一种适用于Hadoop云平台的访问控制方案

王志华, 庞海波, 李占波

清华大学学报(自然科学版) ›› 2014, Vol. 54 ›› Issue (1) : 53-59.

PDF(1150 KB)
PDF(1150 KB)
清华大学学报(自然科学版) ›› 2014, Vol. 54 ›› Issue (1) : 53-59.
论文

一种适用于Hadoop云平台的访问控制方案

作者信息 +

Access control for Hadoop-based cloud computing

Author information +
文章历史 +

摘要

分析了Hadoop云计算平台的安全需求,设计了一种基于身份的Capability (ID-CAP), 并提出了一种基于ID-CAP的Hadoop访问控制方案。方案设计采用了最小授权原则,实现了基于Capability的访问控制,使用户在Hadoop平台上提交的作业能以最小权限运行。实验结果表明: 基于Capability的访问控制机制能有效实现在Hadoop平台上实施最小授权原则,支持平台内部相互依赖的各模块之间的身份认证,有效提高Hadoop平台的系统安全性和稳定性。

Abstract

An identity-based capability (ID-CAP) method is given to provide secure access control to Hadoop cloud computing platforms. The capability-based access control design follows the least privilege principle with the platform running tenant jobs using a least privilege set. Tests show that the capability-based access control can be efficiently implemented to support mutual authentication between different servers in a Hadoop platform while satisfying the least privilege requirement to improve platform security and stability.

关键词

访问控制 / 权能 / Hadoop / 云计算 / 最小授权原则

Key words

access control / capability / Hadoop / cloud computing / the least-privilege principle

引用本文

导出引用
王志华, 庞海波, 李占波. 一种适用于Hadoop云平台的访问控制方案[J]. 清华大学学报(自然科学版). 2014, 54(1): 53-59
Zhihua WANG, Haibo PANG, Zhanbo LI. Access control for Hadoop-based cloud computing[J]. Journal of Tsinghua University(Science and Technology). 2014, 54(1): 53-59
中图分类号:     

参考文献

[1] Lampson B K. Protection [J]. Operating Systems Review, 1974, 8(1): 18-24.
[2] Snyder L. Formal models of capability-based protection systems[J]. IEEE Transactions on Computers, 1981, 30(3): 172-181.
[3] Kain R Y, Landwehr C E. On access checking in capability-based systems[J]. IEEE Transactions on Software Engineering, 1987, SE13(2): 95-101.
[4] Karger P A. Improving security and performance for capability systems [D]. London, UK: University of Cambridge, 1988.
[5] Gong L. A secure identity-based capability system [C]// Proceedings of the 1989 IEEE Symposium on. Security and Privacy. Oakland, USA: IEEE Computer Society Press, 1989: 56-63.
[6] Boebert W E. On the inability of an unmodified capability machine to enforce the property [C]// Proceedings of the 7th DoD/NBS Computer Security Conference. Gaithersburg, USA: National Bureau of Standards, 1984: 291-293.
[7] Landwehr C E. Formal models for computer security[J]. ACM Computing Surveys, 1981, 13(3): 247-278.
[8] Lampson B W. A note on the confinement problem[J]. Communications of the ACM on Operation Systems, 1973, 16(10): 613-615.

基金

河南省自然科学基金资助项目 (2011B520036);河南省基础与前沿技术研究资助项目 (142300410226)

PDF(1150 KB)

Accesses

Citation

Detail

段落导航
相关文章

/