TDACS: an ABAC and Trust-based Dynamic Access Control Scheme in Hadoop

11/16/2020
by   Min Yang, et al.
0

The era of big data has promoted the vigorous development of many industries, boosting the full potential of holistic data-driven analysis. Hadoop has become the primary choice for mainstream platforms used by stakeholders to process big data. Thereafter, the security of Hadoop platform has arisen tremendous attention worldwide. In this paper, we mainly concentrate on enforcing access control on users to ensure platform security. First, we leverage access proxy integrated with attribute-based access control (ABAC) model to implement front-end authorization, which can fully reflect and cope with the flexible nature of the complex access control process in Hadoop platform, as well as can release back-end resources from complex authorization process through access proxy. Moreover, in order to ensure the fine-granularity of authorization, the access proxy maintains a list composed of trust threshold value provided by each resource according to its importance. The access proxy interacts with the blockchain network to obtain the user's trust evaluation value, which serves as an important basis for dynamic authorization determination. More specifically, blockchain network works together on-chain and off-chain modes. The user's historical behavior data is stored off-chain, and the corresponding hash value is anchored on-chain. Consequently, the user's trust value is evaluated based on his historical behavior stored on the blockchain platform. Meanwhile, the authenticity of user behavior data can be guaranteed, thereby ensuring the reliability of trust assessment results. Our experiment demonstrates that the proposed model can dynamically and flexibly adjust user permissions to ensure the security of the platform, while time and money are consumed within a reasonable range.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/02/2021

Trust-based Blockchain Authorization for IoT

Authorization or access control limits the actions a user may perform on...
research
06/27/2019

A Trust Architecture for Blockchain in IoT

Blockchain is a promising technology for establishing trust in IoT netwo...
research
09/15/2021

BOSS: A Blockchain Off-State Sharing System

Blockchain has been applied to data sharing to ensure the integrity of d...
research
01/25/2022

From Data Leverage to Data Co-Ops: An Institutional Model for User Control over Information Access

Internet companies derive value from users by recording and influencing ...
research
12/21/2019

Trust Management in Decentralized IoT Access Control System

Heterogeneous and dynamic IoT environments require a lightweight, scalab...
research
01/17/2022

End to End Secure Data Exchange in Value Chains with Dynamic Policy Updates

Data exchange among value chain partners provides them with a competitiv...

Please sign up or login with your details

Forgot password? Click here to reset