Scalable and secure access control policy update for outsourced big data.
Somchart FugkeawHiroyuki SatoPublished in: Future Gener. Comput. Syst. (2018)
Keyphrases
- big data
- access control policies
- cloud computing
- trusted computing
- access control
- access control mechanism
- security mechanisms
- data intensive computing
- security requirements
- conflict resolution
- sensitive data
- service providers
- third party
- security issues
- commodity hardware
- big data analytics
- data analysis
- data processing
- security policies
- social media
- data management
- distributed environment
- business intelligence
- knowledge discovery
- fine grained
- data warehousing
- resource constrained
- lightweight
- role based access control
- case study
- data science
- databases
- information security
- data sets
- privacy preserving
- data analytics
- database management systems
- data mining