30.1 Overview

In this chapter, we integrate the various parts of a big data system into an automatic framework for carrying out analytics but at the same time ensuring security. In particular, we integrate the analytics techniques with the privacy and security techniques discussed in the previous parts. In developing this framework, we preserve features such as scalability, efficiency, and interoperability. This framework can be used to execute various policies, including access control policies, redaction policies, filtering policies, and information-sharing policies, as well as inference strategies. Our framework can also be used as a testbed for evaluating different policy ...

Get Big Data Analytics with Applications in Insider Threat Detection now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.