Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (1): 46-52.doi: 10.11959/j.issn.2096-109x.2016.00015

• Papers • Previous Articles     Next Articles

Risk access control model for Hadoop

Jia-shuai LI1,2,Chang-gen PENG2,3,Yi-jie ZHU1,2,Hai-feng MA1,2   

  1. 1 School of Electronic Engineering and Automation, Guilin University of Electronic Technology, Guilin 541004, China
    2 China Electronics Standardization Institute, Beijing 100007, China
    3 School of Computer Science and Engineering, Guilin University of Electronic Technology, Guilin 541004, China
  • Revised:2015-12-02 Online:2016-01-01 Published:2016-02-16
  • Supported by:
    The National Natural Science Foundation of China(61262073);The National Natural Science Foundation of China(61363068);The National Statistical Scientific Research Project(2013LZ46);The Guizhou Province Statistical Scientific Research Project(201511)

Abstract:

Traditional access control models are hard to restrain the malicious behavior of authorized users. Accord-ingly, Hadoop platform with this access control model is difficult to prevent the risk of privacy disclosure. A model of access control based on risk was proposed. A risk function of information entropy was designed from users’ his-torical behavior based on setting the tags of subject and object. Furthermore, the tracking chain of risk was built, which could adjust the users’ access authority dynamically according to the risk value and its volatility. Combining with access token and risk supervision, the risk access control mechanism for big data privacy protection was real-ized, which could be applied to enhance the security of Hadoop Kerberos protocol. Finally, the experiment result shows that the model can constrain the authorized users’ access behavior effectively.

Key words: risk access control, Hadoop, privacy protection, information entropy, big data

CLC Number: 

No Suggested Reading articles found!