - 33