Hadoop云平臺(tái)的用戶可信訪問控制模型研究與實(shí)現(xiàn)
[Abstract]:With the rapid development of communication technology, software and hardware technology and the increasing demand for large data storage and processing, cloud computing technology is gradually developing and growing, and is expected to become a widely alternative service model. Hadoop cloud platform is one of the most popular cloud platforms nowadays. It integrates a large amount of storage and computing resources to provide services together. It has the characteristics of dynamic, open and resource sharing which are common in distributed platforms. This paper analyzes in detail. Based on the existing access control model of Hadoop platform, a user's trusted access control model of Hadoop cloud platform is studied and implemented to overcome the shortcomings of the existing model.
1. This paper analyzes the existing access control model of Hadoop cloud platform in detail. In this model, Kerberos security authentication protocol is used to authenticate the users. Combined with the access authorization mechanism based on ACL in the platform, the access to the users in the cluster is realized by cooperating with Delegation Token, BlockAccess Token and other tokens. It can be seen that the model has obvious shortcomings: it only considers the authenticity of the user's identity when authorizing, does not consider the authenticity of the user's later behavior, and once the privilege is granted, it will no longer be monitored. This shortcoming may lead to the user's late implementation of cluster resources. In the process of accessing, even illegal operation is not detected by cluster.
2. This paper presents a behavior-based user trust evaluation model for Hadoop cloud platform-HBTEM. In this model, firstly, a software sensor deployed in Hadoop cluster is designed to monitor and collect user behavior data in real-time and write the monitored data into the cluster. Secondly, combined with the user operation behavior data set recorded in the behavior database, a calculation method of user trust measurement evaluation is proposed, which is used to realize real-time quantitative evaluation of user trust according to the actual operation behavior in the cluster. Finally, the trust evaluation results are written to the user. The trust value database is convenient for later use. A real-time and dynamically updated user trust monitoring mode for Hadoop cloud platform is implemented.
3. This paper presents a new trust-based access control model for Hadoop Cloud Platform-LT model, which is based on the existing access control model of Hadoop Cloud Platform. Compared with the existing access control model of Hadoop platform, the access privilege granting process implemented by this model is no longer a "checkpoint" control mode, but a real-time dynamic control mode, in which the control granularity of user privilege granting is more refined, which can promote the Hadoop cloud platform in its access control mechanism. It becomes safer and more flexible.
4. A simulation experiment is conducted to simulate 10 000 different cluster operation behavior data of 60 Hadoop cluster users. The behavior of each user is randomly distributed in three categories: normal behavior, risk behavior and dangerous behavior. The two-digit random number is used to set the weights of alpha, beta and gamma in turn, and the user trust is computed by using the metric evaluation method of user trust proposed in the HBTEM model. The experimental results show that the model can better reflect the user's behavior in the cluster to its trust value, thus realizing a highly sensitive user trust. Dynamic evaluation method.
5. This paper implements a simplified LT model by improving the current stable version of Apache Hadoop 1.0.4 source code. In this simplified LT model, the process of collecting user behavior and calculating trust metrics defined in HBTEM is implemented, and the trust values calculated are compared with those in this experiment. The trust threshold set by the operation of the service is compared to ensure that the service is provided to the user, and an access control process that can dynamically control the user's use of the cluster resources according to the real-time trust value of the user is implemented. The overhead control brought by the Hadoop cloud platform is tolerable, which overcomes the shortcomings of the existing access control mechanism in the Hadoop cloud platform.
【學(xué)位授予單位】:四川師范大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2014
【分類號(hào)】:TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 鄭虹,徐毓,李芳;柵格劃分下的傳感器部署[J];傳感器技術(shù);2005年03期
2 李小勇;桂小林;毛倩;冷東起;;基于行為監(jiān)控的自適應(yīng)動(dòng)態(tài)信任度測(cè)模型[J];計(jì)算機(jī)學(xué)報(bào);2009年04期
3 陳全;鄧倩妮;;云計(jì)算及其關(guān)鍵技術(shù)[J];計(jì)算機(jī)應(yīng)用;2009年09期
4 江曉慶;楊磊;何斌斌;;未來新型計(jì)算模式—云計(jì)算[J];計(jì)算機(jī)與數(shù)字工程;2009年10期
5 張建勛;古志民;鄭超;;云計(jì)算研究進(jìn)展綜述[J];計(jì)算機(jī)應(yīng)用研究;2010年02期
6 倪文婷;郎波;;網(wǎng)格計(jì)算中一種基于屬性的訪問控制方法[J];計(jì)算機(jī)應(yīng)用研究;2010年02期
7 劉莎;譚良;;Hadoop云平臺(tái)中基于信任的訪問控制模型[J];計(jì)算機(jī)科學(xué);2014年05期
8 封富君;李俊山;;新型網(wǎng)絡(luò)環(huán)境下的訪問控制技術(shù)[J];軟件學(xué)報(bào);2007年04期
9 陳康;鄭緯民;;云計(jì)算:系統(tǒng)實(shí)例與研究現(xiàn)狀[J];軟件學(xué)報(bào);2009年05期
10 馮登國;張敏;張妍;徐震;;云計(jì)算安全研究[J];軟件學(xué)報(bào);2011年01期
本文編號(hào):2233533
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2233533.html