Author:
Tall Anne M.,Zou Cliff C.
Abstract
There is an increasing demand for processing large volumes of unstructured data for a wide variety of applications. However, protection measures for these big data sets are still in their infancy, which could lead to significant security and privacy issues. Attribute-based access control (ABAC) provides a dynamic and flexible solution that is effective for mediating access. We analyzed and implemented a prototype application of ABAC to large dataset processing in Amazon Web Services, using open-source versions of Apache Hadoop, Ranger, and Atlas. The Hadoop ecosystem is one of the most popular frameworks for large dataset processing and storage and is adopted by major cloud service providers. We conducted a rigorous analysis of cybersecurity in implementing ABAC policies in Hadoop, including developing a synthetic dataset of information at multiple sensitivity levels that realistically represents healthcare and connected social media data. We then developed Apache Spark programs that extract, connect, and transform data in a manner representative of a realistic use case. Our result is a framework for securing big data. Applying this framework ensures that serious cybersecurity concerns are addressed. We provide details of our analysis and experimentation code in a GitHub repository for further research by the community.
Funder
U.S. National Science Foundation
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference59 articles.
1. Chandrakar, I., and Hulipalled, V.R. (2021, January 1–3). Privacy Preserving Big Data mining using Pseudonymization and Homomorphic Encryption. Proceedings of the 2021 2nd Global Conference for Advancement in Technology (GCAT), Bangalore, India.
2. Sellami, R., Zalila, F., Nuttinck, A., Dupont, S., Deprez, J.-C., and Mouton, S. (2020, January 10–13). FADI–A Deployment Framework for Big Data Management and Analytics. Proceedings of the 2020 IEEE 29th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Bayonne, France.
3. Colombo, P., and Ferrari, E. (2018, January 13–15). Access Control in the Era of Big Data: State of the Art and Research Directions. Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies (SACMAT’18), Indianapolis, IN, USA.
4. Horton, N., and DeSimone, A. (2018). Sony’s Nightmare before Christmas: The 2014 North Korean Cyber Attack on Sony and Lessons for US Government Actions in Cyberspace, Defense Technical Information Center.
5. SoK: Anatomy of data breaches;Saleem;Proc. Priv. Enhancing Technol.,2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献