电信科学 ›› 2014, Vol. 30 ›› Issue (7): 32-38.doi: 10.3969/j.issn.1000-0801.2014.07.006

• 专题:网络信息安全 • 上一篇    下一篇

面向行为可信的大数据安全系统形式化描述

闫智1,詹静1,2,3   

  1. 1 北京工业大学计算机学院 北京100124
    2 可信计算北京市重点实验室 北京100124
    3 信息安全等级保护关键技术国家工程实验室 北京100124
  • 出版日期:2014-07-20 发布日期:2017-08-17
  • 基金资助:
    高等学校博士学科点专项科研基金资助项目;高等学校博士学科点专项科研基金资助项目

Formal Description of Trusted Bebavior Oriented Security System for Big Data

Zhi Yan1,Jing Zhan1,2,3   

  1. 1 College of Computer Science, Beijing University of Technology, Beijing 100124, China
    2 Beijing Municipal Key Laboratory of Trusted Computing, Beijing 100124, China
    3 National Engineering Laboratory for Critical Technologies of Information Security Classified Protection,Beijing 100124,China
  • Online:2014-07-20 Published:2017-08-17

摘要:

摘要:大数据的存储和分析通常是在云计算环境下利用Hadoop计算框架进行处理,而基于云的大数据安全风险来源于云计算服务商以及远程数据应用者对未授权文件及内容的越权操作。针对云中大数据应用的安全问题,提出了面向行为可信的大数据服务系统。采用Z形式化方法对该系统进行描述,给出了读取、更新、添加及删除操作的抽象行为定义。根据模型中的抽象行为,划分可信行为与恶意行为,并给出了各个操作的安全分析。最后通过Z/EVES工具对该系统描述的正确性进行了证明和验证。

关键词: 大数据, 云计算安全, 形式化, Z语言, 可信行为, Hadoop

Abstract:

Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security issues of big data applying on cloud, a security system for big data oriented by trusted behavior was given. The system with Z formal specification was described and the definition of abstract behaviors which contains reading, updating, adding and deleting operation was given. According to the abstract behavior model, behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. By using Z/EVES tool verified and proved the correctness about the description.

Key words: big data, cloud computing security, formalization, Z, trusted behavior, Hadoop

No Suggested Reading articles found!