Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

An Access Control Scheme for Big Data Processing

Published

Author(s)

Chung Tong Hu, Timothy Grance, David F. Ferraiolo, David R. Kuhn

Abstract

Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the "three Vs" (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
Proceedings Title
2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
Conference Dates
October 22-25, 2014
Conference Location
Miami, FL

Keywords

Access Control, Authorization, Big Data, Distributed System

Citation

, C. , Grance, T. , Ferraiolo, D. and Kuhn, D. (2014), An Access Control Scheme for Big Data Processing, 2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, FL, [online], https://doi.org/10.4108/icst.collaboratecom.2014.257649 (Accessed May 20, 2022)
Created November 11, 2014, Updated November 10, 2018