Abstract
Big Data often refers to a set of technologies that process large volumes of heterogeneous data. “Data Security” and “Data Quality” are two essential aspects of any data-centric project. On the one hand, Data Security System aims to protect the Confidentiality, Integrity and Availability of data. On the other hand, Data Quality Management System ensures the monitoring, evaluation and improvement of many data characteristics such as Accuracy, Consistency, Completeness and Freshness. Much research has pointed out that these two systems, Security and Quality, can be mutually blocked. Assessing or improving data quality may require extended read and/or write access to the data which may not be permitted by the security policies. In this paper, we demonstrate that it is possible to use security systems to improve data quality thanks to a dynamic access control framework dedicated to collaborative and distributed environments. Our solution consists in extending the PolyOrBAC framework, initially designed to control access in collaborative platforms, to make it a dynamic data distribution platform. Thanks to this new architecture, it will be possible to eliminate duplicates in distributed and big data environments, reduce the amount of data and improve its quality.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
References
Talha, M., Abou El Kalam, A., Elmarzouqi, N.: Big data: trade-off between data quality and data security. Procedia Comput. Sci. 151, 916–922 (2019). ISSN 1877-0509. https://doi.org/10.1016/j.procs.2019.04.127
Talha, M., Elmarzouqi, N., Abou El Kalam, A.: Quality and security in big data: challenges as opportunities to build a powerful wrap-up solution. J. Ubiquitous Syst. Pervasive Networks 12, 09–15 (2019). https://doi.org/10.5383/JUSPN.12.01.002
Madaan, N., Abdul Ahad, M., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. In: Computer Law & Security Review: The International Journal of Technology Law and Practice (2017). https://doi.org/10.1016/j.clsr.2017.06.007
Ahad, M.A., Tripathi, G., Zafar, S., Doja, F.: IoT data management—security aspects of information linkage in IoT systems. In: Peng, S.-L., Pal, S., Huang, L. (eds.) Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. ISRL, vol. 174, pp. 439–464. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-33596-0_18
Abdul Ahad, M., Biswas, R.: Request-based, secured and energy-efficient (RBSEE) architecture for handling IoT big data. J. Inf. Sci., 1–12 (2018). https://doi.org/10.1177/0165551518787699
eXtensible Access Control Markup Language (XACML) Version 3.0, 2013, OASIS Standard. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. Accessed 16 Oct 2021
Information technology - Next Generation Access Control - Implementation Requirements, Protocols and API Definitions (NGAC-IRPADS). International Committee for Information Technology Standards (INCITS) (2017)
Benhadj Djilali, H., Tandjaoui, D.: Dynamic team access control for collaborative internet of things. In: Renault, É., Boumerdassi, S., Bouzefrane, S. (eds.) Mobile, Secure, and Programmable Networking. MSPN 2018. LNCS, vol. 11005. Springer, Cham. (2019). https://doi.org/10.1007/978-3-030-03101-5_7
Lv, B., Zhang, D., Mao, R., Yang, H.: A multi-level cross-domain access control model based on role mapping (2016). https://doi.org/10.2991/mmme-16.2016.53
Abou El Kalam, A., et al.: Organization based access control. In: Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 120–131 (2003). https://doi.org/10.1109/POLICY.2003.1206966
Abou El Kalam, A., Deswarte, Y., Baïna, A., Kaâniche, M.: Access control for collaborative systems: a web services based approach. In: IEEE International Conference on Web Services, ICWS 2007, July 2007, Salt Lake City, UT, United States. pp. 1064–1071 (2007)
Andrieux, A., et al.: Web services agreement specification (WS-Agreement). Global Grid Forum 2 (2004)
Wäldrich, O., et al.: WS-Agreement Negotiation Version 1.0. (2011)
Marino, F., Moiso, C., Petracca, M.: Automatic contract negotiation, service discovery and mutual authentication solutions: a survey on the enabling technologies of the forthcoming IoT ecosystems. Comput. Networks 148, 176–195 (2018). https://doi.org/10.1016/j.comnet.2018.11.011
Li, Y., Cuppens-Boulahia, N., Crom, J.M., Cuppens, F., Frey, V.: Reaching agreement in security policy negotiation (2014). https://doi.org/10.1109/TrustCom.2014.17
WSAG4J framework, V2.0.0 (2012). http://wsag4j.sourceforge.net/site/wsag/overview.html. Accessed 16 Oct 2021
SLA Framework, v1.1 (2016). https://github.com/FIWARE/ops.Sla-framework. Accessed 16 Oct 2021
Li, Y., Cuppens-Boulahia, N., Crom, J.-M., Cuppens, F., Frey, V.: Expression and enforcement of security policy for virtual resource allocation in IAAS cloud. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 105–118. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_8
El Mokhtari, J., Abou El Kalam, A., Benhadou, S., LEROY, J.P.: Dynamic management of security policies in PrivOrBAC. Int. J. Adv. Comput. Sci. Appl. 12 (2021). https://doi.org/10.14569/IJACSA.2021.0120681
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Talha, M., Abou El Kalam, A. (2022). Big Data: Towards a Collaborative Security System at the Service of Data Quality. In: Abraham, A., et al. Hybrid Intelligent Systems. HIS 2021. Lecture Notes in Networks and Systems, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-96305-7_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-96305-7_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-96304-0
Online ISBN: 978-3-030-96305-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)