期刊文献+

一种适用于Hadoop平台的基于属性访问控制模型 被引量:4

Attribute-based Access Control Model for Hadoop
下载PDF
导出
摘要 针对Hadoop平台缺乏有效访问控制机制的问题,提出一种适用于Hadoop平台的基于属性访问控制模型H-ABAC.该模型将传统ABAC模型扩充为五元组,加入安全等级属性增加了灵活性,选择XACML为策略描述语言并提供标准化、可大规模扩展的访问控制策略.对该模型进行形式化定义,构建模型框架并详述各个模块的功能与实现,对模型的适用性和优势进行了分析.分析得出:该模型可以满足自主、细粒度以及动态授权的需求.仿真实验显示:H-ABAC可以有效控制策略数量并且减少系统的开销,所增加时间开销也在可控范围之内. An attribute-based access control model for Hadoop(H-ABAC)is proposed to solve the access control problem in Hadoop.The traditional ABAC model is expanded to five elements.The security level is considered as an important element for H-ABAC like subject,object,operation and environment.Standardized and extensible access control policies are evolved by XACML.Modules of H-ABAC are formally defined.The functions and implementation of these modules are detailedly described.The applicabilities and superiorities of H-ABAC are analysed.The conclusion shows that H-ABAC can provide independent,fine-grained and dynamic access control and Reduce the system overhead.The simulation experiment shows that H-ABAC can keep the amount of access control policies slowly increasing and the cost of time is acceptable.All that shows H-ABAC is a practical access control model for Hadoop.
作者 陈垚坤 刘文丽 CHEN Yaokun LIU Wenli(Jiangnan CoMputing Technology Research Institute, Wuxi 214083, China)
出处 《河南师范大学学报(自然科学版)》 CAS 北大核心 2016年第5期146-153,共8页 Journal of Henan Normal University(Natural Science Edition)
基金 国家核高基项目(2013ZX01029002-001)
关键词 HADOOP 访问控制 基于属性 XACML 细粒度 Hadoop access control attribute-based XACML fine-grained
  • 相关文献

参考文献12

  • 1Nandimath J,Banerjee E,Patil A,et al.Big data analysis using Apache Hadoop[C].Information Reuse and Integration(IRI),2013IEEE 14th International Conference on,Milan,2013.
  • 2张欣晨,杨庚.Hadoop环境中基于属性和定长密文的访问控制方法[J].计算机工程与应用,2015,51(23):87-93. 被引量:8
  • 3Liu Y,Chen B,He W,et al.Massive image data management using HBase and MapReduce[C].International Conference on Geoinformatics,Kaohsiung,2013.
  • 4Taylor R C.An overview of the Hadoop/MapReduce/HBase framework and its current applications in bioinformatics[J].Bmc Bioinformatics,2010,11(6):3395-3407.
  • 5Zheng K,Jiang W.A token authentication solution for hadoop based on kerberos pre-authentication[C].Data Science and Advanced Analytics(DSAA),Shanghai,2014.
  • 6Kim S H,Lee I Y.Block Access Token Renewal Scheme Based on Secret Sharing in Apache Hadoop[J].Entropy,2014,16(8):4185-4198.
  • 7Murthy A C,Vavilapalli V K,Eadline D,et al.Apache Hadoop YARN:Moving Beyond MapReduce and Batch Processing with Apache Hadoop 2[J].Pearson Schweiz Ag,2014,2(5):56-59.
  • 8林果园,贺珊,黄皓,吴吉义,陈伟.基于行为的云计算访问控制安全模型[J].通信学报,2012,33(3):59-66. 被引量:69
  • 9赵明斌,姚志强.基于RBAC的云计算访问控制模型[J].计算机应用,2012,32(A02):267-270. 被引量:28
  • 10刘莎,谭良.Hadoop云平台中基于信任的访问控制模型[J].计算机科学,2014,41(5):155-163. 被引量:17

二级参考文献122

  • 1刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 2梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 3WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 4李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 5M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 6V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.
  • 7E Yuan,J Tong.Attributed based access control (ABAC) for web services[A].Proceedings of the IEEE International Conference on Web Services[C].Washington:IEEE Computer Society,2005.561-569.
  • 8C Ye,Z Wu,Y Fu.An attribute-based delegation model and its extension[J].Journal of Research and Practice in Information Technology,2006,38 (1):3-17.
  • 9J Michael,R Manoj.A contextual attribute-based access control model[A].Proceedings of 2006 Workshops on the Move to Meaningful Internet Systems[C].Berlin:Springer,2006.1996-2006.
  • 10J Park,R Sandhu.The UCONABC usage control model[J].ACM Transactions on Information and System Security,2004,7(1):128-174.

共引文献183

同被引文献12

引证文献4

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部