期刊文献+

国网大数据平台中的安全存储与访问控制机制研究

Research on Secure Storage and Access Control Mechanism in State Grid big Data Platform
下载PDF
导出
摘要 文章通过引入安全哈希函数、数字签名、分布式存储、动态数据加密及基于属性的访问控制等技术,构建了一套完善的安全管理体系。实验基于Linux平台、VMware虚拟机、Hadoop大数据平台的仿真环境,验证了所提出方法的可行性和性能。实验结果表明,哈希函数和数字签名有效保障了数据的完整性和真实性,分布式存储方案具有较强的冗余和容错性,基于属性的访问控制机制能够精确控制用户访问系统资源。 The article constructs a comprehensive security management system by introducing technologies such as secure hash functions,digital signatures,distributed storage,dynamic data encryption,and attribute based access control.The simulation environment based on Linux platform,VMware virtual machine,and Hadoop big data platform verified the feasibility and performance of the proposed method.The experimental results show that hash functions and digital signatures effectively ensure the integrity and authenticity of data,distributed storage schemes have strong redundancy and fault tolerance,and attribute based access control mechanisms can accurately control user access to system resources.
作者 李莲 茅海泉 LI Lian;MAO Haiquan(Jiangsu Ruizhong Data Co.,Ltd.,Nanjing Jiangsu 210000,China)
出处 《信息与电脑》 2024年第5期201-203,共3页 Information & Computer
关键词 大数据平台 安全存储 访问控制 big data platform secure storage access control
  • 相关文献

参考文献10

二级参考文献140

  • 1WANG Xiaoming,ZHAO Zongtao.A Service Oriented Voting Authorization Model[J].Chinese Journal of Electronics,2006,15(1):37-40. 被引量:2
  • 2鲍捷,宋靖雁.分布式网络计算机域的一种系统模型及其文件系统[J].计算机应用与软件,2006,23(5):86-89. 被引量:3
  • 3袁禄来,曾国荪,王伟.基于Dempster-Shafer证据理论的信任评估模型[J].武汉大学学报(理学版),2006,52(5):627-630. 被引量:17
  • 4肖宝亮,顾春华,高小伍,陈德庆.基于分级角色的访问控制[J].华东理工大学学报(自然科学版),2006,32(11):1327-1330. 被引量:2
  • 5田敬,代亚非.P2P持久存储研究[J].软件学报,2007,18(6):1379-1399. 被引量:52
  • 6Lin M, Marzullo K. Directional Gossip: Gossip in a Wide - Area Network[ R]. San Diego: Dept of Computer Science and Eng, University of California, 1999.
  • 7Lamport L,Shostak R,Pease M. The Byzantine generals problem[J ]. ACM TO PLAS, 1982,4(3) :382 - 401.
  • 8Weatherspoon H, Kubiatowicz J. Erasure coding vs. replication: A quantitative comparison[ C]//In: Proc. of the 1 st Int' l Workshop on Peer - to - Peer Systems. Berlin: Springer, 2002: 328 - 337.
  • 9M LeMay,O Fatemieh,C A Gunter.PolicyMorph:interactive policy transformations for a logical attribute-based access control framework[A].Proceedings of the 12th ACM Symposium on Access Control Models and Technologies[C].New York:ACM,2008.205-214.
  • 10V Kolovski,J Hendler,B Parsia.Analyzing web access control policies[A].Proceedings of the 16th International Conference on World Wide Web[C].New York:ACM,2007.677-686.

共引文献221

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部