Modeling and Verifying Identity Authentication Security of HDFS using CSP

被引:6
作者
Xu, Chao [1 ]
Zhu, Huibiao [1 ]
Xie, Wanling [1 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
来源
2017 24TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2017) | 2017年
关键词
HDFS; Authentication; Kerberos; CSP; Modeling; Verification;
D O I
10.1109/APSEC.2017.32
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As one of the most popular software framework for distributed storage of big data, HDFS has lots of good features, such as high throughput and high fault-tolerance. However, with its rapid development, potential data security risks are exposed and founding security mechanism for HDFS cluster has become an important issue. In this paper, we investigate the identity authentication problem on HDFS and select Kerberos protocol as corresponding security mechanism to deal with the problem. We use the process algebra CSP to model HDFS and HDFS with security mechanism, as well as their security properties. Moreover, we also use a model checking tool PAT to verify these properties. The verification results illustrate the existence of authentication problems on HDFS and Kerberos can effectively solve these problems. Consequently, a better understanding of HDFS and its security properties can be achieved and the establishment of security mechanism for HDFS can benefit from it. Besides, it is also a guide for the formalization of HDFS with security mechanism.
引用
收藏
页码:259 / 268
页数:10
相关论文
共 25 条
[1]  
[Anonymous], 2003, P 19 ACM S OP SYST P, DOI [10.1145/1165389.945450, DOI 10.1145/1165389.945450]
[2]  
Chai H. Q., 2010, COMPUTER SECURITY
[3]  
Cohen J., 2013, MORE SECURE APACHE H
[4]  
Das S. R. Devaraj, 2011, ADDING SECURITY APAC
[5]  
Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137
[6]   Comparative Modeling and Verification of Pthreads and Dthreads [J].
Fei, Yuan ;
Zhu, Huibiao ;
Wu, Xi ;
Fang, Huixing .
2016 IEEE 17TH INTERNATIONAL SYMPOSIUM ON HIGH ASSURANCE SYSTEMS ENGINEERING (HASE), 2016, :132-140
[7]   Security Threats to Hadoop: Data Leakage Attacks and Investigation [J].
Fu, Xiao ;
Gao, Yun ;
Luo, Bin ;
Du, Xiaojiang ;
Guizani, Mohsen .
IEEE NETWORK, 2017, 31 (02) :67-71
[8]  
Gupta P, 2015, 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), P118, DOI 10.1109/CCAA.2015.7148356
[9]  
Hadoop, APACHE HADOOP
[10]   COMMUNICATING SEQUENTIAL PROCESSES [J].
HOARE, CAR .
COMMUNICATIONS OF THE ACM, 1978, 21 (08) :666-677