期刊文献+

基于Hadoop架构云平台的动态行为信任评估方法 被引量:1

Dynamic behavior trust evaluation method based on Hadoop architecture cloud platform
下载PDF
导出
摘要 针对Hadoop架构云平台不能验证"合法"用户的行为是否可靠的问题,文章提出了基于Bayes均值信任模型和动态行为信任链,用于计算每个客户端的信任值,使得信任值满足阈值的用户获得相应服务资源。该方案能够防止合法客户端受到"被动"的拒绝服务攻击,提高了客户端获取服务资源的公平性,同时有效防止恶意节点的协同欺骗。 According to the problem of the cloud platform for Hadoop architecture not verifying the reliability of the behavior of its "legitimate" user, this paper proposes the Based on Bayes mean trust model and the trust link of dynamic behavior to compute the trust value of each client. The client with satisfying the threshold value will gain the corresponding the service resources.The scheme prevents the legitimate clients from being "passive" denial-of-service attacks and improves the fairness of the client access to service resources. It is also effective to prevent the cooperative deception of malicious nodes.
作者 章玉英
出处 《信息通信》 2018年第2期100-102,共3页 Information & Communications
基金 四川省教育厅2017科研项目(No.17ZB0271)
关键词 云平台 HADOOP 信任链路 Cloud platform Hadoop Trust link
  • 相关文献

参考文献5

二级参考文献26

  • 1Vaquero L, Rodero Marino L, Cacerce J, et al. A break in the clouds: towards a cloud definition [J]. SIGCOMM Computer Communication Review, 2009, 39 (1): 50-55.
  • 2Armbrust M, Fox A, Griffith R, et al. Above the clouds: A Berke- ley view of cloud computing, USB-EECS-2009-28 [R]. Berkeley: University of California, 2009.
  • 3Lin H Y, Tzeng W G. A secure decentralized erasure code fordis- tributed network storage [J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21 (11) : 1586- 1594.
  • 4Shvaehko K, Kuang Hairong, Rania S, et al. The Hadoop distrib- uted file System [A]. Proe. of Mass Storage Systems and Technologies [C]. 2010: 1-10.
  • 5Lampson B K.Protection[J].Operating Systems Review,1974,8(1):18-24.
  • 6Snyder L.Formal models of capability-based protection systems[J].IEEE Transactions on Computers,1981,30(3):172-181.
  • 7Kain R Y,Landwehr C E.On access checking in capability-based systems[J].IEEE Transactions on Software Engineering,1987,SE13(2):95-101.
  • 8Karger P A.Improving security and performance for capability systems[D].London,UK:University of Cambridge,1988.
  • 9Gong L.A secure identity-based capability system[C]//Proceedings of the 1989IEEE Symposium on.Security and Privacy.Oakland,USA:IEEE Computer Society Press,1989:56-63.
  • 10Boebert W E.On the inability of an unmodified capability machine to enforce the property[C]//Proceedings of the 7th DoD/NBS Computer Security Conference.Gaithersburg,USA:National Bureau of Standards,1984:291-293.

共引文献32

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部