Abstract—
The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the considered systems are highlighted. The model and architecture of data processing are mathematically described based on the ANSI/SPARC concept and the principles of modeling information systems in IS. The model is analyzed.



Similar content being viewed by others
REFERENCES
Kuznetsov, S.D. and Poskonin, A.V., NoSQL data management systems, Program. Comput. Software, 2014, vol. 40, no. 6, pp. 323–332. https://doi.org/10.1134/S0361768814060152
Kuznetsov, S.D., New storage devices and the future of database management, Balt. J. Mod. Comput., 2018, vol. 6, no. 1, pp. 1–12. https://doi.org/10.22364/bjmc.2018.6.1.01
Kogalovskii, M.R., Entsiklopediya tekhnologii baz dannykh (Encyclopedia of Database Technologies), Moscow: Finansy Stat., 2002.
Zegzhda, D.P., Vasil’ev, Yu.S., and Poltavtseva, M.A., Approaches to modeling the security of cyberphysical systems, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1000–1009.
Boyd, D. and Crawford, K., Critical questions for Big Data, Inf. Commun. Soc., 2012, vol. 15, no. 5, pp. 662–679. https://doi.org/10.1080/1369118X.2012.678878
Rouf, Y., Shtern, M., Fokaefs, M., and Litoiu, M., A hierarchical architecture for distributed security control of large scale systems, ICSE-C’17 Proceedings of the 39th International Conference on Software Engineering Companion, Buenos Aires, 2017, pp. 118–120.
Jardin, D.A., The ANSI/SPARC DBMS Model, Montreal: North-Holland Pub. Co., 1977.
Gergel’, V.P. and Strongin, R.G., Osnovy parallel’nykh vychislenii dlya mnogoprotsessornykh vychislitel’nykh sistem (Fundamentals of Parallel Computing for Multiprocessor Computing Systems), Nizhny Novgorod: Nizhegorod. Gos. Univ., 2001.
Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, SIN’17 Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, 2017, pp. 295–298.
Gaidamakin, N.A., Razgranichenie dostupa k informatsii v komp’yuternykh sistemakh (Differentiation of Information Access in Computer Systems), Yekaterinburg: Ural. Univ., 2003.
Zegzhda, D.P., A general scheme of mandatory security models and its application for proving the security of information processing systems, Probl. Inf. Bezop., Komp’yut. Sist., 2000, no. 2, pp. 28–32.
Devyanin, P.N., Modeli bezopasnosti komp’yuternykh sistem (Security Models of Computer Systems), Moscow: Izd. Tsentr Akademiya, 2005.
Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-physical system homeostatic security management, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 805–816.
Funding
The reported study was funded by RFBR according to the research project no. 18-29-03102.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by O. Pismenov
About this article
Cite this article
Poltavtseva, M.A., Kalinin, M.O. Modeling Big Data Management Systems in Information Security. Aut. Control Comp. Sci. 53, 895–902 (2019). https://doi.org/10.3103/S014641161908025X
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S014641161908025X