Abstract—
This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of Big Data management systems and their differences from traditional DBMS’s are presented. The principles of a new, consistent approach to building secure Big Data management systems are given and substantiated. The security subsystem architecture is proposed.
Similar content being viewed by others
REFERENCES
Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.
Siddiqa, A., Hashem, I., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A., and Nasaruddin, F., A survey of big data management: Taxonomy and state-of-the-art, J. Network Comput. Appl., 2016, vol. 71, pp. 151–166. https://doi.org/10.1016/j.jnca.2016.04.008
Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 4, pp. 33–43.
Hu, C., Grance, T., Ferraiolo, D.F., and Kuhn, D.R., An access control scheme for Big Data processing, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, 2014, pp. 1–7. https://doi.org/10.4108/icst.collaboratecom.2014.257649
Perera, C., Ranjan, R., Wang, L., Khan, S.U., and Zomaya, A.Y., Big Data privacy in the Internet of Things era, IT Prof., 2015, vol. 17, no. 3, pp. 32–39.
Reddy, Y.B., Access control mechanisms in Big Data processing, Software Engineering and Applications/831: Advances in Power and Energy Systems (SEA 2015), Marina del Rey, 2015. https://doi.org/10.2316/P.2015.829-006
Bertino, E. and Ferrari, E., Big Data security and privacy, in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Cham: Springer, 2018, vol. 31.
Klein, J., Buglak, R., Blockow, D., Wuttke, T., and Cooper, B., A reference architecture for Big Data systems in the national security domain, 2016 IEEE/ACM 2nd International Workshop on Big Data Software Engineering (BIGDSE), Austin, TX, 2016, pp. 51–57. https://doi.org/10.1109/BIGDSE.2016.017
Akeel, F., Fathabadi, A.F., Paci, F., et al., Formal modelling of data integration systems security policies, Data Sci. Eng., 2016, vol. 1, no. 3, pp. 139–148. https://doi.org/10.1007/s41019-016-0016-y
Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018.
Blanco, C., García-Saiz, D., Peral, J., Maté, A., Oliver, A., and Fernández-Medina, E., How the conceptual modelling improves the security on document databases, Lect. Notes Comput. Sci., 2018, vol. 11157.
Paine, D., Sy, E., Piell, R., and Lee, Ch., Examining data processing work as part of the scientific data lifecycle: Comparing practices across four scientific research groups, iConference2015Proceedings. http://hdl.handle.net/2142/73644.
Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data LifeCycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1–7.
Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., and Guo, S., Protection of Big Data privacy, IEEE Access, 2016, vol. 4, pp. 1821–1834. https://doi.org/10.1109/ACCESS.2016.2558446
Moreno, J., Serrano, M.A., and Fernández-Medina, E., Main issues in Big Data security, Future Internet, 2016, vol. 8, no. 3, pp. 1–44. https://doi.org/10.3390/fi8030044
Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C '17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.
Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol. 40, no. 6, pp. 323–332. https://doi.org/10.1134/S0361768814060152
Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012.
Kotenko, I., Saenko, I., and Branitskiy, A., Framework for mobile Internet of Things security monitoring based on Big Data processing and machine learning, IEEE Access, 2018, vol. 6. https://doi.org/10.1109/ACCESS.2018.2881998
Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945–953.
Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 703–711.
Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008.
Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36–41.
D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., and Bourka, A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, CoRR, abs/1512.06000, 2015. https://arxiv.org/abs/1512.06000.
Reddy, Y.B., Access control for sensitive data in Hadoop distributed file systems, Third International Conference on Advanced Communications and Computation, INFOCOMP 2013, Lisbon, 2013.
Hanlu, C. and Zheng, Y., Security and privacy in big data lifetime: A review, in Security, Privacy and Anonymity in Computation, Communication and Storage, Cham: Springer Nature, 2016, pp. 3–15.
Bertino, E., Verma, D.C., and Calo, S.B., A policy system for control of data fusion processes and derived data, 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 807–813.
Akeel, F.Y., Secure data integration systems, Thesis for the Degree of Doctor of Philosophy, 2017. https://eprints.soton.ac.uk/415716/1/Final_thesis.pdf.
Lesov, P., Database Security: A Historical Perspective, CoRR abs/1004.4022, 2010. http://arxiv.org/ftp/arxiv/ papers/1004/1004.4022.pdf.
Boyd, D. and Crawford, K., Critical questions for Big Data, Inf. Commun. Soc., 2012, vol. 15, no. 5, pp. 662–679. https://doi.org/10.1080/1369118X.2012.678878
Salleh, K.A. and Janczewski, L., Technological, organizational and environmental security and privacy issues of big data: A literature review, Procedia Comput. Sci., 2016, vol. 100, pp. 19–28. https://doi.org/10.1016/j.procs.2016.09.119
Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.
Banaeian, S.F. and Imani, R.A., Security analysis of Big Data on Internet of Things, 2018. https://arxiv.org/ abs/1808.09491.
Chang, L., Chi, Y., Xuyun, Z., and Jinjun, Ch., External integrity verification for outsourced big data in cloud and IoT: A big picture, Future Gen. Comput. Syst., 2015, vol. 49, pp. 58–67. https://doi.org/10.1016/j.future.2014.08.007
Jutla, D.N. and Bodorik, P., PAUSE: A privacy architecture for heterogeneous big data environments, 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, 2015, pp. 1919–1928. https://doi.org/10.1109/BigData.2015.7363969
Haourani, L.E., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the Big Data, Proceedings of the 3rd International Conference on Smart City Applications (SCA '18), ACM, New York, 2018, pp. 1–8. https://doi.org/10.1145/3286606.3286793
Xhang, X., Zhenyu, W., Zhichun, L., Kangkook, J., Junghwan, R., Xusheng, X., Fengyuan, X., Haining, W., and Guofei, J., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), New York, 2016, pp. 504–516. https://doi.org/10.1145/2976749.2978378
Ashwin, K.T.K., Hong, L., Johnson, P.T., and Xiaofeh, H., Content sensitivity based access control framework for Hadoop, Digital Commun.Networks, 2017, vol. 3, no. 4, pp. 213–225. https://doi.org/10.1016/j.dcan.2017.07.007
Idar, H.A., Aissaoui, K., Belhadaoui, H., and Hilali, R.F., Dynamic data sensitivity access control in Hadoop platform, 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), Marrakech, 2018, pp. 105–109. https://doi.org/10.1109/CIST.2018.8596381
Uemov, A.I., Sistemnyi podkhod i obshchaya teoriya sistem (The System Approach and General Theory of Systems), Moscow: Mysl’, 1978.
Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.
Codd, E.F., A relational model of data for large shared data banks, Comm. ACM, 1970, vol. 13, no. 6, pp. 377–387.
Date, C.J. and Darwen, H., Foundation for Object/Relational Databases: The Third Manifesto, Reading, Massachusets: Addison-Wesley, 1998.
White, T., Hadoop: The Definitive Guide, O’Reilly Media, Inc. 2010.
Nandimath, J., Banerjee, E., Patil, A., Kakade, P., Vaidya, S., and Chaturvedi, D., Big data analysis using Apache Hadoop, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), San Francisco, CA, 2013, pp. 700–703. https://doi.org/10.1109/IRI.2013.6642536
Brewer, E.A., A certain freedom: Thoughts on the CAP theorem, PODC’10 Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, New York, 2010, pp. 335–336. https://doi.org/10.1145/1835698.1835701
Poltavtseva, M.A., Modeling of Big data management systems in information security, Probl. Inf. Bezop., Komp’yut. Sist., 2019, no. 1, pp. 69–78.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by O. Pismenov
About this article
Cite this article
Poltavtseva, M.A. A Consistent Approach to Building Secure Big Data Processing and Storage Systems. Aut. Control Comp. Sci. 53, 914–921 (2019). https://doi.org/10.3103/S0146411619080273
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411619080273