An Architecture for Security and Protection of Big Data

F. A. S. Abad, H. Hamidi
{"title":"An Architecture for Security and Protection of Big Data","authors":"F. A. S. Abad, H. Hamidi","doi":"10.5829/ije.2017.30.10a.08","DOIUrl":null,"url":null,"abstract":"The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computing. One of the cases where data privacy is of great importance is the authentication and protection of ownership data. In this paper, this privacy issue is analyzed by Petri net modeling. What today’s organizations need for their clouds are integrated comprehensive solutions that can deliver security intelligence. Advanced security intelligence solutions can close security gaps by using labor-saving automation to analyze millions of events occurring within the cloud, and discover system vulnerabilities through the normalization and correlation of these events. Using the proposed method, a model of security, including control of user access to databases of big data with RMS, the multiplicity and the virtual machine to prevent internal threats, deleting data, insecure or incomplete data protection and control of a third-party can be provided to improve the operation according to the rules of Petri net modeling and simulation.","PeriodicalId":416886,"journal":{"name":"International journal of engineering. Transactions A: basics","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International journal of engineering. Transactions A: basics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5829/ije.2017.30.10a.08","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

The issue of online privacy and security is a challenging subject, as it concerns the privacy of data that are increasingly more accessible via the internet. In other words, people who intend to access the private information of other users can do so more efficiently over the internet. This study is an attempt to address the privacy issue of distributed big data in the context of cloud computing. One of the cases where data privacy is of great importance is the authentication and protection of ownership data. In this paper, this privacy issue is analyzed by Petri net modeling. What today’s organizations need for their clouds are integrated comprehensive solutions that can deliver security intelligence. Advanced security intelligence solutions can close security gaps by using labor-saving automation to analyze millions of events occurring within the cloud, and discover system vulnerabilities through the normalization and correlation of these events. Using the proposed method, a model of security, including control of user access to databases of big data with RMS, the multiplicity and the virtual machine to prevent internal threats, deleting data, insecure or incomplete data protection and control of a third-party can be provided to improve the operation according to the rules of Petri net modeling and simulation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
大数据安全与保护体系结构
在线隐私和安全问题是一个具有挑战性的主题,因为它涉及到越来越多的通过互联网访问的数据的隐私。换句话说,想要访问其他用户的私人信息的人可以通过互联网更有效地做到这一点。本研究试图解决云计算背景下分布式大数据的隐私问题。数据隐私非常重要的情况之一是所有权数据的身份验证和保护。本文采用Petri网模型对这一隐私问题进行了分析。当今的组织需要的是能够提供安全智能的集成综合解决方案。高级安全智能解决方案可以通过使用节省人力的自动化来分析云中发生的数百万个事件,并通过这些事件的规范化和相关性发现系统漏洞,从而缩小安全漏洞。利用所提出的方法,可以根据Petri网建模和仿真的规则,提供一个安全模型,包括使用RMS控制大数据的用户访问数据库、多重性和虚拟机来防止内部威胁、删除数据、第三方不安全或不完整的数据保护和控制,以改进操作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.10
自引率
0.00%
发文量
0
期刊最新文献
A New Combination of Robust-possibilistic Mathematical Programming for Resilient Supply Chain Network under Disruptions and Uncertainty: A Real Supply Chain (RESEARCH NOTE) Composite Multi Wall Carbon Nano Tube Polydimethylsiloxane Membrane Bioreactor for Enhanced Bioethanol Production from Broomcorn Seeds Determining of Geotechnical Domain Based on Joint Density and Fault Orientation at Batu Hijau Mine,West Sumbawa-Indonesia (TECHNICAL NOTE) Bi-objective Build-to-order Supply Chain Problem with Customer Utility Pareto Optimization of Two-element Wing Models with Morphing Flap Using Computational Fluid Dynamics, Grouped Method of Data handling Artificial Neural Networks and Genetic Algorithms
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1