Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2019

01-12-2019

A Consistent Approach to Building Secure Big Data Processing and Storage Systems

Author: M. A. Poltavtseva

Published in: Automatic Control and Computer Sciences | Issue 8/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of Big Data management systems and their differences from traditional DBMS’s are presented. The principles of a new, consistent approach to building secure Big Data management systems are given and substantiated. The security subsystem architecture is proposed.
Literature
1.
go back to reference Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002. Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.
3.
go back to reference Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 4, pp. 33–43. Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 4, pp. 33–43.
5.
go back to reference Perera, C., Ranjan, R., Wang, L., Khan, S.U., and Zomaya, A.Y., Big Data privacy in the Internet of Things era, IT Prof., 2015, vol. 17, no. 3, pp. 32–39.CrossRef Perera, C., Ranjan, R., Wang, L., Khan, S.U., and Zomaya, A.Y., Big Data privacy in the Internet of Things era, IT Prof., 2015, vol. 17, no. 3, pp. 32–39.CrossRef
7.
go back to reference Bertino, E. and Ferrari, E., Big Data security and privacy, in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Cham: Springer, 2018, vol. 31. Bertino, E. and Ferrari, E., Big Data security and privacy, in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Cham: Springer, 2018, vol. 31.
8.
go back to reference Klein, J., Buglak, R., Blockow, D., Wuttke, T., and Cooper, B., A reference architecture for Big Data systems in the national security domain, 2016 IEEE/ACM 2nd International Workshop on Big Data Software Engineering (BIGDSE), Austin, TX, 2016, pp. 51–57. https://doi.org/10.1109/BIGDSE.2016.017 Klein, J., Buglak, R., Blockow, D., Wuttke, T., and Cooper, B., A reference architecture for Big Data systems in the national security domain, 2016 IEEE/ACM 2nd International Workshop on Big Data Software Engineering (BIGDSE), Austin, TX, 2016, pp. 51–57. https://​doi.​org/​10.​1109/​BIGDSE.​2016.​017
10.
go back to reference Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018. Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018.
11.
go back to reference Blanco, C., García-Saiz, D., Peral, J., Maté, A., Oliver, A., and Fernández-Medina, E., How the conceptual modelling improves the security on document databases, Lect. Notes Comput. Sci., 2018, vol. 11157. Blanco, C., García-Saiz, D., Peral, J., Maté, A., Oliver, A., and Fernández-Medina, E., How the conceptual modelling improves the security on document databases, Lect. Notes Comput. Sci., 2018, vol. 11157.
12.
go back to reference Paine, D., Sy, E., Piell, R., and Lee, Ch., Examining data processing work as part of the scientific data lifecycle: Comparing practices across four scientific research groups, iConference2015Proceedings. http://hdl.handle.net/2142/73644. Paine, D., Sy, E., Piell, R., and Lee, Ch., Examining data processing work as part of the scientific data lifecycle: Comparing practices across four scientific research groups, iConference2015Proceedings. http://​hdl.​handle.​net/​2142/​73644.​
13.
go back to reference Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data LifeCycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1–7. Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data LifeCycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1–7.
16.
go back to reference Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C '17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120. Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C '17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.
18.
go back to reference Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012. Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012.
20.
go back to reference Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945–953.CrossRef Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945–953.CrossRef
21.
go back to reference Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 703–711.CrossRef Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 703–711.CrossRef
22.
go back to reference Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008. Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008.
23.
go back to reference Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36–41. Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36–41.
24.
go back to reference D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., and Bourka, A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, CoRR, abs/1512.06000, 2015. https://arxiv.org/abs/1512.06000. D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., and Bourka, A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, CoRR, abs/1512.06000, 2015. https://​arxiv.​org/​abs/​1512.​06000.​
25.
go back to reference Reddy, Y.B., Access control for sensitive data in Hadoop distributed file systems, Third International Conference on Advanced Communications and Computation, INFOCOMP 2013, Lisbon, 2013. Reddy, Y.B., Access control for sensitive data in Hadoop distributed file systems, Third International Conference on Advanced Communications and Computation, INFOCOMP 2013, Lisbon, 2013.
26.
go back to reference Hanlu, C. and Zheng, Y., Security and privacy in big data lifetime: A review, in Security, Privacy and Anonymity in Computation, Communication and Storage, Cham: Springer Nature, 2016, pp. 3–15. Hanlu, C. and Zheng, Y., Security and privacy in big data lifetime: A review, in Security, Privacy and Anonymity in Computation, Communication and Storage, Cham: Springer Nature, 2016, pp. 3–15.
27.
go back to reference Bertino, E., Verma, D.C., and Calo, S.B., A policy system for control of data fusion processes and derived data, 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 807–813. Bertino, E., Verma, D.C., and Calo, S.B., A policy system for control of data fusion processes and derived data, 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 807–813.
28.
go back to reference Akeel, F.Y., Secure data integration systems, Thesis for the Degree of Doctor of Philosophy, 2017. https://eprints.soton.ac.uk/415716/1/Final_thesis.pdf. Akeel, F.Y., Secure data integration systems, Thesis for the Degree of Doctor of Philosophy, 2017. https://​eprints.​soton.​ac.​uk/​415716/​1/​Final_​thesis.​pdf.​
29.
go back to reference Lesov, P., Database Security: A Historical Perspective, CoRR abs/1004.4022, 2010. http://arxiv.org/ftp/arxiv/ papers/1004/1004.4022.pdf. Lesov, P., Database Security: A Historical Perspective, CoRR abs/1004.4022, 2010. http://​arxiv.​org/​ftp/​arxiv/​ papers/1004/1004.4022.pdf.
32.
go back to reference Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.CrossRef Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679–683.CrossRef
33.
go back to reference Banaeian, S.F. and Imani, R.A., Security analysis of Big Data on Internet of Things, 2018. https://arxiv.org/ abs/1808.09491. Banaeian, S.F. and Imani, R.A., Security analysis of Big Data on Internet of Things, 2018. https://​arxiv.​org/​ abs/1808.09491.
36.
go back to reference Haourani, L.E., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the Big Data, Proceedings of the 3rd International Conference on Smart City Applications (SCA '18), ACM, New York, 2018, pp. 1–8. https://doi.org/10.1145/3286606.3286793 Haourani, L.E., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the Big Data, Proceedings of the 3rd International Conference on Smart City Applications (SCA '18), ACM, New York, 2018, pp. 1–8. https://​doi.​org/​10.​1145/​3286606.​3286793
37.
go back to reference Xhang, X., Zhenyu, W., Zhichun, L., Kangkook, J., Junghwan, R., Xusheng, X., Fengyuan, X., Haining, W., and Guofei, J., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), New York, 2016, pp. 504–516. https://doi.org/10.1145/2976749.2978378 Xhang, X., Zhenyu, W., Zhichun, L., Kangkook, J., Junghwan, R., Xusheng, X., Fengyuan, X., Haining, W., and Guofei, J., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), New York, 2016, pp. 504–516. https://​doi.​org/​10.​1145/​2976749.​2978378
40.
go back to reference Uemov, A.I., Sistemnyi podkhod i obshchaya teoriya sistem (The System Approach and General Theory of Systems), Moscow: Mysl’, 1978. Uemov, A.I., Sistemnyi podkhod i obshchaya teoriya sistem (The System Approach and General Theory of Systems), Moscow: Mysl’, 1978.
41.
go back to reference Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977. Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.
42.
go back to reference Codd, E.F., A relational model of data for large shared data banks, Comm. ACM, 1970, vol. 13, no. 6, pp. 377–387.CrossRef Codd, E.F., A relational model of data for large shared data banks, Comm. ACM, 1970, vol. 13, no. 6, pp. 377–387.CrossRef
43.
go back to reference Date, C.J. and Darwen, H., Foundation for Object/Relational Databases: The Third Manifesto, Reading, Massachusets: Addison-Wesley, 1998. Date, C.J. and Darwen, H., Foundation for Object/Relational Databases: The Third Manifesto, Reading, Massachusets: Addison-Wesley, 1998.
44.
go back to reference White, T., Hadoop: The Definitive Guide, O’Reilly Media, Inc. 2010. White, T., Hadoop: The Definitive Guide, O’Reilly Media, Inc. 2010.
45.
go back to reference Nandimath, J., Banerjee, E., Patil, A., Kakade, P., Vaidya, S., and Chaturvedi, D., Big data analysis using Apache Hadoop, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), San Francisco, CA, 2013, pp. 700–703. https://doi.org/10.1109/IRI.2013.6642536 Nandimath, J., Banerjee, E., Patil, A., Kakade, P., Vaidya, S., and Chaturvedi, D., Big data analysis using Apache Hadoop, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), San Francisco, CA, 2013, pp. 700–703. https://​doi.​org/​10.​1109/​IRI.​2013.​6642536
47.
go back to reference Poltavtseva, M.A., Modeling of Big data management systems in information security, Probl. Inf. Bezop., Komp’yut. Sist., 2019, no. 1, pp. 69–78. Poltavtseva, M.A., Modeling of Big data management systems in information security, Probl. Inf. Bezop., Komp’yut. Sist., 2019, no. 1, pp. 69–78.
Metadata
Title
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Author
M. A. Poltavtseva
Publication date
01-12-2019
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 8/2019
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411619080273

Other articles of this Issue 8/2019

Automatic Control and Computer Sciences 8/2019 Go to the issue