Access Control Technology With Big Data
Access Control Technology With Big Data
Azhar Abdulmughni
Department of IT , Faculty of Computer and information technology, University of Sana'a
December, 2023
Abstract ___ In the era of big data, the rapid generation of delivery to authorized users to prevent denial of service.
large amounts of data from various sources poses a challenge [2] [3]
for access control. To address the needs of end users, Cloud computing is provided by specific providers
mechanisms for access control must be established to share like Amazon, Google, Salesforce.com through the
confidential information with authorized users. Currently, the internet. The front end is a new interface service, while
main concern in cloud computing is the security of access storage and maintenance are based on the terms of service
control, with ongoing research and implementation focused on providers. The front end and back end of cloud computing
ensuring secure and reliable file transfers. Existing solutions can be accessed globally through internet connection.
based on role, attribute, identification, and hierarchical access Data in the cloud is viewable and accessible through an
controls are insufficient to instill trust in cloud computing interface, with protection provided for confidential data.
servers. Therefore, future efforts should aim to implement a Access control is based on users and data, categorized into
trusted model for securing stored files. The emergence of public, private, and hybrid data. Private data includes
access control technology adds a barrier to the access of data confidential information and requires access control,
resources, avoids some illegal users' access to resources, and while public data does not. Hybrid data may contain a
reduces the problem of resource leakage to a certain extent. combination of data types, necessitating security
This paper classifies some access control technologies in the measures [3]
field of big data access control, including discretionary access The term Big Data means analyzing large amounts of
control technology, role-based access control technology, data with different formats, allowing for fast predictions
attribution-based access control technology, blockchain-based with low uncertainties and high value. [3] there are three
access control technology, etc. Then it summarizes the characteristics that define the nature of big data witch
application characteristics of access control technology in the called 3Vs: Volume, Variety, and Velocity.
field of big data, and finally looks forward to the development
-Volume referred to the vast amount of information
prospect of access control.
that is generated and collected from various sources such
Keywords: access control, Big data, Cloud computing, as social media and connected devices. For instance ,
Security social media platforms like YouTube and Twitter have an
I. Introduction extensive user base that produces a large amount of data
every second.
Cloud computing is a type of computing framework
that offers on-demand services using shared - Variety, encompasses the diverse types of data being
computational resources. These services have made our gathered, including text, sound, film, and sensor data.
lives more convenient, as they can convert resource- This data can be either structured or unstructured, posing
constrained mobile devices into powerful computers. challenges in terms of processing and analysis.
However, while cloud services have many benefits such -velocity denotes the speed at which data is being
as scalability and cost savings, there are also drawbacks generated and collected, making real-time processing and
in terms of centralization and security. It is important to analysis a complex task. This is especially significant for
address these security concerns, particularly unauthorized data used in time-sensitive decision-making processes
access to sensitive data, in order to fully realize the such as financial transactions and traffic management. [4]
potential of cloud computing.
Access control technology aims to prevent
Security for access control is the main concern in unauthorized users from intruding or destroying data,
cloud. Latest research and implementations in Cloud limiting access to protect user data. The main functions of
focus on secure file transfers. Existing solutions employ access control security are preventing unauthorized access
role, attribute, identification, and hierarchical access and allowing legal users to access and operate data. Data
controls. Encryption can prevent unauthorized access to access control in big data and cloud computing prevents
sensitive data. Challenges exist in practical illegal access, controls user access authority, and protects
implementation. Differentiated access is necessary based data integrity and confidentiality. [5]
on user roles. Data access control has evolved over the
past 30 years. Techniques like fine-grained access control first part of this paper a literature review of related
offer flexibility. Research is needed to address researches in the field of access control technologies with
vulnerability gaps. This paper discusses cloud storage and big data and cloud computing to illustrate the most
access control schemes. Three emerging fine-grained common models that been used and the advancing of
access control techniques are reviewed... [2] these models to overcome the increasing challenges of big
data security ,
Cloud service providers use different access control
models to achieve several objectives, including In the second part we discuss the major issues and
maintaining data confidentiality, integrity, and privacy, challenges that are facing the security of big data in cloud
preventing unauthorized access, and ensuring correct data computing environment including Access control as a
challenge , the third part introduces the platform and
2- Context – management :The support for context- 1- Discretionary Access Control Model (DAC)
based access constraints allows for highly DAC is a basic access control model where the owner
customized access control forms. These constraints manages all object access, deciding which users can
can limit access based on time periods or access and to what extent. The owner has full control,
geographical locations. When access control granting access privileges to users as desired. The aim is
decisions are derived from contexts, authorizations to prevent unauthorized access through Access Control
are granted if conditions referring to the Lists (ACL) for each object .DAC offers flexibility by
environment of the access request are met. [3] allowing object owners to customize security
3- Scalability: The capability to monitor access mechanisms, with easily updatable policies. It simplifies
control events and changes ensures transparency and usability and reduces administrative complexity in
accountability. Recording and analyzing access distributed environments. While efficient for a small
activities creates a detailed audit trail. Auditability number of users and data, DAC is easier to manage than
aids in identifying unauthorized access attempts and other access controls and is widely used in networking
operating systems like UNIX, WINDOWS, and Linux. attributes, and a user's private key is associated with a set
However, DAC has limitations in modern computing of attributes that they possess. To decrypt the data, the
environments due to increasing security requirements and user's private key must match the attributes associated
access control complexity. It may fail to protect shared with the encrypted data. ABE provides fine-grained
resources in high communication scenarios, potentially access control, allowing different users to access different
compromising data confidentiality, integrity, and parts of the encrypted data based on their attributes. This
availability if a mistake is made. Additionally, the makes ABE particularly useful in scenarios where access
requirement for an owner in DAC may not align with control needs to be flexible and dynamic, such as in
contemporary computing technologies, leading to lower supply chain management systems. [9]
security levels compared to other access controls.
Moreover, DAC is stateless, lacking awareness of events
post-permission granting. [2]
2- Role Based Access Control (RBAC)
is an access control model that provides a structured
approach to managing user permissions within an
organization. In RBAC, access rights are assigned to
roles, and users are assigned to specific roles based on
their job responsibilities and functions. This model
simplifies access management by allowing
administrators to define roles and their associated
permissions, rather than assigning permissions directly Figure 2 attribute encryption access control [5]
to individual users. RBAC offers several benefits, 6- Blockchain access control:
including improved security, scalability, and ease of
Blockchain-based access control uses blockchain tech
administration. It helps organizations enforce the
for managing access rights to resources. Access
principle of least privilege, where users are granted only
permissions are on a distributed ledger for transparency.
the permissions necessary to perform their tasks. RBAC
has been widely adopted in various domains, including Smart contracts on the blockchain enforce access policies.
cloud computing, where it plays a crucial role in ensuring Blockchain's decentralization enhances security and
secure access control for big data analytics in the cloud privacy. Access events are recorded on the blockchain for
environment [10] auditability. [12]The blockchain efficiently transfers
information between parties. A block is created by one
3- Attribute-based access control (ABAC) party in a transaction. Many computers verify the block
before it is added to a chain. Falsifying a record in the
The overall approach for ABAC is defined in the chain is extremely difficult. Bitcoin uses this system for
National Institute of Standards Special Publication (NIST transactions. The blockchain is maintained by a peer-to-
SP) 800-162 as the ABAC trust chain [5] method that peer network of interconnected nodes. Each node
enables organizations to regulate data access by processes input to produce an output. The network divides
considering the attributes of the user, such as their job work among equally privileged peers. The finance
title, location, or clearance level. By employing this industry has been transformed by combining a peer-to-
approach, organizations can establish precise access peer network with a payment system. [7]
controls that are customized to particular data sets or
specific use cases. [3] VI. Comparison between access control
4- Multi-factor authentication (MFA) models
necessitates users to provide multiple forms of
authentication, such as a password and a fingerprint or a The DAC model, being the most simplistic, entails
token, in order to access data. This enhances the difficulty access control by the owner for operations such as
for cybercriminals to obtain unauthorized access to reading, writing, and modifying. Unsuitable for big data
sensitive data. [3] In the setting of big data cloud contexts due to limitations in scalability and lack of fine-
computing, access frequency is high, with multiple grained control in intricate environments with numerous
tenants accessing data resources simultaneously. To users and data elements. So that’s make it not suitable for
prevent access control failure, different applications and big data and cloud computing environment
computing resources are limited, involving multi-user
access control technology. Integration of RBAC model RBAC, known for its efficiency in managing access
and multi-tenant access technology enhances access based on well-defined user roles and their associated
control in big data cloud computing, forming a needs, is considered appropriate. It is particularly well-
management system to improve tenants' access control suited for big data scenarios featuring structured roles,
over data. [5] offering efficient management of access in systems with
a high volume of users.
5- Attribute based Encryption Access Control
ABAC relies on dynamic attributes related to the user,
Attribute-based encryption (ABE) is a cryptographic data, and environment to make access decisions.
technique that allows access to encrypted data based on Designed for complex big data landscapes, this model
specific attributes or characteristics of the user. ABE uses provides detailed control based on multiple factors,
a combination of public and private keys to encrypt and making it a suitable choice for environments with diverse
decrypt data. [9]In ABE, data is encrypted with a set of
DAC RBAC ABAC ABE Blockchain
Conclusion