Abstract

Information security is defined as preventing actions such as unauthorized access and use, modification, and removal of information. It consists of certain basic elements of confidentiality, integrity, and accessibility. There are numerous studies in published literature which have been conducted to ensure information security. However, there is no previous study that covers these three basic elements together. In the present study, a model that includes these three key elements of information security together for big data was proposed and implemented. With this proposed “single-label model,” a more practical and flexible structure was established for all operations (read, write, update, and delete) performed on a database on real data. In previous studies conducted with a label model, separate labels were used for read-only or write-only operations, and there was no structure that could ensure both confidentiality and integrity at the same time. The present study, however, shows what type of authorization and access control could be established between which processes and which users by looking at a single label for all the operations performed on the data. Thus, in contrast to the previous studies seen in published literature, data confidentiality, data integrity, and data consistency were all guaranteed for all transactions. The results of the proposed single-label model were also shown comparatively by conducting an experimental study of its application. The results obtained are promising for further studies.

Highlights

  • Information security is defined as preventing actions such as unauthorized access and use, modification, and removal of information, and it consists of certain basic elements including confidentiality, integrity, and accessibility [1, 2]

  • Confidentiality is the protection of information against being accessed, read, or used by unauthorized persons in any way

  • A single-label model is created. e scientific contribution of this model is that while the data available to be used by the stakeholders can only be used by authorized actors, it does not allow the use of these data by unauthorized third-party actors. This model contributes to the research of methods that enable the use of jointly used resources without causing information leakage. erefore, in this study, we describe a distributed label model that can maintain data confidentiality with information flow control in distributed databases

Read more

Summary

Introduction

Information security is defined as preventing actions such as unauthorized access and use, modification, and removal of information, and it consists of certain basic elements including confidentiality, integrity, and accessibility [1, 2]. There are many measures taken to protect systems from such harmful threats that are supported by advanced technologies, it has been seen that attackers can still often succeed In these and similar cases, any incident that causes a violation of any of the three basic elements of information security (confidentiality, integrity, and accessibility) is considered to be a security problem [4]. A model was created to provide the three basic elements of information security together by using real data In this way, no user or group of users would be able to access data that is not authorized at their level or data that they are not allowed to perform various operations on.

Related Works
Experimental Study
Evaluation and Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call