{"title":"Cyber Security Meets Big Knowledge: Towards a Secure HACE Theorem","authors":"B. Thuraisingham","doi":"10.1109/ICBK50248.2020.00010","DOIUrl":null,"url":null,"abstract":"The HACE Theorem has emerged as a way to characterize big data. Over the years it has become fundamental to big data characterization as the Newton’s Laws are to Physics. Associated with the HACE theorem is the Big Data Processing Framework for storing, managing, analyzing and sharing massive amounts of heterogenous, autonomous and distributed data with complex and evolving relationships. This paper examines the security and privacy aspects for the HACE theorem. It argues that what is needed is a Policy-Aware Big Data Processing Framework for the collection, storage, management, mining, and sharing of the massive amounts of data. It also examines knowledge graphs to represent the big data and determines ways to reason about the graphs and yet maintain security and privacy.","PeriodicalId":432857,"journal":{"name":"2020 IEEE International Conference on Knowledge Graph (ICKG)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE International Conference on Knowledge Graph (ICKG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICBK50248.2020.00010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The HACE Theorem has emerged as a way to characterize big data. Over the years it has become fundamental to big data characterization as the Newton’s Laws are to Physics. Associated with the HACE theorem is the Big Data Processing Framework for storing, managing, analyzing and sharing massive amounts of heterogenous, autonomous and distributed data with complex and evolving relationships. This paper examines the security and privacy aspects for the HACE theorem. It argues that what is needed is a Policy-Aware Big Data Processing Framework for the collection, storage, management, mining, and sharing of the massive amounts of data. It also examines knowledge graphs to represent the big data and determines ways to reason about the graphs and yet maintain security and privacy.