Skip to main content
Log in

A Consistent Approach to Building Secure Big Data Processing and Storage Systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of Big Data management systems and their differences from traditional DBMS’s are presented. The principles of a new, consistent approach to building secure Big Data management systems are given and substantiated. The security subsystem architecture is proposed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.

  2. Siddiqa, A., Hashem, I., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A., and Nasaruddin, F., A survey of big data management: Taxonomy and state-of-the-art, J. Network Comput. Appl., 2016, vol. 71, pp. 151–166. https://doi.org/10.1016/j.jnca.2016.04.008

    Article  Google Scholar 

  3. Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 4, pp. 33–43.

  4. Hu, C., Grance, T., Ferraiolo, D.F., and Kuhn, D.R., An access control scheme for Big Data processing, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, 2014, pp. 1–7. https://doi.org/10.4108/icst.collaboratecom.2014.257649

  5. Perera, C., Ranjan, R., Wang, L., Khan, S.U., and Zomaya, A.Y., Big Data privacy in the Internet of Things era, IT Prof., 2015, vol. 17, no. 3, pp. 32–39.

    Article  Google Scholar 

  6. Reddy, Y.B., Access control mechanisms in Big Data processing, Software Engineering and Applications/831: Advances in Power and Energy Systems (SEA 2015), Marina del Rey, 2015. https://doi.org/10.2316/P.2015.829-006

  7. Bertino, E. and Ferrari, E., Big Data security and privacy, in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Cham: Springer, 2018, vol. 31.

    Google Scholar 

  8. Klein, J., Buglak, R., Blockow, D., Wuttke, T., and Cooper, B., A reference architecture for Big Data systems in the national security domain, 2016 IEEE/ACM 2nd International Workshop on Big Data Software Engineering (BIGDSE), Austin, TX, 2016, pp. 51–57. https://doi.org/10.1109/BIGDSE.2016.017

  9. Akeel, F., Fathabadi, A.F., Paci, F., et al., Formal modelling of data integration systems security policies, Data Sci. Eng., 2016, vol. 1, no. 3, pp. 139–148. https://doi.org/10.1007/s41019-016-0016-y

    Article  Google Scholar 

  10. Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018.

  11. Blanco, C., García-Saiz, D., Peral, J., Maté, A., Oliver, A., and Fernández-Medina, E., How the conceptual modelling improves the security on document databases, Lect. Notes Comput. Sci., 2018, vol. 11157.

  12. Paine, D., Sy, E., Piell, R., and Lee, Ch., Examining data processing work as part of the scientific data lifecycle: Comparing practices across four scientific research groups, iConference2015Proceedings. http://hdl.handle.net/2142/73644.

  13. Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data LifeCycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1–7.

  14. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., and Guo, S., Protection of Big Data privacy, IEEE Access, 2016, vol. 4, pp. 1821–1834. https://doi.org/10.1109/ACCESS.2016.2558446

    Article  Google Scholar 

  15. Moreno, J., Serrano, M.A., and Fernández-Medina, E., Main issues in Big Data security, Future Internet, 2016, vol. 8, no. 3, pp. 1–44. https://doi.org/10.3390/fi8030044

    Article  Google Scholar 

  16. Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C '17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.

  17. Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol. 40, no. 6, pp. 323–332. https://doi.org/10.1134/S0361768814060152

    Article  Google Scholar 

  18. Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012.

    Google Scholar 

  19. Kotenko, I., Saenko, I., and Branitskiy, A., Framework for mobile Internet of Things security monitoring based on Big Data processing and machine learning, IEEE Access, 2018, vol. 6. https://doi.org/10.1109/ACCESS.2018.2881998

    Article  Google Scholar 

  20. Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945–953.

    Article  Google Scholar 

  21. Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 703–711.

    Article  Google Scholar 

  22. Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008.

  23. Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36–41.

  24. D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., and Bourka, A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, CoRR, abs/1512.06000, 2015. https://arxiv.org/abs/1512.06000.

  25. Reddy, Y.B., Access control for sensitive data in Hadoop distributed file systems, Third International Conference on Advanced Communications and Computation, INFOCOMP 2013, Lisbon, 2013.

  26. Hanlu, C. and Zheng, Y., Security and privacy in big data lifetime: A review, in Security, Privacy and Anonymity in Computation, Communication and Storage, Cham: Springer Nature, 2016, pp. 3–15.

    Google Scholar 

  27. Bertino, E., Verma, D.C., and Calo, S.B., A policy system for control of data fusion processes and derived data, 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 807–813.

  28. Akeel, F.Y., Secure data integration systems, Thesis for the Degree of Doctor of Philosophy, 2017. https://eprints.soton.ac.uk/415716/1/Final_thesis.pdf.

  29. Lesov, P., Database Security: A Historical Perspective, CoRR abs/1004.4022, 2010. http://arxiv.org/ftp/arxiv/ papers/1004/1004.4022.pdf.

  30. Boyd, D. and Crawford, K., Critical questions for Big Data, Inf. Commun. Soc., 2012, vol. 15, no. 5, pp. 662–679. https://doi.org/10.1080/1369118X.2012.678878

    Article  Google Scholar 

  31. Salleh, K.A. and Janczewski, L., Technological, organizational and environmental security and privacy issues of big data: A literature review, Procedia Comput. Sci., 2016, vol. 100, pp. 19–28. https://doi.org/10.1016/j.procs.2016.09.119

    Article  Google Scholar 

  32. Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.

    Article  Google Scholar 

  33. Banaeian, S.F. and Imani, R.A., Security analysis of Big Data on Internet of Things, 2018. https://arxiv.org/ abs/1808.09491.

  34. Chang, L., Chi, Y., Xuyun, Z., and Jinjun, Ch., External integrity verification for outsourced big data in cloud and IoT: A big picture, Future Gen. Comput. Syst., 2015, vol. 49, pp. 58–67. https://doi.org/10.1016/j.future.2014.08.007

    Article  Google Scholar 

  35. Jutla, D.N. and Bodorik, P., PAUSE: A privacy architecture for heterogeneous big data environments, 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, 2015, pp. 1919–1928. https://doi.org/10.1109/BigData.2015.7363969

  36. Haourani, L.E., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the Big Data, Proceedings of the 3rd International Conference on Smart City Applications (SCA '18), ACM, New York, 2018, pp. 1–8. https://doi.org/10.1145/3286606.3286793

  37. Xhang, X., Zhenyu, W., Zhichun, L., Kangkook, J., Junghwan, R., Xusheng, X., Fengyuan, X., Haining, W., and Guofei, J., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), New York, 2016, pp. 504–516. https://doi.org/10.1145/2976749.2978378

  38. Ashwin, K.T.K., Hong, L., Johnson, P.T., and Xiaofeh, H., Content sensitivity based access control framework for Hadoop, Digital Commun.Networks, 2017, vol. 3, no. 4, pp. 213–225. https://doi.org/10.1016/j.dcan.2017.07.007

    Article  Google Scholar 

  39. Idar, H.A., Aissaoui, K., Belhadaoui, H., and Hilali, R.F., Dynamic data sensitivity access control in Hadoop platform, 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), Marrakech, 2018, pp. 105–109. https://doi.org/10.1109/CIST.2018.8596381

  40. Uemov, A.I., Sistemnyi podkhod i obshchaya teoriya sistem (The System Approach and General Theory of Systems), Moscow: Mysl’, 1978.

  41. Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.

    Google Scholar 

  42. Codd, E.F., A relational model of data for large shared data banks, Comm. ACM, 1970, vol. 13, no. 6, pp. 377–387.

    Article  Google Scholar 

  43. Date, C.J. and Darwen, H., Foundation for Object/Relational Databases: The Third Manifesto, Reading, Massachusets: Addison-Wesley, 1998.

  44. White, T., Hadoop: The Definitive Guide, O’Reilly Media, Inc. 2010.

    Google Scholar 

  45. Nandimath, J., Banerjee, E., Patil, A., Kakade, P., Vaidya, S., and Chaturvedi, D., Big data analysis using Apache Hadoop, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), San Francisco, CA, 2013, pp. 700–703. https://doi.org/10.1109/IRI.2013.6642536

  46. Brewer, E.A., A certain freedom: Thoughts on the CAP theorem, PODC’10 Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, New York, 2010, pp. 335–336. https://doi.org/10.1145/1835698.1835701

  47. Poltavtseva, M.A., Modeling of Big data management systems in information security, Probl. Inf. Bezop., Komp’yut. Sist., 2019, no. 1, pp. 69–78.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. A. Poltavtseva.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Poltavtseva, M.A. A Consistent Approach to Building Secure Big Data Processing and Storage Systems. Aut. Control Comp. Sci. 53, 914–921 (2019). https://doi.org/10.3103/S0146411619080273

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411619080273

Keywords:

Navigation