{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T14:58:16Z","timestamp":1768402696436,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":77,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:00:00Z","timestamp":1607299200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,7]]},"DOI":"10.1145\/3427228.3427640","type":"proceedings-article","created":{"date-parts":[[2020,12,9]],"date-time":"2020-12-09T22:20:18Z","timestamp":1607552418000},"page":"582-596","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark"],"prefix":"10.1145","author":[{"given":"Tao","family":"Xue","sequence":"first","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Yu","family":"Wen","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[{"name":"The University of Kansas, USA"}]},{"given":"Boyang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Yang","family":"Zheng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Yanfei","family":"Hu","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Yingjiu","family":"Li","sequence":"additional","affiliation":[{"name":"Singapore Management University, USA"}]},{"given":"Gang","family":"Li","sequence":"additional","affiliation":[{"name":"Deakin University, Australia"}]},{"given":"Dan","family":"Meng","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]}],"member":"320","published-online":{"date-parts":[[2020,12,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. AMPlab.University of California Berkeley.Big data benchmark.https:\/\/amplab.cs.berkeley.edu\/benchmark\/. [n.d.]. AMPlab.University of California Berkeley.Big data benchmark.https:\/\/amplab.cs.berkeley.edu\/benchmark\/."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Apache Beam.https:\/\/beam.apache.org\/. [n.d.]. Apache Beam.https:\/\/beam.apache.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Apache Hadoop.http:\/\/hadoop.apache.org\/. [n.d.]. Apache Hadoop.http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Apache Ranger.https:\/\/hortonworks.com\/apache\/ranger\/. [n.d.]. Apache Ranger.https:\/\/hortonworks.com\/apache\/ranger\/."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Apache Sentry. https:\/\/sentry.apache.org\/. [n.d.]. Apache Sentry. https:\/\/sentry.apache.org\/."},{"key":"e_1_3_2_1_6_1","unstructured":"[n.d.]. Apache Spark. https:\/\/spark.apache.org\/. [n.d.]. Apache Spark. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_1_7_1","volume-title":"White Paper","year":"2014"},{"key":"e_1_3_2_1_8_1","unstructured":"[n.d.]. By Jure Leskovec.http:\/\/snap.stanford.edu\/data\/soc-Pokec.html. [n.d.]. By Jure Leskovec.http:\/\/snap.stanford.edu\/data\/soc-Pokec.html."},{"key":"e_1_3_2_1_9_1","volume-title":"UCI Repository of Machine Learning Databases","author":"Blake C.L.","year":"1998"},{"key":"e_1_3_2_1_10_1","unstructured":"[n.d.]. Data Sharing and Data Integration. https:\/\/www.european-big-data-value-forum.eu\/data-sharing-and-data-integration\/. [n.d.]. Data Sharing and Data Integration. https:\/\/www.european-big-data-value-forum.eu\/data-sharing-and-data-integration\/."},{"key":"e_1_3_2_1_11_1","volume-title":"Spark SQL Performance Tests","year":"2019"},{"key":"e_1_3_2_1_12_1","volume-title":"Enable Table Access Control","year":"2017"},{"key":"e_1_3_2_1_13_1","unstructured":"[n.d.]. GitBook 2019.https:\/\/jaceklaskowski.gitbooks.io\/mastering-spark-sql\/. [n.d.]. GitBook 2019.https:\/\/jaceklaskowski.gitbooks.io\/mastering-spark-sql\/."},{"key":"e_1_3_2_1_14_1","volume-title":"GraphFrames User Guide","year":"2018"},{"key":"e_1_3_2_1_15_1","unstructured":"[n.d.]. Introducing Row\/Column Level Access Control for Apache Spark 2017.http:\/\/www.cs.toronto-.edu\/~kriz\/cifar.html. [n.d.]. Introducing Row\/Column Level Access Control for Apache Spark 2017.http:\/\/www.cs.toronto-.edu\/~kriz\/cifar.html."},{"key":"e_1_3_2_1_16_1","unstructured":"[n.d.]. Kafka Security 2019.http:\/\/www.cs.toronto-.edu\/~kriz\/cifar.html. [n.d.]. Kafka Security 2019.http:\/\/www.cs.toronto-.edu\/~kriz\/cifar.html."},{"key":"e_1_3_2_1_17_1","unstructured":"[n.d.]. MLlib:Main Guid 2018. http:\/\/spark.apache.org\/docs\/latest\/ml-clustering.html. [n.d.]. MLlib:Main Guid 2018. http:\/\/spark.apache.org\/docs\/latest\/ml-clustering.html."},{"key":"e_1_3_2_1_18_1","unstructured":"[n.d.]. MySQLTutorial. 2019.https:\/\/www.mysqltutorial.org\/mysql-adminsitration\/ 2019. [n.d.]. MySQLTutorial. 2019.https:\/\/www.mysqltutorial.org\/mysql-adminsitration\/ 2019."},{"key":"e_1_3_2_1_19_1","unstructured":"[n.d.]. Presto.https:\/\/prestodb.github.io\/. [n.d.]. Presto.https:\/\/prestodb.github.io\/."},{"key":"e_1_3_2_1_20_1","unstructured":"[n.d.]. Sharing in the Era of Big Bata. https:\/\/sciencenode.org\/feature\/improving-sharing-in-the-era-of-big-data.php. [n.d.]. Sharing in the Era of Big Bata. https:\/\/sciencenode.org\/feature\/improving-sharing-in-the-era-of-big-data.php."},{"key":"e_1_3_2_1_21_1","volume-title":"Structured Streaming Programming Guide","year":"2018"},{"key":"e_1_3_2_1_22_1","unstructured":"[n.d.]. Sysdig.https:\/\/sysdig.com\/. [n.d.]. Sysdig.https:\/\/sysdig.com\/."},{"key":"e_1_3_2_1_23_1","volume-title":"TPC BENCHMARK DS Standard Specificationversion 2.3.0","year":"2016"},{"key":"e_1_3_2_1_24_1","volume-title":"Privacy-Preserving Machine Learning: Threats and Solutions","author":"Al-Rubaie Mohammad","year":"2019"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3190664"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3056103"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807148"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61893-7_25"},{"key":"e_1_3_2_1_30_1","unstructured":"Dhruba Borthakur 2008. HDFS Architecture Guide. Hadoop Apache Project(2008). Dhruba Borthakur 2008. HDFS Architecture Guide. Hadoop Apache Project(2008)."},{"key":"e_1_3_2_1_31_1","volume-title":"Privacy-Preserving Graph Algorithms in the Semi-Honest Model. In International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT\u201905","author":"Brickell Justin","year":"2005"},{"key":"e_1_3_2_1_32_1","volume-title":"VLDB Journal\u201908","author":"Byun Ji-Won","year":"2008"},{"key":"e_1_3_2_1_33_1","volume-title":"Apache Flink: Stream and Batch Processing in a Single Engine. Bulletin of the IEEE Computer Society Technical Committee on Data Engineering 36, 4","author":"Carbone Paris","year":"2015"},{"key":"e_1_3_2_1_34_1","volume-title":"The Importance of ABAC: Attribute-Based Access Control to Big Data: Privacy and Context","author":"Cavoukian Ann","year":"2015"},{"key":"e_1_3_2_1_35_1","volume-title":"Spark: the Definitive Guide: Big Data Processing Made Simple","author":"Chambers Bill","year":"2018"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.48"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2312112"},{"key":"e_1_3_2_1_38_1","volume-title":"Efficient Enforcement of Action-Aware Purpose-Based Access Control within Relational Database Management Systems. In IEEE International Conference on Data Engineering, ICDE\u201916","author":"Colombo Pietro","year":"2016"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.123"},{"key":"e_1_3_2_1_40_1","volume-title":"Libby Bishop, and Matthew Woollard.","author":"Corti Louise","year":"2019"},{"key":"e_1_3_2_1_41_1","unstructured":"Giuseppe D\u2019Acquisto Josep Domingo-Ferrer Panayiotis Kikiras Vicen\u00e7 Torra Yves-Alexandre de Montjoye and Athena Bourka. 2015. Privacy by Design in Big Data: an Overview of Privacy Enhancing Technologies in the Era of Big Data Analytics. arXiv preprint arXiv:1512.06000(2015). Giuseppe D\u2019Acquisto Josep Domingo-Ferrer Panayiotis Kikiras Vicen\u00e7 Torra Yves-Alexandre de Montjoye and Athena Bourka. 2015. Privacy by Design in Big Data: an Overview of Privacy Enhancing Technologies in the Era of Big Data Analytics. arXiv preprint arXiv:1512.06000(2015)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2960414.2960416"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_44_1","volume-title":"Big Data Sharing and Analysis to Advance Research in Post-Traumatic Epilepsy. Neurobiology of disease 123","author":"Duncan Dominique","year":"2019"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Csilla Farkas and Sushil Jajodia. 2002. The Inference Problem: A Survey. ACM SIGKDD Explorations Newsletter(2002). Csilla Farkas and Sushil Jajodia. 2002. The Inference Problem: A Survey. ACM SIGKDD Explorations Newsletter(2002).","DOI":"10.1145\/772862.772864"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267569.1267570"},{"key":"e_1_3_2_1_47_1","volume-title":"USENIX Symposium on Internet Technologies and Systems.","author":"Gong Li","year":"1997"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201914","author":"Gonzalez E.","year":"2014"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180457.3180463"},{"key":"e_1_3_2_1_50_1","volume-title":"Apache Flume: Distributed Log Collection for Hadoop","author":"Hoffman Steve","year":"2013"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1201\/b19694"},{"key":"e_1_3_2_1_52_1","volume-title":"Guide to Attribute Based Access Control (ABAC) Definition and Considerations (draft). NIST special publication 800, 162","author":"Hu C","year":"2013"},{"key":"e_1_3_2_1_53_1","volume-title":"An Attribute-Based Fine-Grained Access Control Mechanism for HBase. In International Conference on Database and Expert Systems Applications. Springer, 44\u201359","author":"Huang Liangqiang","year":"2019"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the NetDB","author":"Kreps Jay","year":"2011"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"crossref","unstructured":"Felix Lau Stuart\u00a0H Rubin Michael\u00a0H Smith and Ljiljana Trajkovic. 2000. Distributed Denial of Service Attacks. In Smc 2000 conference proceedings. 2000 ieee international conference on systems man and cybernetics.\u2019cybernetics evolving to systems humans organizations and their complex interactions\u2019(cat. no. 0 Vol.\u00a03. IEEE 2275\u20132280. Felix Lau Stuart\u00a0H Rubin Michael\u00a0H Smith and Ljiljana Trajkovic. 2000. Distributed Denial of Service Attacks. In Smc 2000 conference proceedings. 2000 ieee international conference on systems man and cybernetics.\u2019cybernetics evolving to systems humans organizations and their complex interactions\u2019(cat. no. 0 Vol.\u00a03. IEEE 2275\u20132280.","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"e_1_3_2_1_56_1","volume-title":"Graph-Based Privacy-Preserving Data Publication. In IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, INFOCOM\u201916","author":"Li Xiang-Yang","year":"2016"},{"key":"e_1_3_2_1_57_1","unstructured":"Xiangrui Meng Joseph Bradley Burak Yavuz Evan Sparks Shivaram Venkataraman Davies Liu Jeremy Freeman DB Tsai Manish Amde Sean Owen Doris Xin Reynold Xin Michael\u00a0J. Franklin Reza Zadeh Matei Zaharia and Ameet Talwalkar. 2016. MLlib: Machine Learning in Apache Spark. J. Mach. Learn. Res.(2016). Xiangrui Meng Joseph Bradley Burak Yavuz Evan Sparks Shivaram Venkataraman Davies Liu Jeremy Freeman DB Tsai Manish Amde Sean Owen Doris Xin Reynold Xin Michael\u00a0J. Franklin Reza Zadeh Matei Zaharia and Ameet Talwalkar. 2016. MLlib: Machine Learning in Apache Spark. J. Mach. Learn. Res.(2016)."},{"key":"e_1_3_2_1_58_1","volume-title":"Linux Security Modules: General Security Support for the Linux Kernel. In USENIX Security Symposium, USENIX Security\u201902","author":"Morris James","year":"2002"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"crossref","unstructured":"Qun Ni Elisa Bertino and Jorge Lobo. 2008. An obligation model bridging access control policies and privacy policies.. In SACMAT Vol.\u00a08. 133\u2013142. Qun Ni Elisa Bertino and Jorge Lobo. 2008. An obligation model bridging access control policies and privacy policies.. In SACMAT Vol.\u00a08. 133\u2013142.","DOI":"10.1145\/1377836.1377857"},{"key":"e_1_3_2_1_60_1","volume-title":"NoSQL and NewSQL databases. CoRR","author":"Ong Kian\u00a0Win","year":"2014"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Sylvia\u00a0L. Osborn. 2007. Role-Based Access Control. Network Security Technology & Application(2007). Sylvia\u00a0L. Osborn. 2007. Role-Based Access Control. Network Security Technology & Application(2007).","DOI":"10.1007\/978-3-540-69861-6_5"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/579149"},{"key":"e_1_3_2_1_63_1","volume-title":"SparkXS: Efficient Access Control for Intelligent and Large-Scale Streaming Data Applications. In International Conference on Intelligent Environments","author":"Preuveneers D.","year":"2015"},{"key":"e_1_3_2_1_64_1","volume-title":"Data-at-Rest Security for Spark. In 2016 IEEE International Conference on Big Data (Big Data). IEEE, 1464\u20131473","author":"Shah Syed\u00a0Yousaf","year":"2016"},{"key":"e_1_3_2_1_65_1","volume-title":"Big Data Security: The Evolution of Hadoop\u2019s Security Model","author":"Smith T","year":"2013"},{"key":"e_1_3_2_1_66_1","volume-title":"Bringing Java\u2019s Wild Native World under Control. ACM Transactions on Information and System Security (TISSEC)","author":"Sun Mengtao","year":"2013"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2010.5447738"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714624"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835958"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2730843"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1998.683168"},{"key":"e_1_3_2_1_72_1","volume-title":"Presented as part of the 9th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 12). 15\u201328.","author":"Zaharia Matei"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","unstructured":"Xiaokuan Zhang Jihun Hamm Michael\u00a0K Reiter and Yinqian Zhang. 2019. Statistical Privacy for Streaming Traffic. In NDSS. Xiaokuan Zhang Jihun Hamm Michael\u00a0K Reiter and Yinqian Zhang. 2019. Statistical Privacy for Streaming Traffic. In NDSS.","DOI":"10.14722\/ndss.2019.23210"},{"key":"e_1_3_2_1_76_1","volume-title":"SCOPE: Parallel Databases Meet MapReduce. The International Journal on Very Large Data Bases, VLDB Journal\u201912","author":"Zhou Jingren","year":"2012"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2388446"}],"event":{"name":"ACSAC '20: Annual Computer Security Applications Conference","location":"Austin USA","acronym":"ACSAC '20"},"container-title":["Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3427228.3427640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:25Z","timestamp":1750197745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3427228.3427640"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,7]]},"references-count":77,"alternative-id":["10.1145\/3427228.3427640","10.1145\/3427228"],"URL":"https:\/\/doi.org\/10.1145\/3427228.3427640","relation":{},"subject":[],"published":{"date-parts":[[2020,12,7]]},"assertion":[{"value":"2020-12-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}