200
Views
0
CrossRef citations to date
0
Altmetric
Articles

Data access control in data exchanging supporting big data arena

, , &
Pages 155-169 | Received 25 Mar 2018, Accepted 14 Jun 2018, Published online: 19 Jul 2018

References

  • apachekafka. (2018). Apache kafka. Online. Retrieved from https://kafka.apache.org/documentation/#security.
  • Bendre, M. R., & Thool, V. R. (2016). Analytics, challenges and applications in big data environment: A survey. Journal of Management Analytics, 3(3), 206–239. doi: 10.1080/23270012.2016.1186578
  • Bi, Z., & Cochran, D. (2014). Big data analytics with applications. Journal of Management Analytics, 1(4), 249–265. doi: 10.1080/23270012.2014.992985
  • Chen, J., & Xue, Y. (2017, June). Bootstrapping a blockchain based ecosystem for big data exchange. In 2017 IEEE international congress on big data (BigData Congress) (pp. 460–463).
  • Chen, Y., Chen, H., Gorkhali, A., Lu, Y., Ma, Y., & Li, L. (2016). Big data analytics and big data science: A survey. Journal of Management Analytics, 3(1), 1–42. doi: 10.1080/23270012.2016.1141332
  • Cheng, Y., Chen, K., Sun, H., Zhang, Y., & Tao, F. (2018). Data and knowledge mining with big data towards smart production. Journal of Industrial Information Integration, 9, 1–13. doi: 10.1016/j.jii.2017.08.001
  • Wikipedia Contributors. (2018). Lightweight directory access protocol. Retrieved from https://en.wikipedia.org/w/index.php?title=Special:CiteThisPage&page=Lightweight_Directory_Access_Protocol&id=833804084.
  • Duan, L., & Binbasioglu, M. (2017). An ensemble framework for community detection. Journal of Industrial Information Integration, 5, 1–5. doi: 10.1016/j.jii.2017.01.001
  • Duan, L., & Xiong, Y. (2015). Big data analytics and business analytics. Journal of Management Analytics., 2(1), 1–21. doi: 10.1080/23270012.2015.1020891
  • Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM conference on computer and communications security (pp. 89–98). Alexandria, Virginia, USA; CCS '06. New York, NY: ACM.
  • Jiao, L., Weili, H., Zeqing, G., Yaoliang, C., Chang, C., Xiaoyang, W. S., & Fenghua, L. (2018). Desc: Enabling secure data exchange based on smart contracts. SCIENCE CHINA Information Sciences, 61(4), 049102.
  • Krishnan, R. (2014). Access control and privacy policy challenges in big data. In NSF (National Science Foundation) workshop on big data security and privacy (p. 2).
  • Kshetri, N. (2014). Big data's impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134–1145. doi: 10.1016/j.telpol.2014.10.002
  • Murthy, P. K. (2014, October). Top ten challenges in big data security and privacy. In 2014 International test conference (pp. 1–1).
  • Oliverio, J. (2018). A survey of social media, big data, data mining, and analytics. Journal of Industrial Integration and Management, 3(2), 1850003.
  • Sandhu, R. S., & Samarati, P. (1994, September). Access control: Principle and practice. IEEE Communications Magazine, 32(9), 40–48. doi: 10.1109/35.312842
  • Standard O. (2013). Extensible access control markup language (xacml) version 3.0. Retrieved from http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
  • Taichman, D. B., Backus, J., Baethge, C., Bauchner, H., de Leeuw, P. W., Drazen, J. M., & Wu, S. (2016). Sharing clinical trial data x a proposal from the international committee of medical journal editors. New England Journal of Medicine, 374(4), 384–386. pMID: 26786954. doi: 10.1056/NEJMe1515172
  • Tankard, C. (2012). Big data security. Network Security, 2012(7), 5–8. doi:10.1016/S1353-4858(12)70063-6
  • Techopedia (2018). Data sandbox. Online. Retrieved from https://www.techopedia.com/definition/28966/data-sandbox-big-data.
  • Tenopir, C., Allard, S., Douglass, K., Aydinoglu, A. U., Wu, L., Read, E., & Frame, M. (2011). Data sharing by scientists: Practices and perceptions. PloS one, 6(6), 1–21. doi: 10.1371/journal.pone.0021101
  • Thusoo, A., Sarma, J. S., Jain, N., Shao, Z., Chakka, P., Anthony, S., & Murthy, R. (2009, August). Hive: A warehousing solution over a map-reduce framework. In Proceedings of the VLDB Endowment (Vol. 2(2), pp. 1626–1629).
  • Wikipedia Contributors. (2018). Access control list – Wikipedia, the free encyclopedia. Online. Retrieved from https://en.wikipedia.org/w/index.php?title=Access_control_list&oldid=841770292.
  • Wikipedia Contributors. (2018). Role-based access control – Wikipedia, the free encyclopedia. Online. Retrieved from https://en.wikipedia.org/w/index.php?title=Role-based_access_control&oldid=842336290.
  • Wikipedia Contributors. (2018). Attribute-based access control – Wikipedia, the free encyclopedia. Online. Retrieved from https://en.wikipedia.org/w/index.php?title=Attribute-based_access_control&oldid=841134383.
  • Yang, K., Jia, X., & Ren, K. (2015). Secure and verifiable policy update outsourcing for big data access control in the cloud. IEEE Transactions on Parallel and Distributed Systems, 26(12), 3461–3470. doi: 10.1109/TPDS.2014.2380373
  • Zhao, J. L., Fan, S., & Hu, D. (2014). Business challenges and research directions of management analytics in the big data era. Journal of Management Analytics, 1(3), 169–174. doi: 10.1080/23270012.2014.968643

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.