Abstract
Big data has become a widespread concept in domains such as law enforcement, health care, e-commerce, and national defense. These and other big data applications have complex security requirements that need to be defined, realized, and enforced in order to facilitate the workflow of users that need access to these big data repositories. As such, security assurance emerges as an important requirement when considering access control, security privileges, and their enforcement over time as users interact with the big data applications. Taking into consideration the increase in database as a service (DaaS), solutions that work toward abstracting the big data repositories can be facilitated by utilizing the eXtensible Markup Language, XML. XML has emerged as one of the de facto standards of information that has seen increasing and significant usage in the exchange between these repositories and the big data applications. In this entry, we present a case study in the domain of law enforcement that considers a big data source, the Crash Data Repository, and the need to provide access control for the information found within. By using extensions to the Unified Modeling Language (UML) to model document (XML) schemas and the security requirements tied to the information validated by the schemas, we achieve security assurance a big data repository represented in XML. This model security is accompanied via automatic policy generation that covers Mandatory, Role-Based and Discretionary Access Control (MAC, RBAC, and DAC, respectively) requirements. As a result, we enable the development of secure big data applications that use XML as their document format.
Similar content being viewed by others
Bibliography
Basin D, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1):39–91
Bell DE, La Padula LJ (1976) Secure computer system: Unified exposition and multics interpretation. MITRE CORP BEDFORD MA
Burmester S, Giese H, Schäfer W (2005) Model-driven architecture for hard real-time systems: From platform independent models to code. European Conference on Model Driven Architecture-Foundations and Applications. Springer, Berlin, Heidelberg
De la Rosa AlgarÃn A (2014) An RBAC, LBAC and DAC Security Framework for Tree-Structured Documents. Doctoral Dissertations. 456
De la Rosa AlgarÃn A, Demurjian SA (2013) An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications. Emerging Trends in ICT Security. Morgan Kaufmann 2014:65–83
De la Rosa AlgarÃn A, et al. (2016) Securing XML with role-based access control: Case study in health care. E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications. IGI Global. 487–522
De la Rosa Algarin A, et al. (2012) A security framework for XML schemas and documents for healthcare. 2012 IEEE International Conference on Bioinformatics and Biomedicine Workshops. IEEE
De la Rosa AlgarÃn A, et al. (2013a) Securing XML with role-based access control: Case study in health care. E-Health and Telemedicine: Concepts, Methodologies, Tools, and Applications. IGI Global 2016:487–522
De la Rosa AlgarÃn A, et al. (2013b) Generating XACML enforcement policies for role-based access control of XML documents. International Conference on Web Information Systems and Technologies. Springer, Berlin, Heidelberg, 2013
De la Rosa AlgarÃn A, Demurjian SA, Jackson E (2014) Access control for XML big data applications
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4:224–274
Fowler M (2004) UML distilled: a brief guide to the standard object modeling language. Addison-Wesley Professional
Guideline MMUCC (2012) Model Minimum Uniform Crash Criteria. DOT HS 811:631
Krishnan R (2014) Access control and privacy policy challenges in big data. In: NSF Workshop on Big Data Security and Privacy, 2
Lodderstedt T, Basin D, Doser J (2002) SecureUML: a UML-based modeling language for model-driven security. Springer, Berlin/New York, pp 426–441
Mazzoleni, Pietro, et al. (2006) XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!. Proceedings of the eleventh ACM symposium on Access control models and technologies
Mazzoleni, Pietro, et al. (2008) XACML policy integration algorithms. ACM Transactions on Information and System Security (TISSEC) 11(1):1–29
Pavlich-Mariscal JA, Demurjian SA, Michel LD (2010) A framework for security assurance of access control enforcement code. Comput Secur 29:770–784
Rao P, et al. (2009) An algebra for fine-grained integration of XACML policies. Proceedings of the 14th ACM symposium on Access control models and technologies
Sandhu RS, Samarati P (1994) Access control: principle and practice. IEEE communications magazine 32(9):40–48
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Science+Business Media LLC
About this entry
Cite this entry
De la Rosa Algarin, A., Demurjian, S.A., Jackson, E. (2021). Access Control for XML Big Data Applications. In: Meyers, R.A. (eds) Encyclopedia of Complexity and Systems Science. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27737-5_756-1
Download citation
DOI: https://doi.org/10.1007/978-3-642-27737-5_756-1
Received:
Accepted:
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27737-5
Online ISBN: 978-3-642-27737-5
eBook Packages: Living Reference Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics