大数据访问控制综述
The Overview of Big Data Access Control
DOI: 10.12677/CSA.2022.121013, PDF,   
作者: 薛 涛:中国科学院大学网络空间安全学院,北京;中国科学院信息工程研究所,北京;文 雨:中国科学院信息工程研究所,北京
关键词: 大数据访问控制数据保护Big Data Access Control Data Protection
摘要: 当今大数据时代,数据存储系统、大数据计算平台发展迅速,而访问控制作为保护数据的基础能力没有得到充分的考虑。首先,本文概括出大数据计算平台数据处理流程,并总结出其中的访问控制需求;然后按照访问控制需求综述并分析相应的访问控制技术。最后对未来访问控制技术的发展进行了展望。
Abstract: Nowadays, in the era of big data, data storage system and big data computing platform are devel-oping rapidly, but access control as the basic capability of data protection has not been fully considered. First, this paper summarizes the process of data processing in big data computing platform, and summarizes the corresponding access control requirements; then, according to those requirements, it summarizes and analyzes the corresponding access control technologies. Finally, the future development of access control technology is prospected.
文章引用:薛涛, 文雨. 大数据访问控制综述[J]. 计算机科学与应用, 2022, 12(1): 114-122. https://doi.org/10.12677/CSA.2022.121013

参考文献

[1] 维克托•迈尔-舍恩伯格, 肯尼思•库克耶. 大数据时代: 生活, 工作与思维的大变革[M]. 杭州: 浙江人民出版社, 2013.
[2] Nazari, E., Shahriari, M.H. and Tabesh, H. (2019) BigData Analysis in Healthcare: Apache Hadoop, Apache Spark and Apache Flink. Frontiers in Health Informatics, 8, e14. [Google Scholar] [CrossRef
[3] Xue, T., Wen, Y., Luo, B., Zhang, B.Y., Zheng, Y., Hu, Y.F., Li, Y.J. and Li, G. (2020) GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC’20: Annual Computer Security Applications Conference, Austin, 7-11 December 2020, 582-596. [Google Scholar] [CrossRef
[4] Colombo, P. and Ferrari, E. (2019) Access Control Technologies for Big Data Management Systems: Literature Review and Future Trends. Cybersecurity, 2, Article No. 3. [Google Scholar] [CrossRef
[5] Kleppmann, M. (2017) Designing Data-Intensive Applications: The Big Ideas behind Reliable, Scalable, and Maintainable Systems. O’Reilly Media, Inc., Sebastopol.
[6] Chambers, B. and Zaharia, M. (2017) Spark: The Definitive Guide: Big Data Processing Made Simple. O’Reilly Media, Inc., Se-bastopol.
[7] Goel, K. and Hofstede, A.H.M.T. (2021) Privacy-Breaching Patterns in NoSQL Databases. IEEE Access, 9, 35229-35239. [Google Scholar] [CrossRef
[8] Gupta, E., et al. (2021) Attribute-Based Access Control for NoSQL Databases. Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, 26-28 April 2021, 317-319. [Google Scholar] [CrossRef] [PubMed]
[9] Alotaibi, A.A., Alotaibi, R.M. and Hamza, N. (2019) Access Control Models in NoSQL Databases: An Overview. Journal of King Abdulaziz University: Computing and Information Technology Sciences, 8, 1-9. [Google Scholar] [CrossRef
[10] Sun, Z.H. and Huo, Y.X. (2021) The Spectrum of Big Data Analytics. Journal of Computer Information Systems, 61, 154-162. [Google Scholar] [CrossRef
[11] 王珊, 萨师煊. 数据库系统概论(第4版) [M]. 北京: 高等教育出版社, 2006.
[12] Elmasri, R. and Navathe, S.B. (2021) Fundamentals of Database System. Global Edition, Pearson, London.
[13] Balusamy, B., Abirami, R.N., Kadry, S. and Gandomi, A.H. (2021) NoSQL Database. In: Big Data: Concepts, Technology, and Architecture, John Wiley & Sons, Hoboken, 53-81. [Google Scholar] [CrossRef
[14] Kulkarni, D. (2013) A Fine-Grained Access Control Model for Key-Value Systems. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, 18-20 February 2013, 161-164. [Google Scholar] [CrossRef
[15] Shalabi, Y. and Gudes, E. (2017) Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 3-19. [Google Scholar] [CrossRef
[16] Huang, L., Zhu, Y., Wang, X., et al. (2019) An Attrib-ute-Based Fine-Grained Access Control Mechanism for HBase. In: Hartmann, S., et al., Eds., Database and Expert Systems Applications, Springer, Cham, 44-59. [Google Scholar] [CrossRef
[17] Colombo, P. and Ferrari, E. (2015) Enhancing MongoDB with Purpose-Based Access Control. IEEE Transactions on Dependable & Secure Computing, 14, 591-604.
[18] Colombo, P. and Ferrari, E. (2016) Towards Virtual Private NoSQL Datastores. 2016 IEEE 32nd International Conference on Data Engineering (ICDE), Helsinki, 16-20 May 2016, 193-204. [Google Scholar] [CrossRef
[19] Colombo, P. and Ferrari, E. (2017) Towards a Unifying At-tribute Based Access Control Approach for NoSQL Datastores. IEEE International Conference on Data Engineering, San Diego, 19-22 April 2017, 709-720. [Google Scholar] [CrossRef
[20] Begum, G., Huq, S.Z.U. and Siva Kumar, A.P. (2021) Security Features in Hadoop—A Survey. In: Saini, H.S., Sayal, R., Govardhan, A. and Buyya, R., Eds., Innovations in Computer Science and Engineering, Springer, Singapore, 269-276. [Google Scholar] [CrossRef
[21] Gopalakrishnan, A.A., et al. (2021) HACS: Access Control for Streaming Data across Heterogeneous Communication Models. 2021 IEEE World AI IoT Congress (AIIoT), Seattle, 10-13 May 2021, 109-114. [Google Scholar] [CrossRef
[22] Awaysheh, F.M., et al. (2020) Next-Generation Big Data Federation Access Control: A Reference Model. Future Generation Computer Systems, 108, 726-741. [Google Scholar] [CrossRef
[23] Odugu, N.K. (2021) A Fine-Grained Access Control Survey for the Secure Big Data Access. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 4180-4186.
[24] Ulusoy, H., Colombo, P., Ferrari, E., Kantarcioglu, M. and Pattuk, E. (2015) GuardMR: Fine-Grained Security Policy Enforcement for MapReduce Systems. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, 14 April-17 March 2015, 285-296. [Google Scholar] [CrossRef
[25] Preuveneers, D. and Joosen, W. (2015) SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. 2015 International Conference on Intelligent Environments, Prague, 15-17 July 2015, 96-103. [Google Scholar] [CrossRef
[26] Introducing Row/Column Level Access Control for Apache Spark.
https://blog.cloudera.com/row-column-level-control-apache-spark/
[27] Databricks (2021) Data Governance Model.
https://docs.databricks.com/security/access-control/table-acls/object-privileges.html
[28] Ashwin Kumar, T.K., et al. (2017) Content Sensitivity Based Access Control Framework for Hadoop. Digital Communications and Networks, 3, 213-225. [Google Scholar] [CrossRef
[29] Idar, H.A., et al. (2018) Dynamic Data Sensitivity Access Control in Hadoop Platform. 2018 IEEE 5th International Congress on Information Science and Technology, Marrakech, 21-27 October 2018, 105-109. [Google Scholar] [CrossRef
[30] Ait Idar, H., Belhadaoui, H. and Filali, R. (2021) A Conceptual Model for Dynamic Access Control in Hadoop Ecosystem. In: Saeed F., et al., Eds., Advances on Smart and Soft Computing, Springer, Singapore, 421-430. [Google Scholar] [CrossRef
[31] Yang, M. (2020) TDACS: An ABAC and Trust-Based Dy-namic Access Control Scheme in Hadoop.
https://arxiv.org/abs/2011.07895
[32] Gupta, M., Patwa, F. and Sandhu, R. (2017) POSTER: Access Control Model for the Hadoop Ecosystem. Proceedings of the 22nd ACM on Symposium on Access Control Models and Tech-nologies, Indianapolis, 21-23 June 2017, 125-127. [Google Scholar] [CrossRef
[33] Gupta, M., Patwa, F. and Sandhu, R. (2017) Object-Tagged RBAC Model for the Hadoop Ecosystem. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 63-81. [Google Scholar] [CrossRef
[34] Gupta, M., Patwa, F. and Sandhu, R. (2018) An Attrib-ute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. Proceedings of the Third ACM Workshop on Attribute-Based Access Control, Tempe, 21 March 2018, 13-24. [Google Scholar] [CrossRef
[35] Chen, C.W., Elsayed, M.A. and Zulkernine, M. (2020) HBD-Authority: Streaming Access Control Model for Hadoop. 2020 IEEE 6th International Conference on Dependa-bility in Sensor, Cloud and Big Data Systems and Application, Nadi, 14-16 December 2020, 16-25. [Google Scholar] [CrossRef
[36] Anisetti, M., et al. (2021) Dynamic and Scalable En-forcement of Access Control Policies for Big Data. Proceedings of the 13th International Conference on Management of Digital Ecosystems, Virtual Event, 1-3 November 2021, 71-78. [Google Scholar] [CrossRef
[37] Alsulbi, K., Khemakhem, M., Basuhail, A., et al. (2021) Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives. International Journal of Computer Science and Network Security, 21, 43-55.
[38] Deepa, N., et al. (2020) A Survey on Blockchain for Big Data: Ap-proaches, Opportunities, and Future Directions.
https://arxiv.org/abs/2009.00858
[39] Alsulbi, K.A., et al. (2021) A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent. Symmetry, 13, Article No. 1990. [Google Scholar] [CrossRef
[40] Ding, Y., et al. (2020) Blockchain-Based Access Control Mechanism of Federated Data Sharing System. IEEE International Conference on Parallel & Distributed Processing with Applica-tions, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Exeter, 17-19 December 2020, 277-284. [Google Scholar] [CrossRef
[41] Kumar, R., Palanisamy, B. and Sural, S. (2021) BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service. 2021 IEEE Inter-national Conference on Blockchain and Cryptocurrency, Sydney, 3-6 May 2021, 1-3. [Google Scholar] [CrossRef