Data protection in heterogeneous big data systems

被引:1
作者
Poltavtseva, M. A. [1 ]
Aleksandrova, E. B. [1 ]
Shmatov, V. S. [1 ]
Zegzhda, P. D. [1 ]
机构
[1] Peter Great St Petersburg Polytech Univ, Inst Cyber Secur & Informat Protect, St Petersburg, Russia
关键词
Big data; Security; Integrity; Audit; Distributed ledger; BlockChain; STORAGE;
D O I
10.1007/s11416-023-00472-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Big Data systems are notable for their scale and, often, their distributed organization. A feature of a number of Big Data systems is the use of heterogeneous data processing tools. These are different DBMS and streaming processing tools with different data granularity. The input information may be repeatedly fragmented and re-grouped as it moves between storage locations. In this case, the problems of data integrity, access control and auditing cannot be solved by traditional methods. This paper considers the security of heterogeneous Big Data systems based on distributed ledger technologies and verifiable zero-knowledge operations.
引用
收藏
页码:451 / 458
页数:8
相关论文
共 39 条
  • [1] Ahmad K., 2019, RECENT PATENTS ENG, V13, P5, DOI 10.2174/1872212112666180731114714
  • [2] Aleksandrova E.B., 2021, SPRINGER CCIS VOLUME
  • [3] [Anonymous], COST DAT BREACH REP
  • [4] SecSVA: Secure Storage, Verification, and Auditing of Big Data in the Cloud Environment
    Aujla, Gagangeet Singh
    Chaudhary, Rajat
    Kumar, Neeraj
    Das, Ashok Kumar
    Rodrigues, Joel J. P. C.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 78 - 85
  • [5] Baird L., 2016, Swirlds Tech Report Swirlds-Tr-2016-01, P1
  • [6] Bertoni G., 2011, THE KECCAK REFERENCE
  • [7] A Smart-Farming Ontology for Attribute Based Access Control
    Chukkapalli, Sai Sree Laya
    Piplai, Aritran
    Mittal, Sudip
    Gupta, Maanak
    Joshi, Anupam
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 29 - 34
  • [8] Dinesh G., 2021, RECENT ADV COMPUT SC, V14, P1506, DOI [10.2174/266625581405210129162256, DOI 10.2174/266625581405210129162256]
  • [9] Dworkin M., 2015, SHA 3 STANDARD PERMU, DOI [10.6028/NIST.FIPS.202, DOI 10.6028/NIST.FIPS.202]
  • [10] The secure Three-Tier Architecture pattern
    Fernandez, Eduardo B.
    Fonoage, Mihai
    VanHilst, Michael
    Marta, Mirela
    [J]. CISIS 2008: THE SECOND INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, PROCEEDINGS, 2008, : 555 - 560