Dynamic and scalable enforcement of access control policies for big data

Marco Anisetti, Claudio A. Ardagna, Chiara Braghin, Ernesto Damiani, Antongiacomo Polimeno, Alessandro Balestrucci

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

14 Scopus citations

Abstract

The conflict between the need of protecting and sharing data is hampering the spread of big data applications. Security and privacy assurance is required to protect data owners, while data access and sharing are fundamental to implement smart big data solutions. In this context, access control systems can assume a central role in balancing data protection and data sharing. However, existing access control solutions are not general and scalable enough to address the software and technological complexity of big data ecosystems, being unable to support such a dynamic and collaborative environment. In this paper, we propose an access control system that enforces access to data in a distributed, multi-party big data environment. It is based on data annotations and secure data transformations performed at ingestion time. We show the feasibility of our approach in the smart city domain using an Apache-based big data engine.

Original languageBritish English
Title of host publicationProceedings of 2021 13th International Conference on Management of Digital EcoSystems, MEDES 2021
Pages71-78
Number of pages8
ISBN (Electronic)9781450383141
DOIs
StatePublished - 1 Nov 2021
Event13th International Conference on Management of Digital EcoSystems, MEDES 2021 - Virtual, Online, Tunisia
Duration: 1 Nov 20213 Nov 2021

Publication series

NameACM International Conference Proceeding Series

Conference

Conference13th International Conference on Management of Digital EcoSystems, MEDES 2021
Country/TerritoryTunisia
CityVirtual, Online
Period1/11/213/11/21

Keywords

  • Access control
  • Big data
  • Data ingestion
  • Data transformation

Fingerprint

Dive into the research topics of 'Dynamic and scalable enforcement of access control policies for big data'. Together they form a unique fingerprint.

Cite this