[1]Hortonworks. What is apache Hadoop[EBOL]. 2013 [20160708]. http:hortonworks.com hadoop[2]Shvachko K, Kuang H, Radia S, et al. The Hadoop distributed file system[C] Proc of the 26th IEEE Symp on Mass Storage Systems and Technologies (MSST). Piscataway, NJ: IEEE, 2010: 110[3]Dean J, Ghemawat S. MapReduce: Simplified data processing on large clusters[J]. Magazine Communications of the ACM, 2008, 51(1): 107113 [4]Mall N, Rana S. Overview of big data and Hadoop[J]. Imperial Journal of Interdisciplinary Research, 2016, 2(5): 13991403[5]Sharma P, Navdeti C. Securing big data Hadoop: A review of security issues, threats and solution[J]. International Journal of Computer Science and Information Technologies, 2014, 5(2): 21262131 [6]Sadasivam G, Kumari K, Rubika S. A novel authentication service for Hadoop in cloud environment[C]Proc of IEEE Int Conf on Cloud Computing in Emerging Markets (CCEM). Piscataway, NJ: IEEE, 2012: 16[7]Somu N, Gangaa A, Sriram V. Authentication service in Hadoop using one time pad[J]. Indian Journal of Science and Technology, 2014, 7(S4): 5662[8]Condie T, Conway N, Alvaro P, et al. MapReduce online[J]. The National Spatial Data Infrastructure, 2010, 10(4): 313327[9]Hortonworks. Adding security to hadoop[EBOL]. 2013[20160708]. http:hortonworks.comwpcontentuploads201110securitydesign_withCover1.pdf[10]李延改. 面向Hadoop的安全机制设计[D]. 济南: 山东财经大学, 2015[11]Venugopalan S, Noland B. With sentry, cloudera fills Hadoops enterprise security gap[EBOL]. (20130724)[20160708]. http:blog.cloudera.comblog201307withsentryclouderafillshadoopsenterprisesecuritygap[12]Cloudera. Sentry[EBOL]. 2013[20160708]. http:www.cloudera.comcontentclouderaenproductsandservicescdhsentry.html[13]RecordService. RecordService introduction[R]. Burlingame, CA: RecordService,2015[14]Kuff L, Li Nong. RecordService: For finegrained security enforcement across the Hadoop ecosystem[EBOL]. (20150928) [20160708]. https:blog.cloudera.comblog201509recordserviceforfinegrainedsecurityenforcementacrossthehadoopecosystem[15]Mahsa T. Evaluation of security in Hadoop[D]. Stockholm: Kommunikationsnt, 2015[16]Hortonworks. Hortonworks technical preview for Apache Knox Gateway[R]. Palo Alto, CA: Hortonworks, 2013[17]RezaeiJam M, Khanli L, Akbari M. A survey on security of Hadoop[C] Proc of the 4th Int Conf on Computer and Knowledge Engineering (ICCKE). Mashhad: ICCKE, 2014: 716721[18]Kang Lishan, Zhang Xuejie. Identitybased authentication in cloud storage sharing[C]Proc of IEEE Int Conf on Multimedia Information Networking and Security. Piscataway, NJ: IEEE, 2010: 851855[19]Shen Zhidong, Tong Qiang. The security of cloud computing system enabled by trusted computing technology[C]. Proc of the 2nd Int Conf on Signal Processing Systems. Piscataway, NJ: IEEE, 2010: V211V215[20]Dong Chuntao, Shen Qingni, Li Wenting, et al. Eavesdropper: A framework for detecting the location of the processed result in Hadoop[G] Information and Communications Security. Berlin: Springer, 2016: 458466[21]Rong Chunming, Quan Zhou, Chakravorty A. On access control schemes for Hadoop data storage[C]Proc of IEEE Int Conf on Cloud Computing and Big Data. Piscataway, NJ: IEEE, 2013: 641645[22]Cheng Yi, Schaefer C. Policybased preprocessing in Hadoop[C]Proc of ASE BigDataSocialInformaticsPASSATBioMedCom 2014 Conf. Cambridge: ASE, 2014[23]Ko R, Will M. Progger: An efficient, tamperevident kernelspace logger for cloud data provenance tracking[C]Proc of the 7th IEEE Int Conf on Cloud Computing. Piscataway, NJ: IEEE, 2014: 881889[24]Khalil I, Dou Zuochao, Khreishah A. TMPbased authentication mechanism of Apache Hadoop[C] Proc of Int Conf on Security and Privacy in Communication Networks. Berlin: Springer, 2015, 152: 105122[25]Leicher A, Kuntze N, Schmidt A. Implementation of a trusted ticket system[G] Emerging Challenges for Security, Privacy and Trust. Berlin: Springer, 2009: 152163[26]Ruan A, Martin A. Towards a trusted mapreduce infrastructure[C] Proc of the 8th IEEE World Congress on Services (SERVICES). Piscataway, NJ: IEEE, 2012: 141148[27]Santos N, Gummadi K, Rodrigues R. Towards trusted cloud computing[C]Proc of Conf on Hot Topics in Cloud Computing. Berkeley: USENIX, 2009[28]Moghaddam F, Alrashdan M, Karimi O. A hybrid encryption algorithm based on RSA smalle and efficientRSA for cloud computing environments[J]. Journal of Advances in Computer Network, 2013, 1(3): 238241[29]Song Lei, Qin Jun, Liang Shengxi, et al. A hybrid encryption scheme for Hadoop based on symmetric and asymmetric encryption[J]. Applied Mechanics and Materials, 2014, 598: 691694[30]Shehzad D, Khan Z, Dag H, et al. A novel hybrid encryption scheme to ensure Hadoop based cloud data security[J]. International Journal of Computer Science and Information Security, 2016, 14(4): 480484[31]Yang Chao, Lin Weiwei, Liu Mingqi. A novel triple encryption scheme for Hadoopbased cloud data security[C]Proc of the 4th Int Conf on Emerging Intelligent Data and Web Technologies (EIDWT). Piscataway, NJ: IEEE, 2013: 437442[32]Wang Feng, Kohler M, Schaad A. Initial encryption of large searchable data sets using Hadoop[C] Proc of the 20th ACM Symp on Access Control Models and Technologies. New York: ACM, 2015: 165168
|