Nothing Special   »   [go: up one dir, main page]

Awaysheh et al., 2020 - Google Patents

Next-generation big data federation access control: A reference model

Awaysheh et al., 2020

View PDF
Document ID
8576865235880858028
Author
Awaysheh F
Alazab M
Gupta M
Pena T
Cabaleiro J
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and security on a federation scale remain significant concerns among practitioners in both industry and academia …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code

Similar Documents

Publication Publication Date Title
Awaysheh et al. Next-generation big data federation access control: A reference model
Awaysheh et al. Security by design for big data frameworks over cloud computing
CA3048506C (en) Multi-instance architecture supporting trusted blockchain-based network
EP3262815B1 (en) System and method for securing an enterprise computing environment
Khan et al. Cloud log forensics: Foundations, state of the art, and future directions
US12021873B2 (en) Cloud least identity privilege and data access framework
Bhathal et al. Big Data: Hadoop framework vulnerabilities, security issues and attacks
US9444820B2 (en) Providing context-based visibility of cloud resources in a multi-tenant environment
US9210141B2 (en) System and method for providing scorecards to visualize services in an intelligent workload management system
Thota et al. Big data security framework for distributed cloud data centers
Doelitzscher et al. An agent based business aware incident detection system for cloud environments
Sicari et al. Security&privacy issues and challenges in NoSQL databases
US20220368726A1 (en) Privilege assurance of computer network environments
WO2022147188A1 (en) Integrated authentication and authorization for cloud data lakes
US11575499B2 (en) Self auditing blockchain
US20100030805A1 (en) Propagating information from a trust chain processing
Huh et al. Managing application whitelists in trusted distributed systems
Narayanan Securing hadoop
Modi Azure for Architects: Implementing cloud design, DevOps, containers, IoT, and serverless solutions on your public cloud
Gattoju et al. A Survey on Security of the Hadoop Framework in the Environment of Bigdata
Solsol et al. Security mechanisms in NoSQL dbms’s: A technical review
US20230325489A1 (en) Agentless extraction of cloud credentials
Tall Big Data Processing Attribute Based Access Control Security
US20230325490A1 (en) Agent-based extraction of cloud credentials
Munir Authentication Model for Mobile Cloud Computing Database Service