Fine-Grained Big Data Security Method Based on Zero Trust Model
Title | Fine-Grained Big Data Security Method Based on Zero Trust Model |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Tao, Y., Lei, Z., Ruxiang, P. |
Conference Name | 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) |
Keywords | Big Data, big data environment, big data security control, Big Data technology, big data usage, Conferences, data access audit, data privacy, data processing capacity, Data security, data security domain, data security risks, drugs, fine-grained big data security method, fine-grained data access authentication control, Human Behavior, human factors, legacy security technologies, policy-based governance, pubcrawl, resilience, Resiliency, risky data access, Scalability, security of data, zero trust, zero trust model |
Abstract | With the rapid development of big data technology, the requirement of data processing capacity and efficiency result in failure of a number of legacy security technologies, especially in the data security domain. Data security risks became extremely important for big data usage. We introduced a novel method to preform big data security control, which comprises three steps, namely, user context recognition based on zero trust, fine-grained data access authentication control, and data access audit based on full network traffic to recognize and intercept risky data access in big data environment. Experiments conducted on the fine-grained big data security method based on the zero trust model of drug-related information analysis system demonstrated that this method can identify the majority of data security risks. |
URL | https://ieeexplore.ieee.org/document/8644614 |
DOI | 10.1109/PADSW.2018.8644614 |
Citation Key | tao_fine-grained_2018 |
- fine-grained big data security method
- zero trust model
- zero trust
- security of data
- Scalability
- risky data access
- Resiliency
- resilience
- pubcrawl
- policy-based governance
- legacy security technologies
- Human Factors
- Human behavior
- fine-grained data access authentication control
- Big Data
- drugs
- data security risks
- data security domain
- Data Security
- data processing capacity
- data privacy
- data access audit
- Conferences
- big data usage
- Big Data technology
- big data security control
- big data environment