Title: Research on big data access control mechanism

Authors: Yinxia Zhuang; Yapeng Sun; Han Deng; Jun Guo

Addresses: School of Software, Quanzhou University of Information Engineering, Quanzhou, 362000, China ' School of Automation, Central South University, Changsha, Hunan, 410083, China ' Big Data Development and Research Center, Guangzhou College of Technology and Business, Guangzhou, 528138, China ' School of Software, Quanzhou University of Information Engineering, Quanzhou, 362000, China

Abstract: The increasing amount of data provides an excellent opportunity for the processing and analysis of big data. Big data serves various fields, such as transportation, medical care, consumption, etc. The analysis and processing of big data greatly facilitates our life. When we consider the convenience provided by big data, we should also consider the security issues involved behind it. The loss of protection of data resources will cause great distress to the society and individuals. In recent years, the leakage of data resources has become a troublesome problem in the field of big data. The emergence of access control technology adds a barrier to the access of data resources, avoids some illegal users' access to resources, and reduces the problem of resource leakage to a certain extent. This paper summarises the development of some access control technologies in the field of big data access control, including discretionary access control technology, role-based access control technology, attribution-based access control technology, blockchain-based access control technology, etc. Then it summarises the application characteristics of access control technology in the field of big data, and finally looks forward to the development prospect of access control.

Keywords: big data; access control; security.

DOI: 10.1504/IJCSE.2023.129738

International Journal of Computational Science and Engineering, 2023 Vol.26 No.2, pp.192 - 198

Received: 03 Oct 2021
Accepted: 18 Oct 2021

Published online: 22 Mar 2023 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article