期刊文献+

面向行为可信的大数据安全系统形式化描述 被引量:5

Formal Description of Trusted Behavior Oriented Security System for Big Data
下载PDF
导出
摘要 大数据的存储和分析通常是在云计算环境下利用Hadoop计算框架进行处理,而基于云的大数据安全风险来源于云计算服务商以及远程数据应用者对未授权文件及内容的越权操作。针对云中大数据应用的安全问题,提出了面向行为可信的大数据服务系统。采用Z形式化方法对该系统进行描述,给出了读取、更新、添加及删除操作的抽象行为定义。根据模型中的抽象行为,划分可信行为与恶意行为,并给出了各个操作的安全分析。最后通过Z/EVES工具对该系统描述的正确性进行了证明和验证。 Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security issues of big data applying on cloud, a security system for big data oriented by trusted behavior was given. The system with Z formal specification was described and the definition of abstract behaviors which contains reading, updating, adding and deleting operation was given. According to the abstract behavior model, behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. By using Z/EVES tool verified and proved the correctness about the description.
作者 闫智 詹静
出处 《电信科学》 北大核心 2014年第7期32-38,共7页 Telecommunications Science
基金 国家科技重大专项基金资助项目(No.2012ZX03002003) 高等学校博士学科点专项科研基金资助项目(No.20131103120001)
关键词 大数据 云计算安全 形式化 Z语言 可信行为 HADOOP big data, cloud computing security, formalization, Z, trusted behavior, Hadoop
  • 相关文献

参考文献1

二级参考文献8

  • 1O'MALLEY O, ZHANG K, RADIA S, et al. Hadoop Security Design[EB/OL]. (2009-1 O- 11) [2012-04-15]. http : //www.issues.apache.org/jira/browse/HADOOP-4487.
  • 2BECHERER A. Hadoop Security Design Just Add Kerberos? Really?[EB/OL]. (2011-04-20) [2012-04-18]. http: //www. isecpartners.com.
  • 3The Apache Software Foundation. Service Level Authorization Guide[EB/OL]. (2012-02-14) [2012-04- i 8]. http : //hadoop. apache.org/common/docs/stable/service_level_auth.html.
  • 4皮丽华.不可盲崇拜Hadoop警惕安全性漏洞[EB/OL].(2011-12-09)[2012-04-15].http://tech.itl68com/a2011/1208/1285/000001285780.shtml.
  • 5柴黄琪,苏成.基于HDFS的安全机制设计[J].计算机安全,2010(12):22-25. 被引量:11
  • 6张秋江,王澎.云计算的安全问题探讨[J].信息安全与通信保密,2011,9(5):94-95. 被引量:51
  • 7仇李寅,邱卫东,苏芊,廖凌.基于Hadoop的分布式哈希算法实现[J].信息安全与通信保密,2011,9(11):54-56. 被引量:8
  • 8王晟,赵壁芳.云计算中MapReduce技术研究[J].通信技术,2011,44(12):159-161. 被引量:9

共引文献21

同被引文献46

  • 1左继红,王千祥,梅宏.一种基于模型的特征交互检测方法[J].软件学报,2007,18(1):94-104. 被引量:4
  • 2沈昌祥,张焕国,冯登国,曹珍富,黄继武.信息安全综述[J].中国科学(E辑),2007,37(2):129-150. 被引量:358
  • 3Stouffer K,Falco J,Scarfone K. Guide to Industrial Control Systems (ICS) Security ,NIST, 2011.
  • 4Okhravi H, Nicol M D. Application of trusted network technology to industrial control networks. International Journal of Critical Infrastructure Protection, 2009 (2).
  • 5Howard R. Dynamic Programming and Markov Proeesses. Cambridge, Massachusetts: MIT Press,1960.
  • 6Karagiannis T, Papagiannaki K, Faloutsos M. Blinc: multilew-l traffic classification in the clark. Proceedings of SIGCOMM'05. Philadelphia, Pennsylvania, USA, 2005.
  • 7Karagiannis T, Roido A, Ah,utsos M, et (d. Transport layer identification of P2P tr',dt-c. Proceedings of the 2004 ACM S1GCOMM lnternet Measuremenl Conference, Taormina, Italy, 2004.
  • 8Gorse N,Logrippo L,Sincennes J.Detecting Feature Interaction in CPL[J].Software&System Modeling,2006,5(2):121-134.
  • 9Jouve H,Gall P L,Coudert S.An Automatic Off-line Feature Interaction Detection Method by Static Analysis of Specifications[C]//Proceedings of the 8th Inter-national Conference on Feature Interactions in Telecommunications and Software Systems.Amsterdam,the Netherlands:IOS Press,2005:131-146.
  • 10Zafar N A.Formal Model of Aircrafts Safety Separation[J].International Journal of Innovative Computing,Information and Control,2014,10(4):1401-1412.

引证文献5

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部