Blockchain-based security and access control for BIM big data

Author(s):  
Rongyue Zheng ◽  
Jianlin Jiang ◽  
Xiaohan Hao ◽  
Wei Ren ◽  
Lizhe Wang ◽  
...  
Keyword(s):  
Big Data ◽  
2021 ◽  
Vol 1955 (1) ◽  
pp. 012021
Author(s):  
Nianzu Liu ◽  
Weichen Ma ◽  
Danjie Shen ◽  
Bing Guo

Author(s):  
Liangli Ma ◽  
Jinyi Guo ◽  
Wei Ren ◽  
Vi Ren ◽  
Lizhe Wang ◽  
...  

Big Data ◽  
2016 ◽  
pp. 441-453
Author(s):  
Min Chen

In this chapter, the author proposes a hierarchical security model (HSM) to enhance security assurance for multimedia big data. It provides role hierarchy management and security roles/rules administration by seamlessly integrating the role-based access control (RBAC) with the object-oriented concept, spatio-temporal constraints, and multimedia standard MPEG-7. As a result, it can deal with challenging and unique security requirements in the multimedia big data environment. First, it supports multilayer access control so different access permission can be conveniently set for various multimedia elements such as visual/audio objects or segments in a multimedia data stream when needed. Second, the spatio-temporal constraints are modeled for access control purpose. Finally, its security processing is efficient to handle high data volume and rapid data arrival rate.


Author(s):  
Sylvia L. Osborn ◽  
Daniel Servos ◽  
Motahera Shermin
Keyword(s):  
Big Data ◽  

2018 ◽  
Vol 7 (4.10) ◽  
pp. 504
Author(s):  
K. Kavitha ◽  
D. Anuradha ◽  
P. Pandian

Huge amount of health care data are available online to improve the overall performance of health care system. Since this huge health care Big-data is valuable and sensitive, it requires safety. In this paper we analyze numerous ways in which the health care Big-data can be protected. In recent days many augmented security algorithm that are suitable for Big-data have emerged like, El-Gamal, Triple-DES, and Homomorphic algorithms. Also authentication and access control can be implemented over Big-data using Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) schemes.Along with security to Big-data we try to evolve the ways in which the valuable Big-data can be optimized to improve the Big-data analysis. Mathematical optimization techniques such as simple and multi-purpose optimization and simulation are employed in Big-data to maximize the patient satisfaction and usage of doctor’s consulting facility. And also, to minimize the cost spent by patient and energy wasted.  


Sign in / Sign up

Export Citation Format

Share Document