Skip to main content

Knowledge Based Access Control a Model for Security and Privacy in the Big Data

  • Conference paper
  • First Online:
  • 1030 Accesses

Abstract

The most popular features of Big Data revolve around the so-called “3 V” criterion: Volume, Variety and Velocity. Big Data is based on the massive collection and in-depth analysis of personal data, with a view to profiling, or even marketing and commercialization, thus violating citizens’ privacy and the security of their data. In this article we discuss security and privacy solutions in the context of Big Data. We then focus on access control and present our new model called Knowledge-based Access Control (KBAC); this strengthens the access control already deployed in the target company (e.g., based on “RBAC” role or “ABAC” attributes for example) by adding a semantic access control layer. KBAC offers thinner access control, tailored to Big Data, with effective protection against intrusion attempts and unauthorized data inferences.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Spiller, K., Ball, K., Bandara, A., Meadows, M., McCormick, C., Nuseibeh B.: Data privacy: users’ thoughts on quantified self personal data (October 2017)

    Google Scholar 

  2. Porambage, P., Ylianttila, M., Schmitt, C., Kumar, P., Gurtov, A., Vasilakos, A.V.: The quest for privacy in the internet of things. IEEE Cloud Comput. (2016)

    Google Scholar 

  3. Jain, P., Gyanchandani, M., Khare N.: Big Data privacy: a technological perspective and review. J. Big Data (2016)

    Google Scholar 

  4. Xu, L., Jiang, C., Wang, J., Yuan, J., Ren Y.: Information security in Big Data: privacy and data mining. IEEE Access (2014)

    Google Scholar 

  5. Debatin, B., Jennette P. Lovejoy, Ann-Kathrin Horn M.A., Brittany N. Hughes Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput.-Mediat. Commun. (2009)

    Google Scholar 

  6. Cheng, H., Rong, C., Hwang, K., Wang, W., Li, Y.: Secure Big Data storage and sharing scheme for cloud tenants. China Commun. 12(6), 106–115 (2015)

    Article  Google Scholar 

  7. Mell, P., Grance, T.: The NIST definition of cloud computing. Natl. Inst. Stand. Technol. 53(6), 50 (2009)

    Google Scholar 

  8. Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y., Vasilakos, A.V.: Security and privacy for storage and computation in cloud computing. Inf. Sci. (2014)

    Google Scholar 

  9. Xiao, Z., Xiao, Y.: Security and privacy in cloud computing. In: IEEE Trans on Communications Surveys and Tutorials, pp. 843–859 (2013)

    Article  Google Scholar 

  10. Fugkeaw, S., Sato, H.: Privacy-preserving access control model for Big Data cloud. In: Computer Science and Engineering Conference (ICSEC), 2015

    Google Scholar 

  11. Pasquier, I., Abou El Kalam, A., Ait Ouahman, A., Demontfort, M.: SmartOrBAC A new access control model for internet of things. In: The 14th International Conference on Cryptology and Network Security (CANS 2015) 10–12 Dec 2015, Morocco, Marrakesh, Lecture Notes in Computer Science (LNCS), Springer

    Google Scholar 

  12. Frikken, K., Atallah, M., Jiangtao, F.: Attribute based access control. IEEE Trans. Comput. 55(10), (2006)

    Article  Google Scholar 

  13. Zeng, W., Yang, Y., Luo B.: Content-based access control: use data content to assist access control for large-scale content-centric databases. In: IEEE International Conference on Big Data (2014)

    Google Scholar 

  14. Zeng, W., Yang, Y., Luo, B.: Access control for Big Data using data content. In: IEEE International Conference on Big Data (2013)

    Google Scholar 

  15. Roy, S., Chuah M.: Secure data retrieval based on ciphertext policy attribute-based encryption (CP-ABE) System for the DTNs (2009)

    Google Scholar 

  16. Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., Guo, S.: Protection of Big Data privacy. In: IEEE Translations and Content Mining are Permitted for Academic Research (2016)

    Google Scholar 

  17. Lu, R., Zhu, H., Liu, X., Liu, J.K., Shao, J.: Toward efficient and privacy preserving computing in Big Data era. In: IEEE Network (2014)

    Google Scholar 

  18. Hongbing, C., Chunming, R., Kai, H., Weihong, W., Yanyan L.: Secure Big Data storage and sharing scheme for cloud tenants. China Commun. (2015)

    Google Scholar 

  19. Xu, K., et al.: Privacy-preserving machine learning algorithms for Big Data systems. In: IEEE 35th International Conference Distributed Computing Systems (ICDCS) (2015)

    Google Scholar 

  20. Zhang, Y., Cao, T., Li, S., Tian, X., Yuan, L., Jia, H., Vasilakos, A.V.: Parallel processing systems for Big Data: a survey. In: Proceedings of the IEEE (2016)

    Google Scholar 

  21. Jain, P., Pathak, N., Tapashetti, P., Umesh, A.S.: Privacy preserving processing of data decision tree based on sample selection and singular value decomposition. In: 39th International, Conference on Information Assurance and Security (lAS) (2013)

    Google Scholar 

  22. Benjamin, C.M., Simon, K.W., Philip, S.: Privacy-preserving data publishing: a survey of recent developments (2014)

    Google Scholar 

  23. Unger, N., Goldberg I.: Improved strongly deniable authenticated key exchanges for secure messaging (2018)

    Article  Google Scholar 

  24. Xindong, W., Xingquan, Z., Gong-Qing, W., Ding, W.: Data mining with Big Data. IEEE Trans. Knowl. Data Eng. 97–107 (2014)

    Google Scholar 

  25. Senicar, V., Jerman-Blazic, B., Klobucar, T.: Privacy-enhancing technologies—approaches and development. Comput. Standar. Interfaces 25(2), 147–158 (2003)

    Article  Google Scholar 

  26. Bougouin, A., «État de l’art des méthodes d’extraction automatique de termes-clés» (2013)

    Google Scholar 

  27. Mothe, J., Ramiandrisoa, F.: «Extraction automatique de termes-clés :Comparaison de méthodes non supervisées» (2017)

    Google Scholar 

  28. Juanzi, L., Qi’na, F., Kuo, Z.: «Keyword extraction based on tf/idf for Chinese news document»; Wuhan Univ. J. Nat. Sci. (2007)

    Google Scholar 

  29. Slimani, T., Ben Yaghlane, B., Mellouli, K.: «Une extension de mesure de similarité entre les concepts d’une ontologie» In: SETIT 2007 4rth International Conference: Sciences of Electronic, Technologies of Information and Telecommunications (March 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lamia El Haourani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Haourani, L., Abou El Kalam, A., Ait Ouahman, A. (2019). Knowledge Based Access Control a Model for Security and Privacy in the Big Data. In: Ben Ahmed, M., Boudhir, A., Younes, A. (eds) Innovations in Smart Cities Applications Edition 2. SCA 2018. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham. https://doi.org/10.1007/978-3-030-11196-0_60

Download citation

Publish with us

Policies and ethics