{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:22:48Z","timestamp":1740140568486,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T00:00:00Z","timestamp":1588809600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T00:00:00Z","timestamp":1588809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100012255","name":"Institute of Climate Change and Public Policy","doi-asserted-by":"crossref","award":["YK18-05-03"],"award-info":[{"award-number":["YK18-05-03"]}],"id":[{"id":"10.13039\/501100012255","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2020,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The access control is used to ensure these data security when WSN (wireless sensor network) with a large number of base stations transmits huge amount of data to a data center server. Meanwhile big data systems are used to efficiently store, manage, and use data from large-scale WSNs. In big data systems for WSNs, the traditional access control technology will greatly affect the system performance. This paper first analyzes the data processing flow of the traditional access control strategy in big data systems, analyzes its time complexity, and explores how it affects system performance. Then, we propose the big data security access control algorithm based on memory index acceleration in WSNs which has better performance over the traditional ones. In our experiments, under the same test environment and security strategy, the performance has been greatly improved with the proposed algorithm.<\/jats:p>","DOI":"10.1186\/s13638-020-01725-1","type":"journal-article","created":{"date-parts":[[2020,5,7]],"date-time":"2020-05-07T12:02:57Z","timestamp":1588852977000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Big data security access control algorithm based on memory index acceleration in WSNs"],"prefix":"10.1186","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4024-1736","authenticated-orcid":false,"given":"Jianhua","family":"Peng","sequence":"first","affiliation":[]},{"given":"Hui","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qingjie","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Jingli","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,7]]},"reference":[{"issue":"6","key":"1725_CR1","doi-asserted-by":"publisher","first-page":"10675","DOI":"10.1109\/JIOT.2019.2940709","volume":"6","author":"Z Huang","year":"2019","unstructured":"Z. Huang, X. Xu, J. Ni, H. Zhu, C. Wang, Multimodal representation learning for recommendation in Internet of Things. IEEE Internet Things J. 6(6), 10675\u201310685 (2019)","journal-title":"IEEE Internet Things J."},{"key":"1725_CR2","doi-asserted-by":"publisher","first-page":"106152","DOI":"10.1016\/j.oceaneng.2019.106152","volume":"187","author":"B Wu","year":"2019","unstructured":"B. Wu, T.L. Yip, X. Yan, C. Guedes Soares, Fuzzy logic based approach for ship-bridge collision alert system. Ocean Eng. 187, 106152 (2019)","journal-title":"Ocean Eng."},{"issue":"2","key":"1725_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2785966","volume":"18","author":"P Alexander","year":"2015","unstructured":"P. Alexander, L. Pike, P. Loscocco, G. Coker, Model checking distributed mandatory access control policies. ACM Transactions on Information and System Security (TISSEC) 18(2), 1\u201325 (2015)","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"issue":"2","key":"1725_CR4","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1109\/JIOT.2018.2843561","volume":"6","author":"H Liu","year":"2018","unstructured":"H. Liu, X. Yao, T. Yang, H. Ning, Cooperative privacy preservation for wearable devices in hybrid computing-based smart health. IEEE Internet Things J. 6(2), 1352\u20131362 (2018)","journal-title":"IEEE Internet Things J."},{"key":"1725_CR5","doi-asserted-by":"crossref","unstructured":"Terzis, S., Wagealla, W., English, C., & Nixon, P. Trust lifecycle management in a global computing environment. In International Workshop on Global Computing (pp. 291-313). Springer, Berlin, Heidelberg (2004).","DOI":"10.1007\/978-3-540-31794-4_16"},{"key":"1725_CR6","doi-asserted-by":"crossref","unstructured":"Chang, R., Jiang, L., Chen, W., He, H., Yang, S., Jiang, H., & Liu, Y. (2018). Towards a multilayered permission-based access control for extending Android security. Concurrency and Computation: Practice and Experience, 30(5), e4180 (2018).","DOI":"10.1002\/cpe.4180"},{"issue":"01","key":"1725_CR7","doi-asserted-by":"publisher","first-page":"1950003","DOI":"10.1142\/S0218843019500035","volume":"28","author":"N Mundbrod","year":"2019","unstructured":"N. Mundbrod, M. Reichert, Object-specific role-based access control. International Journal of Cooperative Information Systems 28(01), 1950003 (2019)","journal-title":"International Journal of Cooperative Information Systems"},{"issue":"5","key":"1725_CR8","doi-asserted-by":"publisher","first-page":"669","DOI":"10.3390\/sym11050669","volume":"11","author":"MU Aftab","year":"2019","unstructured":"M.U. Aftab, Z. Qin, N.W. Hundera, O. Ariyo, N.T. Son, T.V. Dinh, Permission-based separation of duty in dynamic role-based access Control Model. Symmetry 11(5), 669 (2019)","journal-title":"Symmetry"},{"issue":"11","key":"1725_CR9","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1007\/s13042-018-0840-7","volume":"9","author":"CM Subramanian","year":"2018","unstructured":"C.M. Subramanian, A.K. Cherukuri, C. Chelliah, Role based access control design using three-way formal concept analysis. Int. J. Mach. Learn. Cybern. 9(11), 1807\u20131837 (2018)","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"2","key":"1725_CR10","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1109\/MC.2015.33","volume":"48","author":"V Hu","year":"2015","unstructured":"V. Hu, C. Kuhn, D. Richard, D.F. Ferraiolo, Attribute-based access control. Computer 48(2), 85\u201388 (2015)","journal-title":"Computer"},{"key":"1725_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1109\/ACCESS.2017.2730958","volume":"6","author":"M Uriarte","year":"2017","unstructured":"M. Uriarte, J. Astorga, E. Jacob, M. Huarte, M. Carnerero, Expressive policy-based access control for resource-constrained devices. IEEE Access 6, 15\u201346 (2017)","journal-title":"IEEE Access"},{"key":"1725_CR12","doi-asserted-by":"publisher","first-page":"12240","DOI":"10.1109\/ACCESS.2018.2812844","volume":"6","author":"JP Cruz","year":"2018","unstructured":"J.P. Cruz, Y. Kaji, N. Yanai, RBAC-SC: role-based access control using smart contract. Ieee Access 6, 12240\u201312251 (2018)","journal-title":"Ieee Access"},{"issue":"6","key":"1725_CR13","doi-asserted-by":"publisher","first-page":"974","DOI":"10.1109\/TDSC.2017.2768533","volume":"15","author":"S Aditham","year":"2017","unstructured":"S. Aditham, N. Ranganathan, A system architecture for the detection of insider attacks in big data systems. IEEE Transactions on Dependable and Secure Computing 15(6), 974\u2013987 (2017)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"1725_CR14","doi-asserted-by":"publisher","first-page":"10749","DOI":"10.1109\/JIOT.2019.2941638","volume":"6","author":"Q Xia","year":"2019","unstructured":"Q. Xia, E.B. Sifah, K.O.B.O. Agyekum, H. Xia, K.N. Acheampong, A. Smahi, M. Guizani, Secured fine-grained selective access to outsourced cloud data in IoT environments. IEEE Internet Things J. 6(6), 10749\u201310762 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"1725_CR15","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1109\/TSC.2014.2363474","volume":"8","author":"Y Zhu","year":"2014","unstructured":"Y. Zhu, D. Huang, C.J. Hu, X. Wang, From RBAC to ABAC: constructing flexible data access control for cloud storage services. IEEE Trans. Serv. Comput. 8(4), 601\u2013616 (2014)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"1725_CR16","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1049\/iet-ifs.2017.0225","volume":"12","author":"S Wang","year":"2018","unstructured":"S. Wang, X. Zhang, Y. Zhang, Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control. IET Inf. Secur. 12(2), 141\u2013149 (2018)","journal-title":"IET Inf. Secur."},{"key":"1725_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ssci.2018.07.002","volume":"111","author":"M Zhang","year":"2019","unstructured":"M. Zhang, D. Zhang, F. Goerlandt, X. Yan, P. Kujala, Use of HFACS and fault tree model for collision risk factors analysis of icebreaker assistance in ice-covered waters. Saf. Sci. 111, 128\u2013143 (2019)","journal-title":"Saf. Sci."},{"issue":"4","key":"1725_CR18","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1007\/s12652-017-0573-6","volume":"9","author":"M Alam","year":"2018","unstructured":"M. Alam, N. Emmanuel, T. Khan, Y. Xiang, H. Hassan, Garbled role-based access control in the cloud. J. Ambient. Intell. Humaniz. Comput. 9(4), 1153\u20131166 (2018)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"1725_CR19","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jnca.2019.04.013","volume":"139","author":"S Pal","year":"2019","unstructured":"S. Pal, M. Hitchens, V. Varadharajan, T. Rabehaja, Policy-based access control for constrained healthcare resources in the context of the Internet of Things. J. Netw. Comput. Appl. 139, 57\u201374 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"1725_CR20","doi-asserted-by":"publisher","first-page":"43088","DOI":"10.1109\/ACCESS.2018.2861421","volume":"6","author":"M Babar","year":"2018","unstructured":"M. Babar, F. Khan, W. Iqbal, A. Yahya, F. Arif, Z. Tan, J.M. Chuma, A secured data management scheme for smart societies in industrial internet of things environment. IEEE Access 6, 43088\u201343099 (2018)","journal-title":"IEEE Access"},{"key":"1725_CR21","doi-asserted-by":"publisher","first-page":"75342","DOI":"10.1109\/ACCESS.2018.2883105","volume":"6","author":"D Chattaraj","year":"2018","unstructured":"D. Chattaraj, M. Sarma, A.K. Das, N. Kumar, J.J. Rodrigues, Y. Park, HEAP: an efficient and fault-tolerant authentication and key exchange protocol for Hadoop-assisted big data platform. IEEE Access 6, 75342\u201375382 (2018)","journal-title":"IEEE Access"},{"key":"1725_CR22","doi-asserted-by":"publisher","unstructured":"Huang Z., Tang J., G. Shan, Ni J., Chen Y., & Wang C. An efficient passenger-hunting recommendation framework with multi-task deep learning. IEEE Internet of Things Journal . DOI: https:\/\/doi.org\/10.1109\/JIOT.2019.2901759(2019).","DOI":"10.1109\/JIOT.2019.2901759(2019)"},{"key":"1725_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.future.2019.10.001","volume":"104","author":"X Liu","year":"2020","unstructured":"X. Liu, R. Zhu, A. Anjum, J. Wang, H. Zhang, M. Ma, Intelligent data fusion algorithm based on hybrid delay-aware adaptive clustering in wireless sensor networks. Futur. Gener. Comput. Syst. 104, 1\u201314 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"2","key":"1725_CR24","doi-asserted-by":"publisher","first-page":"2205","DOI":"10.1109\/JIOT.2018.2883403","volume":"6","author":"H Xie","year":"2018","unstructured":"H. Xie, Z. Yan, Z. Yao, M. Atiquzzaman, Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J. 6(2), 2205\u20132224 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"1725_CR25","doi-asserted-by":"publisher","first-page":"817","DOI":"10.1007\/s11036-015-0623-2","volume":"20","author":"X Liu","year":"2015","unstructured":"X. Liu, R. Zhu, B. Jalaian, Y. Sun, Dynamic spectrum access algorithm based on game theory in cognitive radio networks. Mobile Networks and Applications 20(6), 817\u2013827 (2015)","journal-title":"Mobile Networks and Applications"},{"key":"1725_CR26","doi-asserted-by":"publisher","first-page":"2366","DOI":"10.1109\/ACCESS.2015.2501644","volume":"3","author":"R Zhu","year":"2015","unstructured":"R. Zhu, X. Zhang, X. Liu, W. Shu, T. Mao, B. Jalaian, ERDT: Energy-efficient reliable decision transmission for intelligent cooperative spectrum sensing in industrial IoT. IEEE Access 3, 2366\u20132378 (2015)","journal-title":"IEEE Access"},{"issue":"6","key":"1725_CR27","doi-asserted-by":"publisher","first-page":"10332","DOI":"10.1109\/JIOT.2019.2938008","volume":"6","author":"J Li","year":"2019","unstructured":"J. Li, Y. Ji, K.K.R. Choo, D. Hogrefe, CL-CPPA: certificate-less conditional privacy-preserving authentication protocol for the Internet of Vehicles. IEEE Internet Things J. 6(6), 10332\u201310343 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"1725_CR28","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1109\/TBDATA.2016.2621106","volume":"4","author":"C Hu","year":"2017","unstructured":"C. Hu, W. Li, X. Cheng, J. Yu, S. Wang, R. Bie, A secure and verifiable access control scheme for big data storage in clouds. IEEE Transactions on Big data 4(3), 341\u2013355 (2017)","journal-title":"IEEE Transactions on Big data"},{"issue":"3","key":"1725_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3133324","volume":"18","author":"JA Padget","year":"2018","unstructured":"J.A. Padget, W.W. Vasconcelos, Fine-grained access control via policy-carrying data. ACM Transactions on Internet Technology (TOIT) 18(3), 1\u201324 (2018)","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"3","key":"1725_CR30","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s10776-019-00434-x","volume":"26","author":"Y Mo","year":"2019","unstructured":"Y. Mo, A data security storage method for IoT under Hadoop cloud computing platform. Int. J. Wireless Inf. Networks 26(3), 152\u2013157 (2019)","journal-title":"Int. J. Wireless Inf. Networks"},{"issue":"2","key":"1725_CR31","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MNET.2017.1500095NM","volume":"31","author":"X Fu","year":"2017","unstructured":"X. Fu, Y. Gao, B. Luo, X. Du, M. Guizani, Security threats to Hadoop: data leakage attacks and investigation. IEEE Netw. 31(2), 67\u201371 (2017)","journal-title":"IEEE Netw."},{"issue":"3-4","key":"1725_CR32","first-page":"229","volume":"12","author":"X Min","year":"2011","unstructured":"X. Min, Q. Yong, W. Kui, Z. Jizhong, L. Mo, Using potential to guide mobile nodes in wireless sensor networks. Ad Hoc & Sensor Wireless Networks 12(3-4), 229\u2013251 (2011)","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"1725_CR33","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1016\/j.ins.2018.02.005","volume":"479","author":"Y Yang","year":"2019","unstructured":"Y. Yang, X. Zheng, W. Guo, X. Liu, V. Chang, Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system. Inf. Sci. 479, 567\u2013592 (2019)","journal-title":"Inf. Sci."},{"issue":"2","key":"1725_CR34","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1109\/JIOT.2016.2571718","volume":"4","author":"K Yang","year":"2016","unstructured":"K. Yang, Q. Han, H. Li, K. Zheng, Z. Su, X. Shen, An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J. 4(2), 563\u2013571 (2016)","journal-title":"IEEE Internet Things J."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01725-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13638-020-01725-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-020-01725-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T23:45:01Z","timestamp":1620344701000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-020-01725-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,7]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,12]]}},"alternative-id":["1725"],"URL":"https:\/\/doi.org\/10.1186\/s13638-020-01725-1","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2020,5,7]]},"assertion":[{"value":"14 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"90"}}