Professional Documents
Culture Documents
KASSIMI dounya, KAZAR Okba, and SAOULI SAIFI Safa and HASSANI Iman
Hamza Department of Computer Science, University of Mohamed
LINFI Laboratory KHIDER, Biskra, Algeria
Department of Computer Science, University of Mohamed safa16saif@gmail.com, rose.rose.hass@gmail.com
KHIDER, Biskra, Algeria
dounya_kassimi@yahoo.fr, kazarokba@yahoo.fr,
hamza_saouli@yahoo.fr
BOUSSAID Omar
ERIC Laboratory - Warehouse, Knowledge Representation
and Engineering
Department of Psychology of Health, Education and
Development (PSED), University Lumiere Lyon 2
Bron, Rhone-Alpes, France
omar.boussaid@univ-lyon2.fr
Abstract—Big Data dwarfs all the knowledge that we knew in In this paper we propose a new approach based on agents,
this decade and also for the rest of our natural lives as well. It is to ensure bigdata security. The main objectives are: ensuring
more than just lot of data, it represents the end beginning of secure data transmission, avoiding data losing, scanning and
industry experience as core competitive advantage. In this paper detecting any intrusion and protecting the already stocked data
we treat the problem of Big Data security and privacy using by taking into consideration the access level of system users.
Mobil and stationary agents’ technologies. Section 2 presents
some related works, in section 3, we explain the proposed The remain of the paper is organised as follow: section 2
architecture. The proposed architecture is mainly based on: related works with their drawbacks, section 3 the proposed
Integrity agent for verifying data concordance, path agent to architecture, section 4 realisation and implementation and
ensure data transmission, and Intrusion detection agent to scan section 5 conclude this work.
the stored data. In section 4, we implemented a prototype and we
use a real Big Data base, to test the effectiveness of using Multi
I. RELATED WORKS
agent systems to improve data security and privacy.
In [2], the authors presented a system of analyzing and
Keywords—Big data; Security; Multi-Agent system; Pentaho preserving the information in Big Data called Crypsis. Crypsis
is using the Homomorphic cryptography method, which is
I. INTRODUCTION based on both extended program and system perspective. This
method has its risks because it is not always available; and
Data protection become the major problem that needs our also Crypsis does not address integrity and availability issues.
attention especially after the apparition of Big Data notion.
This notion involves [1] volume, variety and velocity In [3], the authors presented a set of methods that are used
constraints, which increase the number and types of threats. to protect privacy which is previously placed by computer
scientists and statisticians. And also presented the problems in
Big Data is based on a set of technologies like: Hadoop, those methods for example: the Aggregation (has the problem
MapReduce, spark and so on, to secure and protect massive of ecological inference) and Delete (can delete integer values,
amounts of produced petaoctect each day. which creates missing and difficult to parse data).
By security we essentially mean, confidentiality, integrity, In [4], the authors addressed the multi-level security
availability and data utility. To ensure all these security (MLS). It is it is generally based on a formal model called the
constraints we need to take into consideration the data routing, Bell-LaPadula model. The MLS brings the change in how to
intrusion detection and the access level of each user. protect privacy in SE Linux. The weakness of MLS is the fact
that it implements a unique security objective that protects the
In our proposition we define a solution for previous four A. External security system
criteria’s: two agents for Integrity (mobile agent and Integrity
agent), one agent for Authentication (Authentication agent), In this section, we select an agent to represent from external
for the Privacy and Access control we have two agent security system, we name it as MOBILE AGENT and its role is:
(ACCESS Level agent and Interface agent). Also we have an • Protection of data path;
agent for Intrusion detection.
• Guaranteed not to lose data in the shipment;
We present the overall architecture of the proposed system
that is depicted by “Figure 1” • Assured that there is no intervention;
• This agent works with integrity agent and the agent
virtual return.
B. EVALUATION
The architecture that we proposed allow as to reduce
network traffic and bandwith requirement by using the mobile
agent and also robustness and faults and faults tolerance.
Using the DNA algorithm for deciphering the files we can trait
a big number of files because the DNA algorithm in one of the
popular algorithm’s used by the users. We need to extend it to
support integration of hundreds of access control policies. At