Computer Science ›› 2026, Vol. 53 ›› Issue (2): 187-195.doi: 10.11896/jsjkx.251000127

• Database & Big Data & Data Science • Previous Articles     Next Articles

Fine-grained Access Control Model for Big Data Based on Dynamic Data Sensitivity Levels

ZHANG Huan1, HOU Mingxing2, LIU Guangna3 , SHI Ying4   

  1. 1 School of Computer Science and Technology,Taiyuan Normal University,Jinzhong,Shanxi 030619,China
    2 College of Big Data,Taiyuan University of Technology,Taiyuan 030006,China
    3 School of Biomedical Sciences,Hunan University,Changsha 410081,China
    4 School of Computer and Information Technology,Shanxi University,Taiyuan 030006,China
  • Received:2025-10-27 Revised:2025-12-10 Published:2026-02-10
  • About author:ZHANG Huan,born in 1988,master,experimenter.Her main research interests include big data and artificial intelligence.
    SHI Ying,born in 1990,master,asso-ciate professor.Her main research in-terests include artificial intelligence and big data.
  • Supported by:
    Youth Fund of the National Natural Science Foundation of China (82303739) and Shanxi Provincial Education Department Project(2024W129).

Abstract: Aiming at the problem that static access control model is difficult to adapt to data dynamics and context variability in big data environment,this paper proposes a fine-grained access control model based on dynamic data sensitivity level.The model first constructs a multi-dimensional quantitative assessment system to dynamically calculate the real-time sensitivity level of data by analyzing the data content,contextual environment and historical operation behaviors,which overcomes the rigidity of traditional static classification.On this basis,the dynamic sensitivity level is taken as the core decision attribute,and deeply integrated with the attribute-based access control model,a context-adaptive permission dynamic granting and revocation mechanism is designed,which realizes the precise control of different users’ access behaviors at different times,places and scenarios.Experimental results show that the model can effectively perceive the changes in data value and risk while ensuring low performance overhead.Compared with the traditional role-based access control model and the static attribute-based access control model,it significantly improves the accuracy and security of privilege assignment,and it is especially suitable for the big data application scenarios with frequent data flow and changing security requirements,which provides an effective way to build an intelligent and adaptive data security protection system.

Key words: Big data security, Access control, Fine-grained, Dynamic sensitivity levels, Attribute-based access control

CLC Number: 

  • TP391
[1]BERTINO E,GHINITA G,KAMRA A.Access control for databases:Concepts and systems[J].Foundations and Trends in Databases,2011,3(1/2):1-148.
[2]QIU J,TIAN Z,DU C,et al.A survey on access control in the age of internet of things[J].IEEE Internet of Things Journal,2020,7(6):4682-4696.
[3]TONG F,SHAO R R.Research on Cloud Data Access Control Model Based on Blockchain[J].Computer Science,2023,50(9):16-25.
[4]ZHANG S W,LI B Y,DENG L M.Context-aware Adaptive Access Control Model[J].Application Research of Computers,2024,41(9):2839-2845.
[5]FAN F W.Research on sensitive data classification and intelligent access control technology in education industry[J].Cybersecurity & Informatization,2025(8):141-143.
[6]HUANG J J,FANG Q.Access control model of cloud computing based on context and role[J].Computer Application,2015,35(2):393-396.
[7]WANG X T,LIAN B.Analysis of an attribute-based dynamicaccess control technology[J].Integrated Circuit Application,2025,42(3):110-111.
[8]BHATT S,PHAM T K,GUPTA M,et al.Attribute-based access control for AWS internet of things and secure industries of the future[J].IEEE Access,2021,9:107200-107223.
[9]IKE C C,IGE A B,OLADOSU S A,et al.Redefining zero trust architecture in cloud networks:A conceptual shift towards granular,dynamic access control and policy enforcement[J].Magna Scientia Advanced Research and Reviews,2021,2(1):74-86.
[10]TANVEER M,KUMAR N,NAUSHAD A,et al.A robust access control protocol for the smart grid systems[J].IEEE Internet of Things Journal,2021,9(9):6855-6865.
[11]ZONG J,WANG C,SHEN J,et al.ReLAC:Revocable and lightweight access control with blockchain for smart consumer electronics[J].IEEE Transactions on Consumer Electronics,2023,70(1):3994-4004.
[12]WANG Q X,DONG L J,JIA W,et al.Dynamic access control based on vector representation and calculation in open environment[J].Computer Science,2022,49(S2):727-733.
[13]ATLAM H F,WALTERS R J,WILLS G B,et al.Fuzzy logic with expert judgment to implement an adaptive risk-based access control model for IoT[J].Mobile Networks and Applications,2021,26(6):2545-2557.
[14]PAN R J,WANG G C,HUANG H G.Attribute Access Control Based on Dynamic User Trust in Cloud Computing[J].Computer Science,2021,48(5):313-319.
[15]PARK J S,SANDHU R,AHN G J.Role-based access control on the web[J].ACM Transactions on Information and System Security,2001,4(1):37-71.
[16]GOUGLIDIS A,MAVRIDIS I.domRBAC:An access controlmodel for modern collaborative systems[J].Computers & Secu-rity,2012,31(4):540-556.
[17]WEI L,ZHANG J J,ZHANG X Y.Research and applicationanalysis of service dynamic access control combining deep lear-ning and adaptive[J].Modern Electronic Technique,2025,48(16):50-54.
[1] ZHENG Kaifa, SUN Wei, ZHOU Junxu, WU Yunkun, XU Zhen, LIU Zhiquan , HE Qiang. Weakly-decentralized Scheme for Sensitive Data Sharing with Hierarchical Access Control [J]. Computer Science, 2026, 53(2): 431-441.
[2] LI Li, CHEN Jie, ZHU Jiangwen. Multi-authority Revocable Ciphertext-policy Attribute-based Encryption Data Sharing Scheme [J]. Computer Science, 2025, 52(9): 388-395.
[3] LUAN Fangjun, ZHANG Fengqiang, YUAN Shuai. Click-through Rate Prediction Model Based on Feature Embedding Gating and PolynomialFeature Crossover Networks [J]. Computer Science, 2025, 52(6A): 240900092-6.
[4] HUANG Zhiyong, LI Bicheng, WEI Wei. Aspect-level Sentiment Analysis Models Based on Syntax and Semantics [J]. Computer Science, 2025, 52(6A): 240400193-7.
[5] DU Qiangang, PENG Bo, CHI Mingmin. Remote Sensing Change Detection Based on Contextual Fine-grained Information Restoration [J]. Computer Science, 2025, 52(2): 183-190.
[6] SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338.
[7] DING Yuanbo, BAI Lin, LI Taoshen. Human-Object Interaction Detection Based on Fine-grained Attention Mechanism [J]. Computer Science, 2025, 52(11): 141-149.
[8] REN Jiadong, LI Shangyang, REN Rong, ZHANG Bing, WANG Qian. Web Access Control Vulnerability Detection Approach Based on Site Maps [J]. Computer Science, 2024, 51(9): 416-424.
[9] LIANG Meiyan, FAN Yingying, WANG Lin. Fine-grained Colon Pathology Images Classification Based on Heterogeneous Ensemble Learningwith Multi-distance Measures [J]. Computer Science, 2024, 51(6A): 230400043-7.
[10] TIAN Hongliang, XIAN Mingjie, GE Ping. Fine Grained Security Access Control Mechanism Based on Blockchain [J]. Computer Science, 2024, 51(6A): 230400080-7.
[11] ZHANG Haoyan, DUAN Liguo, WANG Qinchen, GAO Hao. Long Text Multi-entity Sentiment Analysis Based on Multi-task Joint Training [J]. Computer Science, 2024, 51(6): 309-316.
[12] GU Wenxia, ZAOKERE Kadeer, YANG Qian, AISHAN Wumaier. Multilingual Opinion Factor Extraction Fusing Aspect Semantics and Grid Tagging [J]. Computer Science, 2024, 51(4): 324-333.
[13] WANG Yuhan, MA Fuyuan, WANG Ying. Construction of Fine-grained Medical Knowledge Graph Based on Deep Learning [J]. Computer Science, 2024, 51(11A): 230900157-7.
[14] PANG Bowen, CHEN Yifei, HUANG Jia. Fine-grained Entity Recognition Model in Audit Domain Based on Adversarial Migration ofSample Contributions [J]. Computer Science, 2024, 51(11A): 240300197-8.
[15] MEN Ruirui, JIA Hongyong, DU Jinru. Study on Stream Data Authorization Revocation Scheme Based on Smart Contracts [J]. Computer Science, 2024, 51(10): 372-379.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!