The Community for Technology Leaders
2010 IEEE Second International Conference on Cloud Computing Technology and Science (2010)
Indianapolis, Indiana USA
Nov. 30, 2010 to Dec. 3, 2010
ISBN: 978-0-7695-4302-4
pp: 104-111
The Semantic Web is gaining immense popularity—and with it, the Resource Description Framework (RDF)broadly used to model Semantic Web content. However, access control on RDF stores used for single machines has been seldom discussed in the literature. One significant obstacle to using RDF stores defined for single machines is their scalability. Cloud computers, on the other hand, have proven useful for storing large RDF stores, but these system slack access control on RDF data to our knowledge. This work proposes a token-based access control system that is being implemented in Hadoop (an open source cloud computing framework). It defines six types of access levels and an enforcement strategy for the resulting access control policies. The enforcement strategy is implemented at three levels: Query Rewriting, Embedded Enforcement, and Post processing Enforcement. In Embedded Enforcement, policies are enforced during data selection using MapReduce, whereas in Post-processing Enforcement they are enforced during the presentation of data to users. Experiments show that Embedded Enforcement consistently outperforms Post processing Enforcement due to the reduced number of jobs required.

B. Thuraisingham, M. F. Husain, K. W. Hamlen, L. Khan and A. Khaled, "A Token-Based Access Control System for RDF Data in the Clouds," 2010 IEEE Second International Conference on Cloud Computing Technology and Science(CLOUDCOM), Indianapolis, Indiana USA, 2010, pp. 104-111.
83 ms
(Ver 3.3 (11022016))