Gupta et al., 2017 - Google Patents
Object-tagged RBAC model for the Hadoop ecosystemGupta et al., 2017
View PDF- Document ID
- 46296421217517190
- Author
- Gupta M
- Patwa F
- Sandhu R
- Publication year
- Publication venue
- IFIP Annual Conference on Data and Applications Security and Privacy
External Links
Snippet
Hadoop ecosystem provides a highly scalable, fault-tolerant and cost-effective platform for storing and analyzing variety of data formats. Apache Ranger and Apache Sentry are two predominant frameworks used to provide authorization capabilities in Hadoop ecosystem. In …
- 101700026001 PRMS 0 description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Gupta et al. | Object-tagged RBAC model for the Hadoop ecosystem | |
Gupta et al. | An attribute-based access control model for secure big data processing in hadoop ecosystem | |
US11783053B2 (en) | Entity behavior catalog architecture | |
US12130908B2 (en) | Progressive trigger data and detection model | |
Kasem-Madani et al. | Security and privacy policy languages: A survey, categorization and gap identification | |
Gupta et al. | Multi-layer authorization framework for a representative Hadoop ecosystem deployment | |
Rao et al. | Privacy preserving data publishing based on sensitivity in context of Big Data using Hive | |
Ray et al. | Trust-based access control for secure cloud computing | |
Rahman et al. | Context-aware and dynamic role-based access control using blockchain | |
Patil et al. | Undoing of privacy policies on Facebook | |
Vijayalakshmi et al. | Shared access control models for big data: a perspective study and analysis | |
Jain et al. | A noise-based privacy preserving model for Internet of Things | |
Begum et al. | Sandbox security model for Hadoop file system | |
Ed-Daibouni et al. | Toward a new extension of the access control model ABAC for cloud computing | |
Shetty et al. | Policy-based access control scheme for securing hadoop ecosystem | |
Hosseinzadeh Kassani et al. | Leveraging protection and efficiency of query answering in heterogenous RDF data using blockchain | |
Kiran et al. | Ontology‐based data access control model supported with grid computing for improving security in healthcare data | |
Belhadaoui et al. | A Role-Attribute Based Access Control Model for Dynamic Access Control in Hadoop Ecosystem. | |
Pagadala et al. | Achieving mobile-health privacy using attribute-based access control | |
Soni | Managing Accounts and Security | |
Garg et al. | Dynamic Access Control Solution for Cross-Tenancy in a Cloud Environment | |
Rivera Sánchez et al. | Attaining role-based, mandatory, and discretionary access control for services by intercepting API calls in mobile systems | |
Shrihari et al. | Research Challenges in Big Data Security with Hadoop Platform | |
Singh et al. | Blockchain-Based Access Control Model for IoT Applications | |
Dubey et al. | Review and Analysis of Access Control Mechanism for Cloud Data Centres |