skip to main content
10.1145/3205977.3205998acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Access Control in the Era of Big Data: State of the Art and Research Directions

Published:07 June 2018Publication History

ABSTRACT

Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a standard data model and related data manipulation language. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data management systems and describing a set of requirements that any access control solution for Big Data platforms may fulfill. We then describe the state of the art and discuss open research issues.

References

  1. R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. 2002. Hippocratic databases. In 28th International Conference on Very Large Data Bases (VLDB). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, and Yunsong Meng. 2010. Representing and reasoning about web access control policies Computer Software and Applications Conference (COMPSAC), 2010 IEEE 34th Annual. IEEE, 137--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sattam Alsubaiee, Yasser Altowim, Hotham Altwaijry, Alexander Behm, Vinayak Borkar, Yingyi Bu, Michael Carey, Inci Cetindil, Madhusudan Cheelangi, Khurram Faraaz, et almbox.. 2014. AsterixDB: A scalable, open source BDMS. Proceedings of the VLDB Endowment Vol. 7, 14 (2014), 1905--1916. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lujo Bauer, Scott Garriss, and Michael K Reiter. 2011. Detecting and resolving policy misconfigurations in access-control systems. ACM Transactions on Information and System Security (TISSEC) Vol. 14, 1 (2011), 2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, A. A. Jabal, S. B. Calo, C. Makaya, M. Touma, D. C. Verma, and C. Williams. 2017. Provenance-Based Analytics Services for Access Control Policies 2017 IEEE World Congress on Services, SERVICES 2017, Honolulu, HI, USA, June 25--30, 2017. 94--101.Google ScholarGoogle Scholar
  6. J.W. Byun and N. Li. 2008. Purpose based access control for privacy protection in relational database systems. The VLDB Journal Vol. 17, 4 (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Rick Cattell. 2011. Scalable SQL and NoSQL Data Stores. SIGMOD Rec. Vol. 39, 4 (May. 2011), 12--27. nG. J. Ahn, and J. Jorgensen. 2013 a. Multiparty Access Control for Online Social Networks: Model and Mechanisms. IEEE Transactions on Knowledge and Data Engineering Vol. 25, 7 (July. 2013), 1614--1627. 1041-4347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Vincent C Hu, David Ferraiolo, Rick Kuhn, Arthur R Friedman, Alan J Lang, Margaret M Cogdell, Adam Schnitzer, Kenneth Sandlin, Robert Miller, Karen Scarfone, et almbox.. 2013 b. Guide to attribute based access control (ABAC) definition and considerations (draft). NIST special publication Vol. 800, 162 (2013).Google ScholarGoogle Scholar
  9. V. C. Hu, D. R. Kuhn, and D. F. Ferraiolo. 2015. Attribute-Based Access Control. Computer Vol. 48, 2 (Feb. 2015), 85--88. 0018--9162Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Xiaolong Jin, Benjamin W. Wah, Xueqi Cheng, and Yuanzhuo Wang. 2015. Significance and Challenges of Big Data Research. Big Data Research (2015). 2214--5796 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jonathan Katz, Amit Sahai, and Brent Waters. 2013. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Journal of cryptology Vol. 26, 2 (2013), 191--224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Devdatta Kulkarni. 2013. A fine-grained access control model for key-value systems Proceedings of the third ACM conference on Data and application security and privacy. ACM, 161--164. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kristen LeFevre, Rakesh Agrawal, Vuk Ercegovac, Raghu Ramakrishnan, Yirong Xu, and David DeWitt. 2004. Limiting disclosure in hippocratic databases. In Proceedings of the Thirtieth international conference on Very large data bases-Volume 30. VLDB Endowment, 108--119. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jim J. Longstaff and Joanne Noble. 2016. Attribute Based Access Control for Big Data Applications by Query Modification Second IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2016, Oxford, United Kingdom, March 29 - April 1, 2016. 58--65.Google ScholarGoogle Scholar
  15. Viktor Mayer-Schönberger and Kenneth Cukier. 2013. Big data: A revolution that will transform how we live, work, and think. Houghton Mifflin Harcourt.Google ScholarGoogle Scholar
  16. Mohamed Nabeel and Elisa Bertino. 2014. Privacy preserving delegated access control in public clouds. IEEE Transactions on Knowledge and Data Engineering Vol. 26, 9 (2014), 2268--2280.Google ScholarGoogle ScholarCross RefCross Ref
  17. R. V. Nehme, H. S. Lim, and E. Bertino. 2010. FENCE: Continuous access control enforcement in dynamic data stream environments 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010). 940--943. 1063--6382 Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kian Win Ong, Yannis Papakonstantinou, and Romain Vernoux. 2014. The SQLGoogle ScholarGoogle Scholar
  19. unifying semi-structured query language, and an expressiveness benchmark of SQL-on-Hadoop, NoSQL and NewSQL databases. CoRR, abs/1405.3631 (2014).Google ScholarGoogle Scholar
  20. Aafaf Ouaddah, Hajar Mousannif, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Access control in the Internet of Things: Big challenges and new opportunities. Computer Networks Vol. 112 (2017), 237 -- 262. 1389--1286 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Federica Paci, Anna Squicciarini, and Nicola Zannone. 2018. Survey on Access Control for Community-Centered Collaborative Systems. ACM Comput. Surv. Vol. 51, 1, Article 6 (Jan. 2018), 38 pages. 0360-0300 Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Edelmira Pasarella and Jorge Lobo. 2017. A Datalog Framework for Modeling Relationship-based Access Control Policies Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, 91--102. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. 2004. Extending query rewriting techniques for fine-grained access control ACM SIGMOD 2004. 551--562. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Yossif Shalabi and Ehud Gudes. 2017. Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases Data and Applications Security and Privacy XXXI, Giovanni Livraga and Sencun Zhu (Eds.). Springer International Publishing, Cham, 3--19.Google ScholarGoogle Scholar
  25. H. Ulusoy, P. Colombo, E. Ferrari, M. Kantarcioglu, and E. Pattuk. 2015. GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems ACM ASIACCS 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Huseyin Ulusoy, Murat Kantarcioglu, Kevin Hamlen, and Erman Pattuk. 2014. Vigiles: Fine-grained Access Control for MapReduce Systems IEEE BigData. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jos B Warmer and Anneke G Kleppe. 1998. The object constraint language: Precise modeling with uml (addison-wesley object technology series). (1998). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Access Control in the Era of Big Data: State of the Art and Research Directions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
      June 2018
      271 pages
      ISBN:9781450356664
      DOI:10.1145/3205977
      • General Chair:
      • Elisa Bertino,
      • Program Chairs:
      • Dan Lin,
      • Jorge Lobo

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 June 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SACMAT '18 Paper Acceptance Rate14of50submissions,28%Overall Acceptance Rate177of597submissions,30%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader