Security by Design for Big Data Frameworks Over Cloud Computing

Feras M. Awaysheh, Mohammad N. Aladwan, Mamoun Alazab, Sadi Alawadi, Jose C. Cabaleiro, Tomas F. Pena

    Research output: Contribution to journalArticlepeer-review

    62 Citations (Scopus)

    Abstract

    Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a such deployment model, the data are no longer physically maintained under the user’s direct control, which raises new security concerns. In this context, BD security plays a decisive role in the widespread adoption of cloud architectures. However, it is challenging to develop a comprehensive security plan unless it is based on a preliminary analysis that ensures a realistic secure assembly and addresses domain-specific vulnerabilities. This article presents a novel security-by-design framework for BD frameworks deployment over cloud computing (BigCloud). In particular, it relies on a systematic security analysis methodology and a completely automated security assessment framework. Our framework enables the mapping of BigCloud security domain knowledge to the best practices in the design phase. We validated the proposed framework by implementing an Apache Hadoop stack use case. The study findings demonstrate its effectiveness in improving awareness of security aspects and reducing security design time. It also evaluates the strengths and limitations of the proposed framework, from which it highlights the main existing and open challenges in the BigCloud-related area.

    Original languageEnglish
    Pages (from-to)3676-3693
    Number of pages18
    JournalIEEE Transactions on Engineering Management
    Volume69
    Issue number6
    Early online dateFeb 2021
    DOIs
    Publication statusPublished - Dec 2022

    Fingerprint

    Dive into the research topics of 'Security by Design for Big Data Frameworks Over Cloud Computing'. Together they form a unique fingerprint.

    Cite this