A Role and Trust Based Access Control Approach for Hadoop

An access control and role technology, applied in the field of role and trust-based access control, can solve problems such as inability to ensure, and achieve the effect of a reliable access control mechanism

Active Publication Date: 2020-12-15
SHANGHAI INST OF TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method assumes that the user is a reliable user and will not use his authority to perform illegal actions, but often users often have some illegal operations and unauthorized actions
[0003] Since this type of access control method cannot ensure whether the user will perform some illegal operations when the user's trust is given, we urgently need a model that can ensure that the user's trust matches the user's behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Role and Trust Based Access Control Approach for Hadoop
  • A Role and Trust Based Access Control Approach for Hadoop

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0021] Such as figure 1 As shown, a role-based and trust-based access control method for Hadoop includes the following steps:

[0022] S1, the Hadoop configuration file was modified for the first time, and the configuration file was added to save user trust, the mapping relationship between trust and authority, and the algorithm code for calculating trust. The configuration files were all stored in the hard disk (using 5 i3-2130CPUs , build a cluster with a computer with 4GB of memory);

[0023] S2, read the Hadoop log file stored in the hard disk, and convert the required data into Avro data format output and save it in HDFS (Hadoop file system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a role-based and trust-based access control method suitable for Hadoop. First, the mapping relationship between trust degree and authority is pre-defined in Hadoop configuration files, and then user behaviors in Hadoop log files are collected and processed. Then use the backpropagation algorithm in the neural network algorithm to process the collected data to calculate the trust degree, and iterate back and forth to correct the trust degree, and query the mapping relationship between the trust degree and the authority according to the user's trust degree to clarify what authority the user has Resource permissions. The invention solves the credibility problem of legal user's later behavior in Hadoop, dynamically updates the user's trust degree through neural network algorithm, and realizes a flexible and reliable access control mechanism.

Description

technical field [0001] The invention belongs to the technical field of computer cloud storage access control, and in particular relates to a role-based and trust-based access control method suitable for Hadoop. Background technique [0002] The existing role-based and trust-based access control adopts the method of initially setting user trust. This method ensures the security of the platform and resources to a certain extent, and is suitable for access control of the Hadoop platform. This method assumes that the user is a reliable user and will not take advantage of his authority to perform illegal actions, but users often have some illegal operations and unauthorized actions. [0003] Since this type of access control method cannot ensure whether the user will perform some illegal operations when the user's trust is given, we urgently need a model that can ensure that the user's trust matches the user's behavior. Contents of the invention [0004] In order to solve the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06N3/04G06N3/08
CPCG06F21/6218G06N3/084G06F2221/2141G06N3/045
Inventor 于万钧沈斌
Owner SHANGHAI INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products