期刊文献+

大数据环境下基于用户属性的细粒度访问控制 被引量:10

User attribute-based fine grained access control for big data
下载PDF
导出
摘要 为解决大数据环境下统一授权管理的问题,分析开源组件Apache Ranger的模型与授权方式,综合考虑授权用户数量、策略管理难度等问题,提出基于用户属性的访问控制模型。将CP-ABE算法引入Ranger原生访问控制模型中,通过算法的加、解密为Ranger策略添加访问控制树,实现用户属性级别的授权和基于用户可变属性的动态访问控制。通过开发原型系统,实现权限管理、用户管理、属性管理等功能。在实验部分,通过对不同量级用户进行访问控制,验证模型的有效性。 To solve the problem of unified authorization management of big data,the model and authorization method of open source software Apache Ranger were analyzed,and factors such as the number of authorized users and the difficulty of policy management were also taken into consideration,a user attribute-based access control model was proposed.The ciphertext policy attribute based encryption(CP-ABE)algorithm was introduced into the Ranger native access control model,and access control tree was added into Ranger policy using encryption and decryption of the algorithm,which realized user attribute level authorization and dynamic access control based on variable user attributes.By developing the prototype system,authorization management,user management and attribute management were realized.In the experimental part,the validity of the model was verified by access control for users of different magnitudes.
作者 王嘉龙 台宪青 马治杰 WANG Jia-long;TAI Xian-qing;MA Zhi-jie(Research Center for Data and Service,Research and Development Center for Internet of Things,Chinese Academy of Sciences,Wuxi 214135,China;School of Microelectronics,University of Chinese Academy of Sciences,Beijing 101407,China;Laboratory of Geospatial Information Systems,Institute of Electronics,Chinese Academy of Sciences,Suzhou 215121,China)
出处 《计算机工程与设计》 北大核心 2020年第7期1801-1808,共8页 Computer Engineering and Design
基金 中国科学院战略性先导科技专项(A类)基金项目(XDA19080201)。
关键词 大数据 统一授权 用户属性 访问控制树 权限管理 big data unified authorization user attribute access control tree authorization management
  • 相关文献

参考文献8

二级参考文献57

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 3张宏,贺也平,石志国.一个支持空间上下文的访问控制形式模型[J].中国科学(E辑),2007,37(2):254-271. 被引量:21
  • 4林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 5SHAMIR A. Identity-based Cryptosystems and Signature Schemes[EB/OL]. http://xueshu.baidu.com/s?wd=pape ruri%3A%28b3c4ef36 lf1358c0814a5f7e50d77db 1%29&fi lter=sc_long sign&tn=SE_xueshusource 2kduw22v&sc_ vurl=http%3A%2F%2Flink.springer.com%2F 10.1007%2F3-540- 39568-7_5&ie=utf-8, 2015-11-20.
  • 6SAHAI A, WATERS B. Fuzzy Identity Based Encryption[C]//IACR. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, May 22-26, 2005, Aarhus, Denmark. Heidelberg: Springer-Verlag, 2005: 457-473.
  • 7GOYAL V, PANDEY O, SAHAI A, et al. Attribute Based Encryption for Fine-grained Access Control of Encrypted Data[C]//ACM. 13th ACM Conference on Computer and Communications Security (CCS'06), October 30-November 3, 2006, Alexandria, VA, USA. New York: ACM, 2006: 89-98.
  • 8BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy Attribute-based Encryption[C]//IEEE. 2007 IEEE Symposium on Security and Privacy, May 20-23, 2007, Oakland, Califormia, USA. New |ersey: IEEE, 2007: 321-334.
  • 9DAMIANI E, VIMEI~CATI S D C D, FORESTI S, et al. Selective Data Encryption in Outsourced Dynamic Environments[J]. Electronic Notes in Theoretical Computer Science, 2007, 168(1): 127-142.
  • 10HONG Cheng, ZHANG Min, FENG Dengguo. AB-ACCS: A Cryptographic Access Control Scheme for Cloud Storage[J]. Journal of Computer Research and Development, 2010, 47(zl): 259-265.

共引文献361

同被引文献114

引证文献10

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部