[1]
|
维克托•迈尔-舍恩伯格, 肯尼思•库克耶. 大数据时代: 生活, 工作与思维的大变革[M]. 杭州: 浙江人民出版社, 2013.
|
[2]
|
Nazari, E., Shahriari, M.H. and Tabesh, H. (2019) BigData Analysis in Healthcare: Apache Hadoop, Apache Spark and Apache Flink. Frontiers in Health Informatics, 8, e14. https://doi.org/10.30699/fhi.v8i1.180
|
[3]
|
Xue, T., Wen, Y., Luo, B., Zhang, B.Y., Zheng, Y., Hu, Y.F., Li, Y.J. and Li, G. (2020) GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC’20: Annual Computer Security Applications Conference, Austin, 7-11 December 2020, 582-596. https://doi.org/10.1145/3427228.3427640
|
[4]
|
Colombo, P. and Ferrari, E. (2019) Access Control Technologies for Big Data Management Systems: Literature Review and Future Trends. Cybersecurity, 2, Article No. 3. https://doi.org/10.1186/s42400-018-0020-9
|
[5]
|
Kleppmann, M. (2017) Designing Data-Intensive Applications: The Big Ideas behind Reliable, Scalable, and Maintainable Systems. O’Reilly Media, Inc., Sebastopol.
|
[6]
|
Chambers, B. and Zaharia, M. (2017) Spark: The Definitive Guide: Big Data Processing Made Simple. O’Reilly Media, Inc., Se-bastopol.
|
[7]
|
Goel, K. and Hofstede, A.H.M.T. (2021) Privacy-Breaching Patterns in NoSQL Databases. IEEE Access, 9, 35229-35239.
https://doi.org/10.1109/ACCESS.2021.3062034
|
[8]
|
Gupta, E., et al. (2021) Attribute-Based Access Control for NoSQL Databases. Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, 26-28 April 2021, 317-319.
https://doi.org/10.1145/3422337.3450323
|
[9]
|
Alotaibi, A.A., Alotaibi, R.M. and Hamza, N. (2019) Access Control Models in NoSQL Databases: An Overview. Journal of King Abdulaziz University: Computing and Information Technology Sciences, 8, 1-9.
https://doi.org/10.4197/Comp.8-1.1
|
[10]
|
Sun, Z.H. and Huo, Y.X. (2021) The Spectrum of Big Data Analytics. Journal of Computer Information Systems, 61, 154-162. https://doi.org/10.1080/08874417.2019.1571456
|
[11]
|
王珊, 萨师煊. 数据库系统概论(第4版) [M]. 北京: 高等教育出版社, 2006.
|
[12]
|
Elmasri, R. and Navathe, S.B. (2021) Fundamentals of Database System. Global Edition, Pearson, London.
|
[13]
|
Balusamy, B., Abirami, R.N., Kadry, S. and Gandomi, A.H. (2021) NoSQL Database. In: Big Data: Concepts, Technology, and Architecture, John Wiley & Sons, Hoboken, 53-81. https://doi.org/10.1002/9781119701859.ch3
|
[14]
|
Kulkarni, D. (2013) A Fine-Grained Access Control Model for Key-Value Systems. Proceedings of the Third ACM Conference on Data and Application Security and Privacy, San Antonio, 18-20 February 2013, 161-164.
https://doi.org/10.1145/2435349.2435370
|
[15]
|
Shalabi, Y. and Gudes, E. (2017) Cryptographically Enforced Role-Based Access Control for NoSQL Distributed Databases. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 3-19.
https://doi.org/10.1007/978-3-319-61176-1_1
|
[16]
|
Huang, L., Zhu, Y., Wang, X., et al. (2019) An Attrib-ute-Based Fine-Grained Access Control Mechanism for HBase. In: Hartmann, S., et al., Eds., Database and Expert Systems Applications, Springer, Cham, 44-59.
https://doi.org/10.1007/978-3-030-27615-7_4
|
[17]
|
Colombo, P. and Ferrari, E. (2015) Enhancing MongoDB with Purpose-Based Access Control. IEEE Transactions on Dependable & Secure Computing, 14, 591-604.
|
[18]
|
Colombo, P. and Ferrari, E. (2016) Towards Virtual Private NoSQL Datastores. 2016 IEEE 32nd International Conference on Data Engineering (ICDE), Helsinki, 16-20 May 2016, 193-204.
https://doi.org/10.1109/ICDE.2016.7498240
|
[19]
|
Colombo, P. and Ferrari, E. (2017) Towards a Unifying At-tribute Based Access Control Approach for NoSQL Datastores. IEEE International Conference on Data Engineering, San Diego, 19-22 April 2017, 709-720.
https://doi.org/10.1109/ICDE.2017.123
|
[20]
|
Begum, G., Huq, S.Z.U. and Siva Kumar, A.P. (2021) Security Features in Hadoop—A Survey. In: Saini, H.S., Sayal, R., Govardhan, A. and Buyya, R., Eds., Innovations in Computer Science and Engineering, Springer, Singapore, 269-276. https://doi.org/10.1007/978-981-33-4543-0_29
|
[21]
|
Gopalakrishnan, A.A., et al. (2021) HACS: Access Control for Streaming Data across Heterogeneous Communication Models. 2021 IEEE World AI IoT Congress (AIIoT), Seattle, 10-13 May 2021, 109-114.
https://doi.org/10.1109/AIIoT52608.2021.9454185
|
[22]
|
Awaysheh, F.M., et al. (2020) Next-Generation Big Data Federation Access Control: A Reference Model. Future Generation Computer Systems, 108, 726-741. https://doi.org/10.1016/j.future.2020.02.052
|
[23]
|
Odugu, N.K. (2021) A Fine-Grained Access Control Survey for the Secure Big Data Access. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12, 4180-4186.
|
[24]
|
Ulusoy, H., Colombo, P., Ferrari, E., Kantarcioglu, M. and Pattuk, E. (2015) GuardMR: Fine-Grained Security Policy Enforcement for MapReduce Systems. Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, Singapore, 14 April-17 March 2015, 285-296. https://doi.org/10.1145/2714576.2714624
|
[25]
|
Preuveneers, D. and Joosen, W. (2015) SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. 2015 International Conference on Intelligent Environments, Prague, 15-17 July 2015, 96-103.
https://doi.org/10.1109/IE.2015.21
|
[26]
|
Introducing Row/Column Level Access Control for Apache Spark.
https://blog.cloudera.com/row-column-level-control-apache-spark/
|
[27]
|
Databricks (2021) Data Governance Model.
https://docs.databricks.com/security/access-control/table-acls/object-privileges.html
|
[28]
|
Ashwin Kumar, T.K., et al. (2017) Content Sensitivity Based Access Control Framework for Hadoop. Digital Communications and Networks, 3, 213-225. https://doi.org/10.1016/j.dcan.2017.07.007
|
[29]
|
Idar, H.A., et al. (2018) Dynamic Data Sensitivity Access Control in Hadoop Platform. 2018 IEEE 5th International Congress on Information Science and Technology, Marrakech, 21-27 October 2018, 105-109.
https://doi.org/10.1109/CIST.2018.8596381
|
[30]
|
Ait Idar, H., Belhadaoui, H. and Filali, R. (2021) A Conceptual Model for Dynamic Access Control in Hadoop Ecosystem. In: Saeed F., et al., Eds., Advances on Smart and Soft Computing, Springer, Singapore, 421-430.
https://doi.org/10.1007/978-981-15-6048-4_37
|
[31]
|
Yang, M. (2020) TDACS: An ABAC and Trust-Based Dy-namic Access Control Scheme in Hadoop.
https://arxiv.org/abs/2011.07895
|
[32]
|
Gupta, M., Patwa, F. and Sandhu, R. (2017) POSTER: Access Control Model for the Hadoop Ecosystem. Proceedings of the 22nd ACM on Symposium on Access Control Models and Tech-nologies, Indianapolis, 21-23 June 2017, 125-127.
https://doi.org/10.1145/3078861.3084164
|
[33]
|
Gupta, M., Patwa, F. and Sandhu, R. (2017) Object-Tagged RBAC Model for the Hadoop Ecosystem. In: Livraga, G. and Zhu, S., Eds., Data and Applications Security and Privacy XXXI, Springer, Cham, 63-81.
https://doi.org/10.1007/978-3-319-61176-1_4
|
[34]
|
Gupta, M., Patwa, F. and Sandhu, R. (2018) An Attrib-ute-Based Access Control Model for Secure Big Data Processing in Hadoop Ecosystem. Proceedings of the Third ACM Workshop on Attribute-Based Access Control, Tempe, 21 March 2018, 13-24. https://doi.org/10.1145/3180457.3180463
|
[35]
|
Chen, C.W., Elsayed, M.A. and Zulkernine, M. (2020) HBD-Authority: Streaming Access Control Model for Hadoop. 2020 IEEE 6th International Conference on Dependa-bility in Sensor, Cloud and Big Data Systems and Application, Nadi, 14-16 December 2020, 16-25. https://doi.org/10.1109/DependSys51298.2020.00012
|
[36]
|
Anisetti, M., et al. (2021) Dynamic and Scalable En-forcement of Access Control Policies for Big Data. Proceedings of the 13th International Conference on Management of Digital Ecosystems, Virtual Event, 1-3 November 2021, 71-78.
https://doi.org/10.1145/3444757.3485107
|
[37]
|
Alsulbi, K., Khemakhem, M., Basuhail, A., et al. (2021) Big Data Security and Privacy: A Taxonomy with Some HPC and Blockchain Perspectives. International Journal of Computer Science and Network Security, 21, 43-55.
|
[38]
|
Deepa, N., et al. (2020) A Survey on Blockchain for Big Data: Ap-proaches, Opportunities, and Future Directions.
https://arxiv.org/abs/2009.00858
|
[39]
|
Alsulbi, K.A., et al. (2021) A Proposed Framework for Secure Data Storage in a Big Data Environment Based on Blockchain and Mobile Agent. Symmetry, 13, Article No. 1990. https://doi.org/10.3390/sym13111990
|
[40]
|
Ding, Y., et al. (2020) Blockchain-Based Access Control Mechanism of Federated Data Sharing System. IEEE International Conference on Parallel & Distributed Processing with Applica-tions, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking, Exeter, 17-19 December 2020, 277-284.
https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom51426.2020.00060
|
[41]
|
Kumar, R., Palanisamy, B. and Sural, S. (2021) BEAAS: Blockchain Enabled Attribute-Based Access Control as a Service. 2021 IEEE Inter-national Conference on Blockchain and Cryptocurrency, Sydney, 3-6 May 2021, 1-3.
https://doi.org/10.1109/ICBC51069.2021.9461151
|