Formal Description of Trusted Bebavior Oriented Security System for Big Data
Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security iss...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2014-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.006/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529341115105280 |
---|---|
author | Zhi Yan Jing Zhan |
author_facet | Zhi Yan Jing Zhan |
author_sort | Zhi Yan |
collection | DOAJ |
description | Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security issues of big data applying on cloud, a security system for big data oriented by trusted behavior was given. The system with Z formal specification was described and the definition of abstract behaviors which contains reading, updating, adding and deleting operation was given. According to the abstract behavior model, behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. By using Z/EVES tool verified and proved the correctness about the description. |
format | Article |
id | doaj-art-74ec7967e1ab4b45a42f0307c5d86934 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2014-07-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-74ec7967e1ab4b45a42f0307c5d869342025-01-15T03:19:08ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012014-07-0130323859619967Formal Description of Trusted Bebavior Oriented Security System for Big DataZhi YanJing ZhanUsually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. Based on the security issues of big data applying on cloud, a security system for big data oriented by trusted behavior was given. The system with Z formal specification was described and the definition of abstract behaviors which contains reading, updating, adding and deleting operation was given. According to the abstract behavior model, behaviors were divided into trusted behavior and malicious behavior and security analysis on each operation was given. By using Z/EVES tool verified and proved the correctness about the description.http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.006/big datacloud computing securityformalizationZ, trusted behaviorHadoop |
spellingShingle | Zhi Yan Jing Zhan Formal Description of Trusted Bebavior Oriented Security System for Big Data Dianxin kexue big data cloud computing security formalization Z, trusted behavior Hadoop |
title | Formal Description of Trusted Bebavior Oriented Security System for Big Data |
title_full | Formal Description of Trusted Bebavior Oriented Security System for Big Data |
title_fullStr | Formal Description of Trusted Bebavior Oriented Security System for Big Data |
title_full_unstemmed | Formal Description of Trusted Bebavior Oriented Security System for Big Data |
title_short | Formal Description of Trusted Bebavior Oriented Security System for Big Data |
title_sort | formal description of trusted bebavior oriented security system for big data |
topic | big data cloud computing security formalization Z, trusted behavior Hadoop |
url | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.07.006/ |
work_keys_str_mv | AT zhiyan formaldescriptionoftrustedbebaviororientedsecuritysystemforbigdata AT jingzhan formaldescriptionoftrustedbebaviororientedsecuritysystemforbigdata |