Abstract

In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to an... | Find, read and cite all the research you need on Tech Science Press

Highlights

  • An article published by an on-line News [MeriTalk (2018)], stated that every two days, people produce about five-exabytes of data, which is almost all the data created until 2003

  • This work has the following contributions: 1) an overview of some of the latest (2014-2018) state-of-the-art literature dealing with security and privacy issues, and challenges for Big Data (BD) Access Control (AC) systems, 2) a study of the latest research solution frameworks to reduce privacy and security issues for AC BD systems, 3) an overview of possible improvements and extensions AC BD frameworks

  • This paper has the following contributions: 1) an overview of some of the latest (2014-2018) state-of-the-art literature dealing with security and privacy issues, and challenges for BD AC systems, 2) a study of the latest research solution frameworks to reduce privacy and security issues for AC BD systems, 3) an overview of possible improvements and extensions of the frameworks discussed in this paper

Read more

Summary

Introduction

An article published by an on-line News [MeriTalk (2018)], stated that every two days, people produce about five-exabytes of data, which is almost all the data created until 2003. CMC, vol., no.2, pp.361-374,2019 different structure and they mostly include network data sharing, videos, sensor data, computing-server log files. These data are created both statically and on the fly by people due to the sophisticated features of computing. Detecting a BD misappropriate and exploit when already has occurred, there are very high chances that nothing else can be done to protect user’s data, so an AC enforcement may have had already by-passed by malicious intruders These are still some of the main challenges in current AC BD frameworks since they don’t have good measurements to be installed to guarantee hacker’s attacks from miss appropriately accessing and manipulating user’s data. There is no such latest study that includes all the three contributions mentioned above, but rather they discuss mostly older AC BD frameworks, without analyzing some of the frameworks’ restrictions and their future directions

Security and privacy challenges in access control big data
Frameworks for access control big data
Findings
Summary and future directions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call