Skip to main content

Big Data: Towards a Collaborative Security System at the Service of Data Quality

  • Conference paper
  • First Online:
Hybrid Intelligent Systems (HIS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 420))

Included in the following conference series:

Abstract

Big Data often refers to a set of technologies that process large volumes of heterogeneous data. “Data Security” and “Data Quality” are two essential aspects of any data-centric project. On the one hand, Data Security System aims to protect the Confidentiality, Integrity and Availability of data. On the other hand, Data Quality Management System ensures the monitoring, evaluation and improvement of many data characteristics such as Accuracy, Consistency, Completeness and Freshness. Much research has pointed out that these two systems, Security and Quality, can be mutually blocked. Assessing or improving data quality may require extended read and/or write access to the data which may not be permitted by the security policies. In this paper, we demonstrate that it is possible to use security systems to improve data quality thanks to a dynamic access control framework dedicated to collaborative and distributed environments. Our solution consists in extending the PolyOrBAC framework, initially designed to control access in collaborative platforms, to make it a dynamic data distribution platform. Thanks to this new architecture, it will be possible to eliminate duplicates in distributed and big data environments, reduce the amount of data and improve its quality.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://data.ratp.fr/explore/dataset/accessibilite-des-gares-et-stations-metro-et-rer-ratp/table/.

  2. 2.

    https://ressources.data.sncf.com/explore/dataset/liste-des-gares/table/.

  3. 3.

    https://data.iledefrance.fr/explore/dataset/gares-et-stations-du-reseau-ferre-dile-de-france-par-ligne/table/.

  4. 4.

    https://data.iledefrance-mobilites.fr/explore/dataset/emplacement-des-gares-idf/table/.

  5. 5.

    https://www.data.gouv.fr/fr/datasets/accessibilite-des-gares-et-stations-de-metro-et-rer-ratp-1/.

References

  1. Talha, M., Abou El Kalam, A., Elmarzouqi, N.: Big data: trade-off between data quality and data security. Procedia Comput. Sci. 151, 916–922 (2019). ISSN 1877-0509. https://doi.org/10.1016/j.procs.2019.04.127

  2. Talha, M., Elmarzouqi, N., Abou El Kalam, A.: Quality and security in big data: challenges as opportunities to build a powerful wrap-up solution. J. Ubiquitous Syst. Pervasive Networks 12, 09–15 (2019). https://doi.org/10.5383/JUSPN.12.01.002

  3. Madaan, N., Abdul Ahad, M., Sastry, S.M.: Data integration in IoT ecosystem: information linkage as a privacy threat. In: Computer Law & Security Review: The International Journal of Technology Law and Practice (2017). https://doi.org/10.1016/j.clsr.2017.06.007

  4. Ahad, M.A., Tripathi, G., Zafar, S., Doja, F.: IoT data management—security aspects of information linkage in IoT systems. In: Peng, S.-L., Pal, S., Huang, L. (eds.) Principles of Internet of Things (IoT) Ecosystem: Insight Paradigm. ISRL, vol. 174, pp. 439–464. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-33596-0_18

    Chapter  Google Scholar 

  5. Abdul Ahad, M., Biswas, R.: Request-based, secured and energy-efficient (RBSEE) architecture for handling IoT big data. J. Inf. Sci., 1–12 (2018). https://doi.org/10.1177/0165551518787699

  6. eXtensible Access Control Markup Language (XACML) Version 3.0, 2013, OASIS Standard. http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html. Accessed 16 Oct 2021

  7. Information technology - Next Generation Access Control - Implementation Requirements, Protocols and API Definitions (NGAC-IRPADS). International Committee for Information Technology Standards (INCITS) (2017)

    Google Scholar 

  8. Benhadj Djilali, H., Tandjaoui, D.: Dynamic team access control for collaborative internet of things. In: Renault, É., Boumerdassi, S., Bouzefrane, S. (eds.) Mobile, Secure, and Programmable Networking. MSPN 2018. LNCS, vol. 11005. Springer, Cham. (2019). https://doi.org/10.1007/978-3-030-03101-5_7

  9. Lv, B., Zhang, D., Mao, R., Yang, H.: A multi-level cross-domain access control model based on role mapping (2016). https://doi.org/10.2991/mmme-16.2016.53

    Article  Google Scholar 

  10. Abou El Kalam, A., et al.: Organization based access control. In: Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), pp. 120–131 (2003). https://doi.org/10.1109/POLICY.2003.1206966

  11. Abou El Kalam, A., Deswarte, Y., Baïna, A., Kaâniche, M.: Access control for collaborative systems: a web services based approach. In: IEEE International Conference on Web Services, ICWS 2007, July 2007, Salt Lake City, UT, United States. pp. 1064–1071 (2007)

    Google Scholar 

  12. Andrieux, A., et al.: Web services agreement specification (WS-Agreement). Global Grid Forum 2 (2004)

    Google Scholar 

  13. Wäldrich, O., et al.: WS-Agreement Negotiation Version 1.0. (2011)

    Google Scholar 

  14. Marino, F., Moiso, C., Petracca, M.: Automatic contract negotiation, service discovery and mutual authentication solutions: a survey on the enabling technologies of the forthcoming IoT ecosystems. Comput. Networks 148, 176–195 (2018). https://doi.org/10.1016/j.comnet.2018.11.011

  15. Li, Y., Cuppens-Boulahia, N., Crom, J.M., Cuppens, F., Frey, V.: Reaching agreement in security policy negotiation (2014). https://doi.org/10.1109/TrustCom.2014.17

  16. WSAG4J framework, V2.0.0 (2012). http://wsag4j.sourceforge.net/site/wsag/overview.html. Accessed 16 Oct 2021

  17. SLA Framework, v1.1 (2016). https://github.com/FIWARE/ops.Sla-framework. Accessed 16 Oct 2021

  18. Li, Y., Cuppens-Boulahia, N., Crom, J.-M., Cuppens, F., Frey, V.: Expression and enforcement of security policy for virtual resource allocation in IAAS cloud. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 105–118. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_8

    Chapter  Google Scholar 

  19. El Mokhtari, J., Abou El Kalam, A., Benhadou, S., LEROY, J.P.: Dynamic management of security policies in PrivOrBAC. Int. J. Adv. Comput. Sci. Appl. 12 (2021). https://doi.org/10.14569/IJACSA.2021.0120681

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Talha .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Talha, M., Abou El Kalam, A. (2022). Big Data: Towards a Collaborative Security System at the Service of Data Quality. In: Abraham, A., et al. Hybrid Intelligent Systems. HIS 2021. Lecture Notes in Networks and Systems, vol 420. Springer, Cham. https://doi.org/10.1007/978-3-030-96305-7_55

Download citation

Publish with us

Policies and ethics