论文标题
TDAC:Hadoop中的基于ABAC和基于信任的动态访问控制方案
TDACS: an ABAC and Trust-based Dynamic Access Control Scheme in Hadoop
论文作者
论文摘要
大数据的时代促进了许多行业的积极发展,从而增强了整体数据驱动分析的全部潜力。 Hadoop已成为利益相关者处理大数据的主流平台的主要选择。此后,Hadoop平台的安全性在全球范围内引起了极大的关注。在本文中,我们主要集中于对用户进行访问控制以确保平台安全。首先,我们利用与基于属性的访问控制(ABAC)模型集成的访问代理来实现前端授权,该授权可以完全反映并应对Hadoop平台中复杂访问控制过程的灵活性,并且可以通过Access Proxy从复杂的授权过程中释放后端资源。此外,为了确保授权的精细粒度,该访问代理维护了由每个资源根据其重要性提供的信任阈值值组成的列表。访问代理与区块链网络进行交互,以获取用户的信任评估值,这是动态授权确定的重要基础。更具体地说,区块链网络在链上和链链模式下一起工作。用户的历史行为数据是离链的存储,相应的哈希值固定在链上。因此,用户的信任值是根据其历史行为存储在区块链平台上的。同时,可以保证用户行为数据的真实性,从而确保信任评估结果的可靠性。我们的实验表明,提出的模型可以动态而灵活地调整用户权限,以确保平台的安全性,而时间和金钱则在合理的范围内消耗。
The era of big data has promoted the vigorous development of many industries, boosting the full potential of holistic data-driven analysis. Hadoop has become the primary choice for mainstream platforms used by stakeholders to process big data. Thereafter, the security of Hadoop platform has arisen tremendous attention worldwide. In this paper, we mainly concentrate on enforcing access control on users to ensure platform security. First, we leverage access proxy integrated with attribute-based access control (ABAC) model to implement front-end authorization, which can fully reflect and cope with the flexible nature of the complex access control process in Hadoop platform, as well as can release back-end resources from complex authorization process through access proxy. Moreover, in order to ensure the fine-granularity of authorization, the access proxy maintains a list composed of trust threshold value provided by each resource according to its importance. The access proxy interacts with the blockchain network to obtain the user's trust evaluation value, which serves as an important basis for dynamic authorization determination. More specifically, blockchain network works together on-chain and off-chain modes. The user's historical behavior data is stored off-chain, and the corresponding hash value is anchored on-chain. Consequently, the user's trust value is evaluated based on his historical behavior stored on the blockchain platform. Meanwhile, the authenticity of user behavior data can be guaranteed, thereby ensuring the reliability of trust assessment results. Our experiment demonstrates that the proposed model can dynamically and flexibly adjust user permissions to ensure the security of the platform, while time and money are consumed within a reasonable range.