期刊文献+

开源大数据治理与安全软件综述 被引量:11

A Survey of Open Source Software for Big Data Governance and Security
下载PDF
导出
摘要 随着网络和信息技术的不断发展与普及,人类产生的数据量也正在呈指数级增长。数据不再像传统技术时代那样在数据所有者的可控范围内,因此大数据安全与隐私成为了人们共同关注的热点问题。大数据安全与治理是为了解决数据的安全性以及数据隐私难以得到保障等问题而形成的最为热门的研究领域之一。文章首先介绍了大数据安全与治理的基本概念,接着分别讨论了Apache Falcon、Apache Atlas、Apache Ranger、Apache Sentry与Kerberos等大数据治理与安全开源框架。Apache Falcon和Apache Atlas能够对大数据平台执行包括数据采集、数据处理、数据备份和数据清洗在内的数据生命周期管理,也能够对大数据平台的各种组件进行很好的调度。Apache Ranger和Apache Sentry框架可以提供对大数据平台中的数据访问进行细粒度的权限控制和日志审计功能。Kerberos框架主要用来对大数据平台上框架进行权限认证,维护大数据平台上框架的安全。 With the development of Internet technology,the amount of data increase exponentially.This data is no longer easily to be controlled by the owner which is different from the traditionaltechnology.Therefore,big data security and privacy has become a hot issue.Big data security andgovernance is one of the most popular research fields to solve the data security and data privacy.This paper introduces the basic concepts of data security and governance fi rst,and then talks aboutopen source framework,including Apache Falcon,Apache Atlas,Apache Ranger,Apache Sentry andKerberos.Apache Falcon and Apache Atlas can perform data lifecycle management,including datacollection,data processing,data backup and data cleansing,for big data platforms,as well as for fi nescheduling of components of big data platforms.Apache Ranger and Apache Sentry can fi ne grainedauthorization to do a specifi c action or operation and provide a central audit server.Kerberos is mainlyused for big data platform for the authority of the framework of certifi cation,and maintain security ofthe big data platform.
作者 王文杰 胡柏青 刘驰 WANG Wenjie;HU Baiqing;LIU Chi(School of Software, Beijing Institute of Technology, Beijing 100081, China)
出处 《信息网络安全》 CSCD 2017年第5期28-36,共9页 Netinfo Security
基金 国家自然科学基金[61300179]
关键词 大数据 安全 治理 开源 big data security governance open source
  • 相关文献

参考文献6

二级参考文献50

  • 1夏士雄,李文超,周勇,张磊,牛强.Improved k-means clustering algorithm[J].Journal of Southeast University(English Edition),2007,23(3):435-438. 被引量:16
  • 2ZHANG C, XIA S. K-means clustering algorithm with improvedinitial center[C]//Second International Workshop on, IEEE, 2009:790-792. 被引量:1
  • 3GREEN R, STAFFELL I, VASILAKOS N. Divide and conquerk-means clustering of demand data allows rapid and accurate simulationsof the British electricity systemQ]. IEEE TRANSACTIONS ONENGINEERING MANAGEMENT, 2014,61(2): 251-260. 被引量:1
  • 4DIN W I S W, YAHYA S, TAIB M N, et al. MAP: The newclustering algorithm based on multitier network topology to prolongthe lifetime of wireless sensor network[C]//Signal Processing & itsApplications (CSPA), 2014 IEEE 10th International Colloquium on, IEEE,2014: 173-177. 被引量:1
  • 5JI T, BAO X,WANG Y, et al. A Fuzzy K-modes-based Algorithmfor Soft Subspace Clustering[C] //Fuzzy Systems and Knowledge Discovery(FSKD), 2011 Eighth International Conference on, IEEE, 2011,2: 1080-1084. 被引量:1
  • 6FRANK F, MARCOS K.移动云计算:无线、移动和社交网络中分布式资源的开发利用[M].郎为民,译.北京:机械工业出版社,2015. 被引量:1
  • 7BOYENX, WATERS B.Ful卜domain Subgroup Hiding andConstant-size Group Signatures [C]//IEEE. PKC 2007.10th InternationalConference on Practice and Theory in Public-Key Cryptography April16-20,2007,Beijing, China.NJ : IEEE, 2007: 1-15. 被引量:1
  • 8MAJI H K, PRABHAKARAN M, ROSULEK M. Attribute-ased Signatures [EB/OL].http://eprint.iacr.org/2010/595.pdf, 2010-11-22. 被引量:1
  • 9DOIDSY,YAMPOLSKIY A. A Verifiable Random Function withShort Proofi and Keys[C]//IEEE. PKC 2005.8th International Workshopon Theory and Practice in Public Key Cryptography, January 23-26,2005,Les Diablerets, Switzerland. NJ : IEEE, 416-431. 被引量:1
  • 10SHACHAMH, WATEWRS . Compact Proofe of Retrievability [J].Journal of Cryptology, 2015, 28(3): 442-483. 被引量:1

共引文献163

同被引文献85

引证文献11

二级引证文献127

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部