期刊文献+

基于用户行为评估的Hadoop云平台动态访问控制 被引量:3

Hadoop Cloud Platform Dynamic Access Control Based on User Behavior Assessment
下载PDF
导出
摘要 为解决现有Hadoop云平台访问控制缺乏动态性的问题,提出一种基于用户行为评估的Hadoop云平台动态访问控制模型(DACUBA).该模型采用指令序列学习(CSL)算法从用户指令序列中提取用户行为模式,利用全局模式库对用户行为进行分类并对分类结果进行行为评估,然后将评估值应用于Hadoop云平台的访问控制机制中实现动态访问控制.验证实验结果证明了DACUBA的有效性,与其他方法相比,该方法对云请求的访问控制效率较高,且稳定性较好. In order to solve the problem that the access control model of the existing Hadoop cloud platform lacks dynamic mechanism,a dynamic access control model based on user behavior assessment(DACUBA)was proposed for Hadoop cloud platform.In this model,a command sequence learning(CSL)algorithm was used to extract user behavior patterns from user instruction sequence,the global pattern library was used to classify user behavior and conduct behavioral assessment of user behavior classification.Then the evaluation value was applied to the access control mechanism of Hadoop cloud platform to implement dynamic access control.The experimental results verify that DACUBA is effective,and compared with other methods,this method has higher efficiency and better stability for cloud request access control.
出处 《北京理工大学学报》 EI CAS CSCD 北大核心 2017年第10期1031-1035,1042,共6页 Transactions of Beijing Institute of Technology
基金 国家科技重大专项资助项目(2012ZX03002002) 国家自然科学基金资助项目(61179045 60776807) 中国民航科技资助项目(MHRD201009 MHRD201205) 中央高校基本科研业务费专项资助项目(3122014D033)
关键词 云平台 HADOOP 用户行为 访问控制 指令序列学习 cloud platform Hadoop user behavior access control command sequence learning
  • 相关文献

参考文献2

二级参考文献22

  • 1刘玮,王丽宏.云计算应用及其安全问题研究[J].计算机研究与发展,2012,49(S2):186-191. 被引量:26
  • 2Bondi A. Characteristics of scalability and their impact on performance [ C ]//Proceedings of the Second Internation- al Workshop on Software and Performance-WOSP 2000. Ottawa: ACM Press, 2000: 195-203.
  • 3Osaka K, Takagi T, Yamazaki K, et al. An efficient and secure RFID security method with ownership transfer [ C ]// Proc International Conference on Computational Intelli- gence and Security, Volume 2. Piscataway: IEEE Press, 2006 : 1090-1095.
  • 4Lei Hong, Cao Tianjie. RFID protocol enabling owner- ship transfer to protect against traceability and DoS at- tacks[ C ] //Proe the First International Symposium on Data, Privacy, and E-Commerce. Washington DC: IEEE Computer Society Press, 2007: 508-510.
  • 5Wang C H, Chin S. A new RFID authentication protocol with ownership transfer in an insecure communication en- vironment [ Jl Proc Hybrid Intelligent Systems, 9'h Inter- national Conference, 2009, 1 (8) : 486-491.
  • 6Yang M H. Across-authority lightweight ownership trans- fer protocol[J]. Electronic Commerce Research and Ap-plications, 2011 : 375-383.
  • 7Peris-Lopez P, Hernandez-Castro J C, Tapiador J M E, et al. Vulnerability analysis of RFID protocols for tag ownership transfer [ Jl Computer Networks, 2010, 54 (9) : 1502-1508.
  • 8Song B, Mitchell C J. Scalable RFID security protocols supporting tag ownership transfer [ J]. Computer Commu- nications, 2011, 34(4): 556-566.
  • 9Han D G, Takagi T, Kim H W, et al. New security problem in RFID systems tag killing[ C ] ff Proc in ACIS 2006. Springer-Verlag: LNCS 3982, 2006: 375-384.
  • 10云计算百科.什么是云计算平台?云计算平台有哪些?[EB/OL].http://www.cloudwhy.com/mingci/2011/0317/128.ht-ml,2012-06-12.

共引文献18

同被引文献23

引证文献3

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部