Chung Tong Hu, Timothy Grance, David F. Ferraiolo, David R. Kuhn
Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the "three Vs" (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
, Grance, T.
, Ferraiolo, D.
and Kuhn, D.
An Access Control Scheme for Big Data Processing, 2014 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Miami, FL, [online], https://doi.org/10.4108/icst.collaboratecom.2014.257649
(Accessed September 28, 2023)