浏览全部资源
扫码关注微信
1. 北京工业大学计算机学院 北京100124
2. 可信计算北京市重点实验室 北京100124
3. 信息安全等级保护关键技术国家工程实验室 北京100124
[ "闫智,女,北京工业大学硕士生,主要研究方向为信息安全。" ]
[ "詹静,女,博士,北京工业大学讲师,主要研究方向为信息安全、可信计算。" ]
网络出版日期:2014-07,
纸质出版日期:2014-07-20
移动端阅览
闫智, 詹静. 面向行为可信的大数据安全系统形式化描述[J]. 电信科学, 2014,30(7):32-38.
Zhi Yan, Jing Zhan. Formal Description of Trusted Bebavior Oriented Security System for Big Data[J]. Telecommunications science, 2014, 30(7): 32-38.
闫智, 詹静. 面向行为可信的大数据安全系统形式化描述[J]. 电信科学, 2014,30(7):32-38. DOI: 10.3969/j.issn.1000-0801.2014.07.006.
Zhi Yan, Jing Zhan. Formal Description of Trusted Bebavior Oriented Security System for Big Data[J]. Telecommunications science, 2014, 30(7): 32-38. DOI: 10.3969/j.issn.1000-0801.2014.07.006.
摘要:大数据的存储和分析通常是在云计算环境下利用Hadoop计算框架进行处理,而基于云的大数据安全风险来源于云计算服务商以及远程数据应用者对未授权文件及内容的越权操作。针对云中大数据应用的安全问题,提出了面向行为可信的大数据服务系统。采用Z形式化方法对该系统进行描述,给出了读取、更新、添加及删除操作的抽象行为定义。根据模型中的抽象行为,划分可信行为与恶意行为,并给出了各个操作的安全分析。最后通过Z/EVES工具对该系统描述的正确性进行了证明和验证。
Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security issues of big data applying on cloud
a security system for big data oriented by trusted behavior was given. The system with Z formal specification was described and the definition of abstract behaviors which contains reading
updating
adding and deleting operation was given. According to the abstract behavior model
behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. By using Z/EVES tool verified and proved the correctness about the description.
谢平 . Hadoop云计算实战 . 北京 : 清华大学出版社 , 2008
马媛 . 基于Hadoop的云计算平台安全机制研究 . 信息安全与保密通信 , 2012 ( 6 ): 89 ~ 92
Roy E , Setty S T V , Kilzer A , et al . Airavat: security and privacy for MapReduce . Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation , San Jose, CA, USA , 2010
Zhang K H , Zhou X Y , Chen Y Y , et al . Sedic: privacy-aware data intensive computing on hybrid clouds . Proceedings of the 18th ACM Conference on Computer and Communications Security , Chicago, Illinois, USA , 2010
Saklikar S . Embedding security and trust primitives within MapReduce . http://www.emc-china.com/rsaconference/2012/en/download http://www.emc-china.com/rsaconference/2012/en/download . 2012
廖淮扣 , 陈怡海 . 软件形式规格说明语言-Z . 北京 : 清华大学出版社 , 2012
Spivey J M . Sedic: privacy-aware data intensive computing on hybrid clouds . The Z notation: a reference manual . Second Edition. UK : Prentice Hall International(UK)Ltd , 1998
Hasson P , Cooper S . case study involving the use of Z to aid requirements specification in the software engineering course . Proceedings of the 17th Conference on Software Engineering Education and Training , Norfolk, Virginia, USA , 2004
Lam C . Hadoop in Action . 韩冀中 译. 北京 : 人民邮电出版社 2011
Saaltink M . The Z/EVES system . Proceedings of the 10th International Conference of Z Users on the Z Formal Specification Notation , London, UK , 1997
Meisels I . Software manual for Windows Z/EVES Version 2.1 . http://www.docin.com/p-147668972.html http://www.docin.com/p-147668972.html , 2000
0
浏览量
457
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构