Jan Zizka et al. (Eds) : ICAITA, SAI, CDKP, Signal, NCO - 2015
pp. 183–198, 2015. © CS & IT-CSCP 2015 DOI : 10.5121/csit.2015.51515
Amine RAHMANI, Abdelmalek AMINE and Mohamed Reda HAMOU
GeCoDe Laboratory, Department of Informatics,
Dr. TAHAR Moulay university of Saida – Algeria-
Aminerahmani2091@gmail.com, amine_abd1@yahoo.fr,
hamoureda@yahoo.fr
ABSTRACT
Nowadays, the concept of big data grows incessantly; recent researches proved that 90% of the
whole data existed on the web had been created in last two years. However, this growing
bumped by many critical challenges resides generally in security level; the users care about
how could providers protect their privacy on their data. Access control, cryptography, and de-
identification are the main search areas grouped under a specific domain known as Privacy
Preserving Data Publishing. In this paper, we bring in suggestion a new model for access
control over big data using digital signature and confidence interval; we first introduce our
work by presenting some general concepts used to build our approach then presenting the idea
of this report and finally we evaluate our system by conducting several experiments and
showing and discussing the results that we got.
KEYWORDS
Access control, standard deviation, privacy preserving, big data, numeric signature, confidence
interval
1. INTRODUCTION
Privacy, timeless, scalability of data is the most important problems that big data recognize
starting from the first step of data acquisition; in fact, one of the most disturbed principle that are
used in big data is the fact of losing control on data. This concept led to a lot of criticism from
clients, losing control on your own data means losing everything related to the control even the
access control.
Before the coming of the concept big data, controlling access on such data was done locally using
the known models such as mandatory models (MAC), discriminatory models (DAC) or role
based models (RBAC) but those last cannot be used because of some impediments; in case of
DAC models the users defines the right access by himself while in the use of big data the user
lose the entire control on his data; in case of MAC models the right access are defined by a major