This paper discusses one of the most significant challenges of next-generation big data (BD) federation platforms, namely, Hadoop access control. Privacy and security on a federation scale remain significant concerns among practitioners.Apache Hadoop [1], the BD landmark, has become a large-scale data analytics operating system. The large community behind Hadoop has been working to improve its stack to meet the increasing demands and requirements of BD.Enterprises across all major industries have adopted Hadoop due to its capability to store and process an abundance of new types of data and leverage modern data architecture. With a broad spectrum of both structured and unstructured workloads, Hadoop abstracts the computing resource management, task scheduling, and data management, while maintaining a satisfactory level of security and isolation.The Hadoop distributed file system (HDFS) [2] is typically deployed as part of a large-scale Hadoop platform to support commodity hardware and accommodate different processing frameworks. It is utilized to handle data management and access to the Hadoop ecosystem using a master/slave architecture. It is also successfully employed by several distributed systems and can be used by different resource schedulers as a data storage system, e.g., HTCondor [3] and Spark [4]. IAM in the HDFS ecosystem can be defined as the set of tools and mechanisms that enables end users and applications to interact securely with system core functionalities, thus ensuring appropriate access to data across the cluster. This security discipline can be separated into three abstraction layers: identification and access control, authentication, and authorization.As more services and users have joined the Hadoop federation portfolio in pursuit of a scalable BD hub, access control has become increasingly critical.One of the main obstacles in the development of an adaptive access control solution for BD platforms is the lack of a standard model to which access control rules and the associated enforcement monitor can be bound. A recent study [5] indicates that BD, as an emerging research trend, lacks standardized models