2019
DOI: 10.32604/cmc.2019.06223
|View full text |Cite
|
Sign up to set email alerts
|

Security and Privacy Frameworks for Access Control Big Data Systems

Abstract: In the security and privacy fields, Access Control (AC) systems are viewed as the fundamental aspects of networking security mechanisms. Enforcing AC becomes even more challenging when researchers and data analysts have to analyze complex and distributed Big Data (BD) processing cluster frameworks, which are adopted to manage yottabyte of unstructured sensitive data. For instance, Big Data systems' privacy and security restrictions are most likely to failure due to the malformed AC policy configurations. Furth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…However, data management in 5G is more complicated than in earlier wireless networks, as connected devices may be more diverse in type, their number is expected to grow very high, and the data they generate is both more voluminous and more distributed logically and geographically. As a result, data access control becomes much more complicated, and a number of novel attack surfaces and data leakage points are revealed [8], [9]. 5G security and privacy have been studied from a number of viewpoints [10].…”
Section: G To 6g: Evolution Of Security and Privacymentioning
confidence: 99%
“…However, data management in 5G is more complicated than in earlier wireless networks, as connected devices may be more diverse in type, their number is expected to grow very high, and the data they generate is both more voluminous and more distributed logically and geographically. As a result, data access control becomes much more complicated, and a number of novel attack surfaces and data leakage points are revealed [8], [9]. 5G security and privacy have been studied from a number of viewpoints [10].…”
Section: G To 6g: Evolution Of Security and Privacymentioning
confidence: 99%
“…With the rapid development of digital communication technology, especially in today's increasingly popular smart phones and network communication, more and more people are demanding security for private information [1][2][3][4][5]. Cryptography has been commonly used for fast transmission of information and data and can meet the privacy information security requirements.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of computer technology and communication technology, information has become an important resource in today's society, and the information security issues caused by it have become increasingly prominent [1][2][3][4][5]. In order to ensure the security of information, cryptographic technology is applied to information systems to achieve the confidentiality, integrity, availability, controllability, and nonrepudiation of information [6][7][8][9]. Random numbers (RNs) play an extremely important role in cryptography, such as generating parameters for public key cryptosystems (such as ECC and RSA), generating keys for symmetric cryptosystems (such as DES and 3DES), numerous cryptographic protocols, digital signatures, and identity authentication which need to use RNs.…”
Section: Introductionmentioning
confidence: 99%