WIT Press

Access and privilege in secure big data analysis

Price

Free (open access)

Volume

Volume 11 (2016), Issue 3

Pages

10

Page Range

295 - 305

Paper DOI

10.2495/DNE-V11-N3-295-305

Copyright

WIT Press

Author(s)

W.R. SIMPSON & K.E. FOLTZ

Abstract

The distributed data sources and strict security controls of the Enterprise Level Security (ELS) architecture present challenges for data mining. The ELS architecture is a secure enterprise system that enforces strict security controls in a uniform way across an enterprise. It includes end-to-end bilateral authentication for all human as well as machine interactions and verifiable claims-based access controls. Claims provisioning is automated and centrally managed based on authoritative attributes of active entities in the enterprise. While these security provisions are necessary for secure systems, they present some unique challenges to big data analyses. Key among these are non-standard schemas, non-standard access and privilege, restricted access to analysis outcomes, and overall privilege handling. Some of the distributed data sets may be fully or partially accessible, or even not accessible. Users with limited access may compute different results than those with broad access. We discuss the problems encountered for data mining in an ELS architecture and possible solutions

Keywords

access control, big data tools, escalation, privilege, security, standardized roles, standardized schemas.