Awaysheh et al., 2020 - Google Patents
Next-generation big data federation access control: A reference modelAwaysheh et al., 2020
View PDF- Document ID
- 8576865235880858028
- Author
- Awaysheh F
- Alazab M
- Gupta M
- Pena T
- Cabaleiro J
- Publication year
- Publication venue
- Future Generation Computer Systems
External Links
Snippet
This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and security on a federation scale remain significant concerns among practitioners in both industry and academia …
- 238000001514 detection method 0 abstract description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Awaysheh et al. | Next-generation big data federation access control: A reference model | |
Awaysheh et al. | Security by design for big data frameworks over cloud computing | |
CA3048506C (en) | Multi-instance architecture supporting trusted blockchain-based network | |
EP3262815B1 (en) | System and method for securing an enterprise computing environment | |
Khan et al. | Cloud log forensics: Foundations, state of the art, and future directions | |
US12021873B2 (en) | Cloud least identity privilege and data access framework | |
Bhathal et al. | Big Data: Hadoop framework vulnerabilities, security issues and attacks | |
US9444820B2 (en) | Providing context-based visibility of cloud resources in a multi-tenant environment | |
US9210141B2 (en) | System and method for providing scorecards to visualize services in an intelligent workload management system | |
Thota et al. | Big data security framework for distributed cloud data centers | |
Doelitzscher et al. | An agent based business aware incident detection system for cloud environments | |
Sicari et al. | Security&privacy issues and challenges in NoSQL databases | |
US20220368726A1 (en) | Privilege assurance of computer network environments | |
WO2022147188A1 (en) | Integrated authentication and authorization for cloud data lakes | |
US11575499B2 (en) | Self auditing blockchain | |
US20100030805A1 (en) | Propagating information from a trust chain processing | |
Huh et al. | Managing application whitelists in trusted distributed systems | |
Narayanan | Securing hadoop | |
Modi | Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and serverless solutions on your public cloud | |
Gattoju et al. | A Survey on Security of the Hadoop Framework in the Environment of Bigdata | |
Solsol et al. | Security mechanisms in NoSQL dbms’s: A technical review | |
US20230325489A1 (en) | Agentless extraction of cloud credentials | |
Tall | Big Data Processing Attribute Based Access Control Security | |
US20230325490A1 (en) | Agent-based extraction of cloud credentials | |
Munir | Authentication Model for Mobile Cloud Computing Database Service |