期刊文献+

大数据应用模式及安全风险分析 被引量:22

Big Data Application Mode and Security Risk Analysis
下载PDF
导出
摘要 传统设备和工具在扩展性和分析技术上已经不能满足大数据的应用要求,当前大数据通常是在云计算环境下搭建Hadoop进行存储和分析,而基于云的大数据安全风险来源于云计算服务商以及远程数据应用者对未授权文件及内容的越权操作。本文分析了在不同云计算部署模式下,Hadoop不同阶段操作过程中,不可信主体对数据服务和隐私安全构成的威胁,并给出对应的威胁模型实例。最后根据上述安全风险给出对应的安全策略。 Traditional equipments and tools can not meet the requirements of big data application in scalability and analysis. People currently always use Hadoop to store and analyze big data in cloud computing environment. The risks of big data application on cloud come from cloud service providers and remote users who access data with unauthorized right. The paper presented the threats under different deployment of cloud,and analysed the risk at different stages of operation in Hadoop. The paper gave a thread model for big data application and finally gave the corresponding security policy.
作者 闫智 詹静
出处 《计算机与现代化》 2014年第8期58-61,共4页 Computer and Modernization
基金 国家科技重大专项课题资助项目(2012ZX03002003)
关键词 大数据 云计算 安全 HADOOP big data cloud computing security Hadoop
  • 相关文献

参考文献15

  • 1覃雄派,王会举,杜小勇,王珊.大数据分析——RDBMS与MapReduce的竞争与共生[J].软件学报,2012,23(1):32-45. 被引量:386
  • 2Mell P, Grance T. The NIST Definition of Cloud Computing[R]. National Institute of Standards and Technology, 2011.
  • 3Shaftab Ahmed, Azween Abdullah. E-Healthcare and data management services in a cloud[C]// Proc. of High Capacity Optical Networks and Enabling Technologies(HONET). 2011:248-252.
  • 4Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[C]// Proc. of the OSDI.2004:137-150.
  • 5Chuck Lam. Hadoop in Action[M]. 韩冀中译. 北京: 人民邮电出版社, 2011.
  • 6Tom White. Hadoop: The Definitive Guide[M]. 2nd ed O’Reilly Media, Inc., 2010.
  • 7邹德清,金海,羌卫中,等.云计算安全挑战与实践[J].中国计算机学会通讯,2011,7(12):55-61.
  • 8Jason Shih.Hadoop Security Overview-From Security Infrastructure Deployment to High-level Services[EB/OL]. http://hbtc2012.hadooper.cn/subject/keynotep8shihongliang.pdf, 2012-11-30.
  • 9马媛.基于Hadoop的云计算平台安全机制研究[J].信息安全与通信保密,2012,10(6):89-92. 被引量:22
  • 10The Apache Software Foundation. Service Level Authorization[EB/OL].http://hadoop.apache.org/docs/r1.1.2/service_level_auth.pdf, 2013-08-04.

二级参考文献106

  • 1Rutkowska J. Rootkits vs Stealth by Design Malware [C/OL]. http://invisiblethings org/papers/rutkowska-bheurope2006, ppt.
  • 2HogtundG,ButlerJ.Rootkits-Windows内核的安全防护[M].韩智文,译.北京:清华大学出版社,2007:163-263.
  • 3King S T, Chen P M, Wang Y, et al. Subvirt: Implementing realware with virtual machines [C]// Proceeding of the 2006 IEEE Symposium on Seurity and Privacy. Berkeley/Oakland, Califor nia, IEEE CS digital library, 2006: 314-327.
  • 4Rutkowska J, Tereshkin A. Subverting Vista Kernel For fun and Profit [C/OL]. Black Hat USA. http://blackhat, com/presentations/bh-usa-06 /BH-US-06-Rutkowska. pdf , 2006-08.
  • 5Zovi D Z. Hardware Virtualization Rootkits. Black Hat USA [C/OL]. http://blackhat, com/ presentations/bh-usa-06/BH- US-06-Zovi. pdf.
  • 6Rutkowska J. System Virginity Verifier-Defining the Roadmap for Malware Detection on Windows System, Hack In The Box[C/OL]. http://invisiblethings, org/papers/hitb05_ virginity_ verifier, ppt, 2005.
  • 7Goldberg R P. Survey of Virtual Machine Research[J]. IEEE Computer, 1974 ,June: 34-45.
  • 8Intel. Intel 64 and IA-32 Architecture Software Developer's Manual; Volume3B: System Programming Guide, Part2,2007. EB/OL]. http://download, intel, com/design/processor/manuals/253669, pdf.
  • 9Garfinkel T, Adams T. Compatibility is Not Transparency: VMM Detection Myths and Realities[C]//Proceeding of the 11th USENIX Workshop on Hot Topics in Operating Systems. CA, USA: USENIX Association Berkeley, 2007 : 1 - 6.
  • 10Rutkowska J. Is Game OverO, Anyone?. Black Hat USA [C/ OL]. https://www, blackhat, com/ presentations/bh-usa-07/ Rutkowska/Presentation/bh-usa-07-rutkowska. pdf, 2007.

共引文献417

同被引文献91

  • 1胡雄伟,张宝林,李抵飞.大数据研究与应用综述(上)[J].标准科学,2013(9):29-34. 被引量:44
  • 2Bill Franks.驾驭大数据[M].黄海,车皓阳,王悦,等,译.北京:人民邮电出版社,2013.
  • 3互联网+[EB/OL].http://baike.baidu.com/link?url=JsM.._xH290Jx-'zZaXxYlj3cXFTFA7BtcEozlXHEVm-Gr0PVzgnTFFNNCMIWocGWGFBa860zxbwicwqAruzjiqut.
  • 4郎咸平.大数据时代来临[EB/OL].财经郎眼[2015-06-01].http://www.jujiaocaijing.com/news/310.html.
  • 5零售商拥抱大数据时代的三个成功案例[EB/OL].[2 013-1 0- 11 ].http://www. fashioninsider, com. cry 13 6 8.html.
  • 6阿生.海尔的大数据营销案例[EB/OL].[2014-04-23].http://www.thebigdata.cn/YingYongAnLi/9739.html.
  • 7吴凡.工业4.0托举“中国制造2025”[N].深圳特区报,2015-03-23.
  • 8曾庆斌.工业4.0不局限于生产环节[N].佛山日报,2015-04-15.
  • 9郎咸平.中国制造2025[EB/OL].财经郎眼[2015-07-20].http://www.ieforer.com/mrjz/20150721/582613.html.
  • 10张昌辉.数据真实性与安全性、考验大数据时代[N].中国青年报,2013-01-08.

引证文献22

二级引证文献112

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部