期刊文献+

面向HDFS的密钥资源控制机制

HDFS-oriented cryptographic key resource control mechanism
下载PDF
导出
摘要 大数据环境呈现多用户跨网交叉访问、多服务协同计算、数据跨服务流动、海量文件管控复杂的特点,现有密钥资源控制模型和机制不完全适用于大数据场景。针对大数据环境的密钥资源控制、操作语义归一化描述、细粒度访问控制的需求,从密钥资源控制的场景要素及属性出发,通过映射面向网络空间的访问控制(Co AC)模型,提出了面向HDFS的密钥资源控制机制;然后,给出了面向HDFS的密钥资源控制管理机制(CKCM),包括管理子模型和管理支撑模型,并用Z语言形式化地描述了管理模型中的管理函数和管理方法;最后,基于XACML实现CKCM系统,实现HDFS中密钥及文件资源的细粒度安全访问控制。 The big data environment presents the characteristics of multi-user cross-network cross-access,multi-service collaborative computing,cross-service data flow,and complex management of massive files.The existing access control models and mechanisms are not fully applicable for big data scenarios.In response to the needs of fine-grained access control and multi-service strategy normalization for cryptographic data in the big data environment,starting from the scene elements and attributes of access control,the HDFS-oriented CKCM was proposed by mapping the cyberspace-oriented access control(CoAC)model.Subsequently,a fine-grained access control management model for HDFS was proposed,including management sub-models and management supporting models.The Z-notation was used to formally describe the management functions and management methods in the management model.Finally,the CKCM system was implemented based on XACML to realize fine-grained secure access control for managing file and secret keys in HDFS.
作者 金伟 李凤华 余铭洁 郭云川 周紫妍 房梁 JIN Wei;LI Fenghua;YU Mingjie;GUO Yunchuan;ZHOU Ziyan;FANG Liang(Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China;School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China;China Academy of Information and Communications Technology,Beijing 100191,China;School of Cyber Security,University of Science and Technology of China,Hefei 230027,China)
出处 《通信学报》 EI CSCD 北大核心 2022年第9期27-41,共15页 Journal on Communications
基金 国家自然科学基金资助项目(No.U1836203,No.61872441) 国家重点研发计划基金资助项目(No.2018YFB2100400) 中国科学院青年创新促进会人才基金资助项目(No.2021154)。
关键词 大数据平台 密钥管理 资源控制 面向网络空间的访问控制 big data platform cryptographic key management resource control cyberspace-oriented access control
  • 相关文献

参考文献3

二级参考文献41

  • 1王小明,赵宗涛.基于角色的时态对象存取控制模型[J].电子学报,2005,33(9):1634-1638. 被引量:18
  • 2沈荣骏.我国天地一体化航天互联网构想[J].中国工程科学,2006,8(10):19-30. 被引量:130
  • 3National Computer Security Center. Glossary of computer security terms NCSC-TG-OO4)[EB/OL].http://csrc.nist.gov/secpubs/rainbow/ tg004.txt.
  • 4BELL D E, LAPADULA L J. Secure computer systems: mathematical foundations[R]. MITRE CORP BEDFORD MA, 1973.
  • 5STALLINGS W.Network and intemetwork security: principles and practice[M]. Englewood Cliffs: Prentice Hall, 1995.
  • 6FERRAIOLO D F, KUHN D R. Role-based access con- trol[C]//National Computer Security Conference. c1992:554-563.
  • 7OH S, SANDHU R,ZHANG X. An effective role administration model using organization structure[J]. ACM Transactions on Informa- tion and System Security (TISSEC), 2006, 9(2): I13-137.
  • 8SANDHU R, BHAMIDIPATI , MUNAWER Q. The ARBAC97 model for role-based administration of roles[J]. ACM Transactions on Information and System Security, 1999, 2(I):I05-135.
  • 9SANDHU R, MUNAWER Q, The ARBAC99 model for administra- tion of roles[C]//Aunual Computer Security Applications Conference. e1999: 229-238.
  • 10SANDHU R S, COYNE E J, FEINSTEIN H L, et al. Role-based access control modals[J]. Computer, 1996 (2): 38-47.

共引文献37

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部