[1] |
陈丽, 黄晋, 王锐 . Hadoop大数据平台安全问题和解决方案的综述[J]. 计算机系统应用, 2018,27(1): 1-9.
|
|
CHEN L , HUANG J , WANG R . Overview on security issues and solutions of Hadoop big data platform[J]. Computer Systems & Applications, 2018,27(1): 1-9.
|
[2] |
梁胜昔, 秦军, 宋蕾 . HDFS 混合加密保护方案的设计[J]. 计算机时代, 2014(7): 17-19.
|
|
LIANG S X , QIN J , SONG L . Design for protection scheme of hybrid encryption in HDFS[J]. Computer Era, 2014(7): 17-19.
|
[3] |
DíAZ A F , BLOKHIN I , ORTEGA J . Secure data access in Hadoop using elliptic curve cryptography[C]// International Conference on Algorithms and Architectures for Parallel Processing. 2016: 136-145.
|
[4] |
WANG F , KOHLER M , SCHAAD A . Initial encryption of large searchable data sets using Hadoop[C]// The 20th ACM Symposium on Access Control Models and Technologies. SACMAT, 2015: 165-168.
|
[5] |
SONG Y , SHIN Y S , JANG M . Design and implementation of HDFS data encryption scheme using ARIA algorithm on Hadoop[C]// 2017 IEEE International Conference on Big Data and Smart Computing. IEEE, 2017: 84-90.
|
[6] |
LIN H Y , SHEN S T , TZENG W G ,et al. Toward data confidential ity via integrating hybrid encryption schemes and Hadoop distributed file system[C]// 2012 IEEE 26th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2012: 740-747.
|
[7] |
BHATOTIA P , RODRIGUES R , VERMA A . Shredder:GPU-accelerated incremental storage and computation[C]// The 10th USENIX conference on File and Storage Technologies. 2012.
|
[8] |
COHEN J , ACHARYA S . Towards a trusted Hadoop storage platform:design considerations of an AES based encryption scheme with TPM rooted key protections[C]// The 2013 IEEE 10th International Conference on Ubiquitous Intelligence & Computing and 2013 IEEE 10th International Conference on Autonomic & Trusted Computing. IEEE, 2013: 444-451.
|
[9] |
ZHOU W , XU Y , WANG G . Research on key management for multi-privileged group communications[C]// IEEE Trustcom/BigDataSE/ISPA. IEEE Computer Society, 2015: 151-158.
|
[10] |
KANDAH F I , NICHOLS O , YANG L . Efficient key management for big data gathering in dynamic sensor networks[C]// International Conference on Computing. IEEE, 2017: 667-671.
|
[11] |
ALBAKRI A , MADDUMALA M , HARN L . Hierarchical polynomial-based key management scheme in fog computing[C]// IEEE TrustCom/BigDataSE. IEEE, 2018: 1593-1597.
|