• DocumentCode
    230665
  • Title

    An Access Control scheme for Big Data processing

  • Author

    Hu, Vincent C. ; Grance, Tim ; Ferraiolo, David F. ; Kuhn, D. Rick

  • Author_Institution
    Nat. Inst. of Stand. & Technol., Gaithersburg, MD, USA
  • fYear
    2014
  • fDate
    22-25 Oct. 2014
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    Access Control (AC) systems are among the most critical of network security components. A system´s privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
  • Keywords
    Big Data; authorisation; data privacy; distributed processing; AC; access control policies; access control scheme; authorization; big data processing; computing environments; critical security component; cryptographic primitives; cryptographic protocols; distributed BD processing clusters; network security components; security controls; system privacy; three Vs; velocity volume and variety; Boolean functions; Cryptography; Data structures; Databases; Access Control; Authorization; Big Data; Distributed System;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2014 International Conference on
  • Conference_Location
    Miami, FL
  • Type

    conf

  • Filename
    7014544