{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:34Z","timestamp":1773655594591,"version":"3.50.1"},"reference-count":47,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.3103\/s0146411619080273","type":"journal-article","created":{"date-parts":[[2020,3,4]],"date-time":"2020-03-04T09:03:07Z","timestamp":1583312587000},"page":"914-921","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A Consistent Approach to Building Secure Big Data Processing and Storage Systems"],"prefix":"10.3103","volume":"53","author":[{"given":"M. A.","family":"Poltavtseva","sequence":"first","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2020,3,4]]},"reference":[{"key":"7197_CR1","unstructured":"Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002."},{"key":"7197_CR2","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.jnca.2016.04.008","volume":"71","author":"A. Siddiqa","year":"2016","unstructured":"Siddiqa, A., Hashem, I., Yaqoob, I., Marjani, M., Shamshirband, S., Gani, A., and Nasaruddin, F., A survey of big data management: Taxonomy and state-of-the-art, J. Network Comput. Appl., 2016, vol. 71, pp. 151\u2013166. https:\/\/doi.org\/10.1016\/j.jnca.2016.04.008","journal-title":"J. Network Comput. Appl."},{"key":"7197_CR3","unstructured":"Semenov, N.A. and Poltavtsev, A.A., The security organization of data architectures based on cloud systems, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2018, no. 4, pp. 33\u201343."},{"key":"7197_CR4","doi-asserted-by":"publisher","unstructured":"Hu, C., Grance, T., Ferraiolo, D.F., and Kuhn, D.R., An access control scheme for Big Data processing, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, 2014, pp. 1\u20137. https:\/\/doi.org\/10.4108\/icst.collaboratecom.2014.257649","DOI":"10.4108\/icst.collaboratecom.2014.257649"},{"key":"7197_CR5","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MITP.2015.34","volume":"17","author":"C. Perera","year":"2015","unstructured":"Perera, C., Ranjan, R., Wang, L., Khan, S.U., and Zomaya, A.Y., Big Data privacy in the Internet of Things era, IT Prof., 2015, vol. 17, no. 3, pp. 32\u201339.","journal-title":"IT Prof."},{"key":"7197_CR6","doi-asserted-by":"publisher","unstructured":"Reddy, Y.B., Access control mechanisms in Big Data processing, Software Engineering and Applications\/831: Advances\u00a0in Power and Energy Systems (SEA 2015), Marina del Rey, 2015. https:\/\/doi.org\/10.2316\/P.2015.829-006","DOI":"10.2316\/P.2015.829-006"},{"key":"7197_CR7","series-title":"Big Data security and privacy","volume-title":"A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years","author":"E. Bertino","year":"2018","unstructured":"Bertino, E. and Ferrari, E., Big Data security and privacy, in A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years, Cham: Springer, 2018, vol. 31."},{"key":"7197_CR8","doi-asserted-by":"publisher","unstructured":"Klein, J., Buglak, R., Blockow, D., Wuttke, T., and Cooper, B., A reference architecture for Big Data systems in the national security domain, 2016 IEEE\/ACM 2nd International Workshop on Big Data Software Engineering (BIGDSE), Austin, TX, 2016, pp. 51\u201357. https:\/\/doi.org\/10.1109\/BIGDSE.2016.017","DOI":"10.1109\/BIGDSE.2016.017"},{"key":"7197_CR9","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s41019-016-0016-y","volume":"1","author":"F. Akeel","year":"2016","unstructured":"Akeel, F., Fathabadi, A.F., Paci, F., et al., Formal modelling of data integration systems security policies, Data Sci. Eng., 2016, vol. 1, no. 3, pp. 139\u2013148. https:\/\/doi.org\/10.1007\/s41019-016-0016-y","journal-title":"Data Sci. Eng."},{"key":"7197_CR10","unstructured":"Sinaeepourfard, A., Krogstie, J., and Petersen, S.A., A Big Data management architecture for smart cities based on fog-to-cloud data management architecture, Proceedings of the 4th Norwegian Big Data Symposium (NOBIDS 2018), Trondheim, 2018."},{"key":"7197_CR11","doi-asserted-by":"crossref","unstructured":"Blanco, C., Garc\u00eda-Saiz, D., Peral, J., Mat\u00e9, A., Oliver, A., and Fern\u00e1ndez-Medina, E., How the conceptual modelling improves the security on document databases, Lect. Notes Comput. Sci., 2018, vol. 11157.","DOI":"10.1007\/978-3-030-00847-5_36"},{"key":"7197_CR12","unstructured":"Paine, D., Sy, E., Piell, R., and Lee, Ch., Examining data processing work as part of the scientific data lifecycle: Comparing practices across four scientific research groups, iConference2015Proceedings. http:\/\/hdl.handle.net\/2142\/73644."},{"key":"7197_CR13","unstructured":"Alshboul, Y., Wang, Y., and Nepali, R.K., Big Data LifeCycle: Threats and security model, Proceedings of the 21st Americas Conference on Information Systems (AMCIS 2015), 2015, Fajardo, 2015, pp. 1\u20137."},{"key":"7197_CR14","doi-asserted-by":"publisher","first-page":"1821","DOI":"10.1109\/ACCESS.2016.2558446","volume":"4","author":"A. Mehmood","year":"2016","unstructured":"Mehmood, A., Natgunanathan, I., Xiang, Y., Hua, G., and Guo, S., Protection of Big Data privacy, IEEE Access, 2016, vol. 4, pp. 1821\u20131834. https:\/\/doi.org\/10.1109\/ACCESS.2016.2558446","journal-title":"IEEE Access"},{"key":"7197_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi8030044","volume":"8","author":"J. Moreno","year":"2016","unstructured":"Moreno, J., Serrano, M.A., and Fern\u00e1ndez-Medina, E., Main issues in Big Data security, Future Internet, 2016, vol. 8, no. 3, pp. 1\u201344. https:\/\/doi.org\/10.3390\/fi8030044","journal-title":"Future Internet"},{"key":"7197_CR16","doi-asserted-by":"crossref","unstructured":"Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C '17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118\u2013120.","DOI":"10.1109\/ICSE-C.2017.64"},{"key":"7197_CR17","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1134\/S0361768814060152","volume":"40","author":"S.D. Kuznetsov","year":"2014","unstructured":"Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol.\u00a040, no. 6, pp. 323\u2013332. https:\/\/doi.org\/10.1134\/S0361768814060152","journal-title":"Program. Comput. Software"},{"key":"7197_CR18","volume-title":"NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence","author":"P.J. Sadalage","year":"2012","unstructured":"Sadalage, P.J. and Fowler, M., NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot Persistence, Addison-Wesley, 2012."},{"key":"7197_CR19","doi-asserted-by":"publisher","first-page":"72714","DOI":"10.1109\/ACCESS.2018.2881998","volume":"6","author":"Igor Kotenko","year":"2018","unstructured":"Kotenko, I., Saenko, I., and Branitskiy, A., Framework for mobile Internet of Things security monitoring based on Big Data processing and machine learning, IEEE Access, 2018, vol. 6. https:\/\/doi.org\/10.1109\/ACCESS.2018.2881998","journal-title":"IEEE Access"},{"key":"7197_CR20","doi-asserted-by":"publisher","first-page":"945","DOI":"10.3103\/S0146411618080230","volume":"52","author":"M.A. Poltavtseva","year":"2018","unstructured":"Poltavtseva, M.A. and Shterenberg, S.I., A distributed intrusion detection system with protection from an internal intruder, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 945\u2013953.","journal-title":"Autom. Control Comput. Sci."},{"key":"7197_CR21","doi-asserted-by":"publisher","first-page":"703","DOI":"10.3103\/S0146411616080162","volume":"50","author":"M.A. Poltavtseva","year":"2016","unstructured":"Poltavtseva, M.A., Lavrova, D.S., and Pechenkin, A.I., Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster, Autom. Control Comput. Sci., 2016, vol. 50, no.\u00a08, pp. 703\u2013711.","journal-title":"Autom. Control Comput. Sci."},{"key":"7197_CR22","unstructured":"Kuznetsov, D., Bazy dannykh: Yazyki i modeli (Databases: Languages and Models), Moscow: Binom, 2008."},{"key":"7197_CR23","doi-asserted-by":"crossref","unstructured":"Poltavtseva, M.A. and Khabarov, A.R., Database security: Problems and prospects, Program. Prod. Sist., 2016, no. 3-1, pp. 36\u201341.","DOI":"10.15827\/0236-235X.115.036-041"},{"key":"7197_CR24","unstructured":"D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., Montjoye, Y.D., and Bourka, A., Privacy by design in big data: An overview of privacy enhancing technologies in the era of big data analytics, CoRR, abs\/1512.06000, 2015. https:\/\/arxiv.org\/abs\/1512.06000."},{"key":"7197_CR25","unstructured":"Reddy, Y.B., Access control for sensitive data in Hadoop distributed file systems, Third International Conference on Advanced Communications and Computation, INFOCOMP 2013, Lisbon, 2013."},{"key":"7197_CR26","series-title":"Security and privacy in big data lifetime: A review","volume-title":"Security, Privacy and Anonymity in Computation, Communication and Storage","author":"C. Hanlu","year":"2016","unstructured":"Hanlu, C. and Zheng, Y., Security and privacy in big data lifetime: A review, in Security, Privacy and Anonymity in Computation, Communication and Storage, Cham: Springer Nature, 2016, pp. 3\u201315."},{"key":"7197_CR27","doi-asserted-by":"crossref","unstructured":"Bertino, E., Verma, D.C., and Calo, S.B., A policy system for control of data fusion processes and derived data, 2018 21st International Conference on Information Fusion (FUSION), Cambridge, UK, 2018, pp. 807\u2013813.","DOI":"10.23919\/ICIF.2018.8455563"},{"key":"7197_CR28","unstructured":"Akeel, F.Y., Secure data integration systems, Thesis for the Degree of Doctor of Philosophy, 2017. https:\/\/eprints.soton.ac.uk\/415716\/1\/Final_thesis.pdf."},{"key":"7197_CR29","unstructured":"Lesov, P., Database Security: A Historical Perspective, CoRR abs\/1004.4022, 2010. http:\/\/arxiv.org\/ftp\/arxiv\/ papers\/1004\/1004.4022.pdf."},{"key":"7197_CR30","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1080\/1369118X.2012.678878","volume":"15","author":"D. Boyd","year":"2012","unstructured":"Boyd, D. and Crawford, K., Critical questions for Big Data, Inf. Commun. Soc., 2012, vol. 15, no. 5, pp. 662\u2013679. https:\/\/doi.org\/10.1080\/1369118X.2012.678878","journal-title":"Inf. Commun. Soc."},{"key":"7197_CR31","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.procs.2016.09.119","volume":"100","author":"K.A. Salleh","year":"2016","unstructured":"Salleh, K.A. and Janczewski, L., Technological, organizational and environmental security and privacy issues of big data: A literature review, Procedia Comput. Sci., 2016, vol. 100, pp. 19\u201328. https:\/\/doi.org\/10.1016\/j.procs.2016.09.119","journal-title":"Procedia Comput. Sci."},{"key":"7197_CR32","doi-asserted-by":"publisher","first-page":"679","DOI":"10.3103\/S0146411615080088","volume":"49","author":"A.S. Konoplev","year":"2015","unstructured":"Konoplev, A.S. and Kalinin, M.O., Access control method in distributed grid computing networks, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 679\u2013683.","journal-title":"Autom. Control Comput. Sci."},{"key":"7197_CR33","unstructured":"Banaeian, S.F. and Imani, R.A., Security analysis of Big Data on Internet of Things, 2018. https:\/\/arxiv.org\/ abs\/1808.09491."},{"key":"7197_CR34","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.future.2014.08.007","volume":"49","author":"L. Chang","year":"2015","unstructured":"Chang, L., Chi, Y., Xuyun, Z., and Jinjun, Ch., External integrity verification for outsourced big data in cloud and IoT: A big picture, Future Gen. Comput. Syst., 2015, vol. 49, pp. 58\u201367. https:\/\/doi.org\/10.1016\/j.future.2014.08.007","journal-title":"Future Gen. Comput. Syst."},{"key":"7197_CR35","doi-asserted-by":"publisher","unstructured":"Jutla, D.N. and Bodorik, P., PAUSE: A privacy architecture for heterogeneous big data environments, 2015 IEEE International Conference on Big Data (Big Data), Santa Clara, CA, 2015, pp. 1919\u20131928. https:\/\/doi.org\/10.1109\/BigData.2015.7363969","DOI":"10.1109\/BigData.2015.7363969"},{"key":"7197_CR36","doi-asserted-by":"publisher","unstructured":"Haourani, L.E., Elkalam, A.A., and Ouahman, A.A., Knowledge based access control a model for security and privacy in the Big Data, Proceedings of the 3rd International Conference on Smart City Applications (SCA '18), ACM, New York, 2018, pp. 1\u20138. https:\/\/doi.org\/10.1145\/3286606.3286793","DOI":"10.1145\/3286606.3286793"},{"key":"7197_CR37","doi-asserted-by":"publisher","unstructured":"Xhang, X., Zhenyu, W., Zhichun, L., Kangkook, J., Junghwan, R., Xusheng, X., Fengyuan, X., Haining, W., and Guofei, J., High fidelity data reduction for big data security dependency analyses, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16), New York, 2016, pp. 504\u2013516. https:\/\/doi.org\/10.1145\/2976749.2978378","DOI":"10.1145\/2976749.2978378"},{"key":"7197_CR38","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.dcan.2017.07.007","volume":"3","author":"K.T.K. Ashwin","year":"2017","unstructured":"Ashwin, K.T.K., Hong, L., Johnson, P.T., and Xiaofeh, H., Content sensitivity based access control framework for Hadoop, Digital Commun.Networks, 2017, vol. 3, no. 4, pp. 213\u2013225. https:\/\/doi.org\/10.1016\/j.dcan.2017.07.007","journal-title":"Networks"},{"key":"7197_CR39","doi-asserted-by":"publisher","unstructured":"Idar, H.A., Aissaoui, K., Belhadaoui, H., and Hilali, R.F., Dynamic data sensitivity access control in Hadoop platform, 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), Marrakech, 2018, pp. 105\u2013109. https:\/\/doi.org\/10.1109\/CIST.2018.8596381","DOI":"10.1109\/CIST.2018.8596381"},{"key":"7197_CR40","unstructured":"Uemov, A.I., Sistemnyi podkhod i obshchaya teoriya sistem (The System Approach and General Theory of Systems), Moscow: Mysl\u2019, 1978."},{"key":"7197_CR41","volume-title":"The ANSI\/SPARC DBMS Model","author":"D.A. Jardin","year":"1977","unstructured":"Jardin, D.A., The ANSI\/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977."},{"key":"7197_CR42","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1145\/362384.362685","volume":"13","author":"E.F. Codd","year":"1970","unstructured":"Codd, E.F., A relational model of data for large shared data banks, Comm. ACM, 1970, vol. 13, no. 6, pp. 377\u2013387.","journal-title":"Comm. ACM"},{"key":"7197_CR43","unstructured":"Date, C.J. and Darwen, H., Foundation for Object\/Relational Databases: The Third Manifesto, Reading, Massachusets: Addison-Wesley, 1998."},{"key":"7197_CR44","volume-title":"Hadoop: The Definitive Guide","author":"T. White","year":"2010","unstructured":"White, T., Hadoop: The Definitive Guide, O\u2019Reilly Media, Inc. 2010."},{"key":"7197_CR45","doi-asserted-by":"publisher","unstructured":"Nandimath, J., Banerjee, E., Patil, A., Kakade, P., Vaidya, S., and Chaturvedi, D., Big data analysis using Apache Hadoop, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI), San Francisco, CA, 2013, pp. 700\u2013703. https:\/\/doi.org\/10.1109\/IRI.2013.6642536","DOI":"10.1109\/IRI.2013.6642536"},{"key":"7197_CR46","doi-asserted-by":"publisher","unstructured":"Brewer, E.A., A certain freedom: Thoughts on the CAP theorem, PODC\u201910 Proceedings of the 29th ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing, New York, 2010, pp. 335\u2013336. https:\/\/doi.org\/10.1145\/1835698.1835701","DOI":"10.1145\/1835698.1835701"},{"key":"7197_CR47","unstructured":"Poltavtseva, M.A., Modeling of Big data management systems in information security, Probl. Inf. Bezop., Komp\u2019yut. Sist., 2019, no. 1, pp. 69\u201378."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080273.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411619080273","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411619080273.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:52Z","timestamp":1773612352000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411619080273"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":47,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["7197"],"URL":"https:\/\/doi.org\/10.3103\/s0146411619080273","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12]]},"assertion":[{"value":"15 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 March 2019","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2019","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 March 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}