POSTER: Access Control Model for the Hadoop Ecosystem

被引:10
作者
Gupta, Maanak [1 ]
Patwa, Farhan [1 ]
Sandhu, Ravi [1 ]
机构
[1] UT San Antonio, Dept Comp Sci, Inst Cyber Secur, One UTSA Circle, San Antonio, TX 78249 USA
来源
PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17) | 2017年
关键词
Access Control; Hadoop Ecosystem; Big Data; Data Lake; Role Based; Attributes; Groups Hierarchy; Object Tags;
D O I
10.1145/3078861.3084164
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Apache Hadoop is an important framework for fault-tolerant and distributed storage and processing of Big Data. Hadoop core platform along with other open-source tools such as Apache Hive, Storm, HBase offer an ecosystem to enable users to fully harness Big Data potential. Apache Ranger and Apache Sentry provide access control capabilities to several ecosystem components by offering centralized policy administration and enforcement through plugins. In this work we discuss the access control model for Hadoop ecosystem (referred as HeAC) used by Apache Ranger (release 0.6) and Sentry (release 1.7.0) along with Hadoop 2.x native authorization capabilities. This multi-layer model provides several access enforcement points to restrict unauthorized users to cluster resources. We further outline some preliminary approaches to extend the HeAC model consistent with widely accepted access control models.
引用
收藏
页码:125 / 127
页数:3
相关论文
共 14 条
[1]   Privacy Aware Access Control for Big Data: A Research Roadmap [J].
Colombo, Pietro ;
Ferrari, Elena .
BIG DATA RESEARCH, 2015, 2 (04) :145-154
[2]  
Das Devaraj., 2011, Hortonworks, IBM
[3]   The GURAG Administrative Model for User and Group Attribute Assignment [J].
Gupta, Maanak ;
Sandhu, Ravi .
NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 :318-332
[4]  
Gupta Maanak, 2017, P ACM SACMAT
[5]  
Gupta Maanak, 2017, P IFIP DBSEC
[6]   Attribute-Based Access Control [J].
Hu, Vincent C. ;
Kuhn, D. Richard ;
Ferraiolo, David F. .
COMPUTER, 2015, 48 (02) :85-88
[7]   A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC [J].
Jin, Xin ;
Krishnan, Ram ;
Sandhu, Ravi .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 :41-55
[8]   Adding Attributes to Role-Based Access Control [J].
Kuhn, D. Richard ;
Coyne, Edward J. ;
Weil, Timothy R. .
COMPUTER, 2010, 43 (06) :79-81
[9]  
Kulkarni Devdatta., 2013, Proceedings of ACM Conference on Data and application security and privacy, P161, DOI DOI 10.1145/2435349.2435370
[10]  
O'Malley Owen., 2009, Hadoop security design