{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:35Z","timestamp":1773615875395,"version":"3.50.1"},"reference-count":31,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080261","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"903-913","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Big Data Management System Security Threat Model"],"prefix":"10.3103","volume":"53","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]},{"given":"D. P.","family":"Zegzhda","sequence":"additional","affiliation":[]},{"given":"M. O.","family":"Kalinin","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7196_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.jnca.2016.04.008","volume":"71","author":"A. Siddiqa","year":"2016","unstructured":"Siddiqa, A., Hashem, I., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A., and Nasaruddin, F., A survey of big data management: Taxonomy and state-of-the-art, J. Network Comput. Appl., 2016, vol. 71, pp. 151\u2013166. https:\/\/doi.org\/10.1016\/j.jnca.2016.04.008","journal-title":"J. Network Comput. Appl."},{"key":"7196_CR2","series-title":"DBMS technology vs. threats","volume-title":"Database Security: Status and Prospects","author":"T.H. Hinke","year":"1988","unstructured":"Hinke, T.H., DBMS technology vs. threats, in Database Security: Status and Prospects, Amsterdam: North-Holland Publishing Co., 1988."},{"key":"7196_CR3","first-page":"529","volume":"3","author":"M. Qiu","year":"2002","unstructured":"Qiu, M. and Davis, S., Database security mechanisms and implementation, Issues Inf. Syst., 2002, vol. 3, pp.\u00a0529\u2013534.","journal-title":"Issues Inf. Syst."},{"key":"7196_CR4","unstructured":"Lesov, P., Database Security: A Historical Perspectiv, CoRR abs\/1004.4022, 2010. http:\/\/arxiv.org\/ftp\/arxiv\/ papers\/1004\/1004.4022.pdf."},{"key":"7196_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-322-83911-4","volume-title":"Sicherheitsaspekte in der Informationstechnik","year":"1991","unstructured":"Schaefer, M., State of the art and trends in trusted DBMS, in Sicherheitsaspekte in der Informationstechnik, Braunschweig: Vieweg+Teubner Verlag, 1991, pp. 119\u2013143. https:\/\/doi.org\/10.1007\/978-3-322-83911-4"},{"key":"7196_CR6","doi-asserted-by":"publisher","unstructured":"Ghorbanzadeh, P., Shaddeli, A., Malekzadeh, R., and Jahanbakhsh, Z., A survey of mobile database security threats and solutions for it, The 3rd International Conference on Information Sciences and Interaction Sciences, Chengdu, 2010, pp. 676\u2013682. https:\/\/doi.org\/10.1109\/ICICIS.2010.5534685","DOI":"10.1109\/ICICIS.2010.5534685"},{"key":"7196_CR7","unstructured":"Khanuja, H.K. and Adane, D.S., Database security threats and challenges in database forensic: A survey, 2011 International Conference on Advancements in Information Technology, 2011, vol. 20, pp. 1\u20136."},{"key":"7196_CR8","first-page":"239","volume":"8","author":"F. Zaman","year":"2017","unstructured":"Zaman, F. and Raza, B., Self-protection against insider threats in DBMS through policies implementation, Int. J. Adv. Comput. Sci. Appl., 2017, vol. 8, no. 3, pp. 239\u2013240.","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"7196_CR9","doi-asserted-by":"publisher","unstructured":"Sallam, A. and Bertino, E., Detection of temporal insider threats to relational databases, 2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC), San Jose, CA, 2017, pp. 406\u2013415. https:\/\/doi.org\/10.1109\/CIC.2017.00058","DOI":"10.1109\/CIC.2017.00058"},{"key":"7196_CR10","first-page":"810","volume":"3","author":"S. Rohilla","year":"2013","unstructured":"Rohilla, S. and Mittal, P.K., Database security: Threads and challenges, Int. J. Adv. Res. Comput. Sci. Software Eng., 2013, vol. 3, no. 5, pp. 810\u2013813.","journal-title":"Int. J. Adv. Res. Comput. Sci. Software Eng."},{"key":"7196_CR11","unstructured":"Polyakov, A.M., Bezopasnost\u2019 Oracle glazami auditora: Napadenie i zashchita (Oracle Security through Auditor\u2019s Eyes: Attack and Defense), Moscow: DMK-Press, 2014."},{"key":"7196_CR12","unstructured":"Smirnov, S.N., Bezopasnost\u2019 sistem baz dannykh (Database System Security), Moscow: Gelios ARV, 2007."},{"key":"7196_CR13","unstructured":"Utebov, D.R. and Belov, S.V., Classification of threats in database management systems, Vestn. Astrakh. Gos. Tekh. Univ., 2008, no. 1, pp. 87\u201392."},{"key":"7196_CR14","unstructured":"Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 4, pp. 33\u201343."},{"key":"7196_CR15","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1134\/S0361768814060152","volume":"40","author":"S.D. Kuznetsov","year":"2014","unstructured":"Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol.\u00a040, no. 6, pp. 323\u2013332.","journal-title":"Program. Comput. Software"},{"key":"7196_CR16","unstructured":"Poltavtseva, M.A., Modeling of big data management systems in information security, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2019, no. 1, pp. 69\u201378."},{"key":"7196_CR17","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1016\/j.procs.2016.08.075","volume":"94","author":"N. Khan","year":"2016","unstructured":"Khan, N. and Al-Yasiri, A., Identifying cloud security threats to strengthen cloud computing, Adoption Framework Procedia Comput. Sci., 2016, vol. 94, pp. 485\u2013490. https:\/\/doi.org\/10.1016\/j.procs.2016.08.075","journal-title":"Adoption Framework Procedia Comput. Sci."},{"key":"7196_CR18","unstructured":"Big Data Working Group Guidance. Cloud Security Alliance. 2016. https:\/\/cloudsecurityalliance.org\/ group\/big-data\/. Accessed February 26, 2016."},{"key":"7196_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.9790\/0661-1902043137","volume":"19","author":"S. Khan","year":"2017","unstructured":"Khan, S. and Ukey, E., Secure distributed big data storage using cloud computing, IOSR J. Comput. Eng., 2017, vol. 19, no. 4, pp. 8\u201312.","journal-title":"IOSR J. Comput. Eng."},{"key":"7196_CR20","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1109\/ACCESS.2016.2558446","volume":"4","author":"A. Mehmood","year":"2016","unstructured":"Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., and Guo, S., Protection of Big Data privacy, IEEE Access, 2016, vol. 4, pp. 1821\u20131834.","journal-title":"IEEE Access"},{"key":"7196_CR21","unstructured":"Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data lifecycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1\u20137."},{"key":"7196_CR22","doi-asserted-by":"publisher","unstructured":"Kiran, M., Murphy, P., Monga, I., Dugan, J., and Baveja, S., Lambda architecture for cost-effective batch and speed big data processing, 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, 2015, pp. 2785\u20132792. https:\/\/doi.org\/10.1109\/BigData.2015.7364082","DOI":"10.1109\/BigData.2015.7364082"},{"key":"7196_CR23","unstructured":"Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018."},{"key":"7196_CR24","doi-asserted-by":"crossref","unstructured":"Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C\u201917 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118\u2013120.","DOI":"10.1109\/ICSE-C.2017.64"},{"key":"7196_CR25","volume-title":"NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence","author":"P.J. Sadalage","year":"2012","unstructured":"Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012."},{"key":"7196_CR26","doi-asserted-by":"publisher","first-page":"72714","DOI":"10.1109\/ACCESS.2018.2881998","volume":"6","author":"Igor Kotenko","year":"2018","unstructured":"Kotenko, I., Saenko, I., and Branitskiy, A., Framework for mobile Internet of Things security monitoring based on Big Data processing and machine learning, IEEE Access, 2018, vol. 6. https:\/\/doi.org\/10.1109\/ACCESS.2018.2881998","journal-title":"IEEE Access"},{"key":"7196_CR27","doi-asserted-by":"publisher","first-page":"945","DOI":"10.3103\/S0146411618080230","volume":"52","author":"M.A. Poltavtseva","year":"2018","unstructured":"Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945\u2013953.","journal-title":"Autom. Control Comput. Sci."},{"key":"7196_CR28","doi-asserted-by":"crossref","unstructured":"Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36\u201341.","DOI":"10.15827\/0236-235X.115.036-041"},{"key":"7196_CR29","unstructured":"Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008."},{"key":"7196_CR30","unstructured":"Markov, A.S. and Fadin, A.A., Systematics of vulnerabilities and security defects of software resources, Zashch. Inf., INSIDE, 2013, no. 3, pp. 2\u20137."},{"key":"7196_CR31","volume-title":"The ANSI\/SPARC DBMS Model","author":"D.A. Jardin","year":"1977","unstructured":"Jardin, D.A., The ANSI\/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080261.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080261","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080261.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:06:05Z","timestamp":1773612365000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080261"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":31,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7196"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080261","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"15 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}