CN107995204A - Hadoop framework method for evaluating trust based on Bayes models - Google Patents

Hadoop framework method for evaluating trust based on Bayes models Download PDF

Info

Publication number
CN107995204A
CN107995204A CN201711310134.3A CN201711310134A CN107995204A CN 107995204 A CN107995204 A CN 107995204A CN 201711310134 A CN201711310134 A CN 201711310134A CN 107995204 A CN107995204 A CN 107995204A
Authority
CN
China
Prior art keywords
mrow
trust
client
namenode
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711310134.3A
Other languages
Chinese (zh)
Inventor
章玉英
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Management Career Academy
Original Assignee
Sichuan Management Career Academy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Management Career Academy filed Critical Sichuan Management Career Academy
Priority to CN201711310134.3A priority Critical patent/CN107995204A/en
Publication of CN107995204A publication Critical patent/CN107995204A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a kind of Hadoop framework method for evaluating trust based on Bayes models, mainly utilize evaluation of the Hadoop framework cloud security platform trust link to the trusting behavior of client, the Service Source obtained again using evaluation result control client, so as to prevent malicious client illicit competition resource, and then reduce the service quality of Hadoop framework cloud security platform.The present invention is proposed based on Bayes average trust models, the model can prevent other legitimate clients of Hadoop framework cloud platform to be subject to the Denial of Service attack of " passive ", improve the fairness that client obtains Service Source, building dynamic behaviour trust link more can accurately analyze service behavior of the client node after Hadoop framework cloud platform is accessed at the same time, can effectively prevent the collaboration of malicious node from cheating.

Description

Hadoop framework method for evaluating trust based on Bayes models
Technical field
The present invention relates to the calculating assessment of the credible behavior of distributed computing system interior joint, and in particular to one kind is based on Bayes The Hadoop framework method for evaluating trust of average trust model.
Background technology
Hadoop framework cloud platform is a Distributed Calculation and storage platform increased income.Since Hadoop builds cloud platform The features such as distinctive scalability, disposition flexibility, more and more users pay much attention it.Hadoop structure cloud platforms are made For most popular one of cloud platform of increasing income, its further development of the safety effects of the platform.Typical Hadoop framework cloud The security of platform is the security strategy based on kerberos authentication agreement, although this method efficiently solves access, cloud platform is used The legitimacy of family identity, but the strategy can not prevent " legal " client from obtaining more interests by irregularities, i.e., it is objective " passive " Denial of Service attack caused by the end of family.Therefore the trust analysis for client behavior is the emphasis studied herein.
The problem of whether behavior of " legal " user is reliable be not able to verify that for Hadoop framework cloud platform, this paper presents Based on Bayes average trust models, which can prevent other legitimate clients of Hadoop framework cloud platform to be subject to " passive " Denial of Service attack, improve client obtain Service Source fairness, while build dynamic behaviour trust link can Service behavior of the more accurate analysis client node after Hadoop framework cloud platform is accessed, can effectively prevent malice from saving The collaboration deception of point.
The content of the invention
A kind of the defects of it is an object of the invention to overcome the prior art, there is provided collaboration that can effectively prevent malicious node The Hadoop framework method for evaluating trust based on Bayes average trust models of deception.
For the technical solution that the present invention will be described in detail, it is necessary first to in the present invention be based on goal of the invention Research foundation into Row illustrates.
First, Hadoop ecological safeties are described.
The ecological security system characteristic of Hadoop framework cloud platform has a relatively complete design principle, including: Scalability, fault-tolerance and automatic reparations, storage system programmability, clear simple programming are abstracted and big data is uniformly deposited Platform is stored up, the security performance for possessing the following aspects:
1) authentication:Authentication techniques are to ensure that client user ensures its identity after accessing Hadoop framework cloud platform Legitimacy, realize the Single Sign On to client node;
2) authorize:Access level is set up for the different data of susceptibility, the client then accessed needs gives phase The role of the grade of service is answered, different grades of sensitive data is accessed so as to fulfill different grades of user;
3) data-privacy and encryption:Substantial amounts of customer privacy data and significant data are stored with cloud platform, to data Secret protection and data encryption are a basic demands of cloud platform safety;
4) system safety:To ensure its normal operation for a complete Hadoop framework cloud platform, in cloud platform Physical layer, data storage layer, middleware management level and application node layer are required for ensureing its security;
5) audit and event-monitoring:For the cloud platform system of data ecological safety, the security system using event as driving Need to ensure that each event is safe after performing, and Audit Report is provided to event implementing result;
6) credible and secure system:To prevent legitimate client end node " illegal " behavior from violation of rules and regulations, damaging Hadoop framves wantonly The service benefits of other legitimate clients are, it is necessary to establish the degrees of comparison of complete set for each client node in structure cloud platform Scoring;
7) adaptive security:The safe scoring of client node is by Hadoop framework cloud platform automated execution, tool There is adaptive characteristic, according to client executing task situation, the monitoring node in cloud platform dynamically provides each client in real time Node score value.
The Hadoop framework method for evaluating trust based on Bayes models of the present invention, mainly utilizes Hadoop framework Yunan County Full evaluation of the platform trust link to the trusting behavior of client, then the Service Source obtained using evaluation result control client, So as to prevent malicious client illicit competition resource, and then reduce the service quality of Hadoop framework cloud security platform.
Further scheme is:
The Hadoop framework cloud security platform trust link include DataNode, NameNode/ backup NameNode and JobTracker, realizes the trusting behavior scoring to client node, specifically includes:
Each DataNode nodes in Hadoop framework cloud platform carry out periodic trust service evaluation to client, Then oneself is transferred to the assessment result of client NameNode/ backups NameNode.When the normal work of NameNode nodes When making, backup NameNode is in " dormancy " state, and the trust data that otherwise DataNode nodes return is by backup NameNode Node receives, then carries out trusting calculating processing.JobTracker is used for the monitoring function of Hadoop framework cloud platform, and the node is defeated It is to come from NameNode/ backup NameNode to enter information, exports and is used to correct DataNode nodes to each DataNode nodes To the trust value of each client node behavior;
When client node accesses Hadoop framework cloud platform, monitoring node JobTracker and trust link control are trusted Node NameNode/ backups NameNode processed carries out trust information interaction, after completing to trust calculating initialization, NameNode/ backups NameNode will select some DataNode nodes to provide client storage and calculate data service, and The DataNode nodes that driving is providing service are formed one by one to the row of existing customer end node according to the location order of deployment For the trust data chain examined, i.e., a upper DataNode node passes to trust value by I/O transmission links next A DataNode nodes, last end DataNode nodes return to all trust values and give NameNode/ backups NameNode.Work as letter Appoint link control node NameNode/ backups NameNode when receiving trust evaluation value, trust monitoring node JobTracker and After trust link control node NameNode/ backups NameNode carries out trust information " exchange " again, monitoring node is trusted JobTracker determines the trust value of client.
Further scheme is:
Each client node Behavior trustworthiness value is by trusting monitoring node JobTracker, trust link control node NameNode/ backups NameNode and memory node DataNode are together decided on, and client node is in access Hadoop framves first Before structure cloud platform, trust monitoring node JobTracker and its legitimacy is verified using kerberos authentication agreement, so Legal access cloud platform ticket authorisation is given afterwards.Client node has only passed through the identification of cloud platform, trusts monitoring Node JobTracker just carries out assessment calculating to its Behavior trustworthiness.
Further scheme is:
The trust value of client is calculated in the NameNode nodes by the following method:
After n service interaction occurs for client x and high in the clouds y, during client obtains service, it shows as just The number of Chang Hangwei is u, and improper behavior number is that the successful posterior probability of v, then client x and high in the clouds y direct interactions is obeyed Beta is distributed, its density function is:
Wherein, Γ (x) is gamma function, is also Euler's second integral, is that factorial function extends on real number and plural number Certain function summary.
Direct degree of belief is
Wherein, E [x] takes desired value to Beta distributions.
The degree of belief of each client is together decided on by all high in the clouds of Hadoop framework cloud platform.Assuming that it is based on Hadoop High in the clouds number is m in framework cloud platform, and the importance rate that client behavior is judged in each high in the clouds under normal conditions is identical , then the NameNode nodes in cloud platform are to the trust value of client x
The present invention is proposed based on Bayes average trust models, the model can prevent Hadoop framework cloud platform other Legitimate client is subject to the Denial of Service attack of " passive ", improves the fairness that client obtains Service Source, builds at the same time Dynamic behaviour trust link more can accurately analyze service rows of the client node after Hadoop framework cloud platform is accessed Can effectively to prevent the collaboration of malicious node from cheating.
Brief description of the drawings
Fig. 1 is the status information stream of the cloud platform trust link of Hadoop framework of the present invention;
Computational methods are trusted in Fig. 2 dynamic behaviours of the present invention.
Embodiment
The present invention is further illustrated with specific embodiment below in conjunction with the accompanying drawings.
In the present invention, under Hadoop framework cloud environment, when malicious client accesses Hadoop framework cloud platform, it may Storage resource and computing resource are obtained by " improper competition " mode, seriously affect the service of whole Hadoop framework cloud platform Resource dispatching strategy.Since the trusting relationship that client accesses high in the clouds under Hadoop framework cloud platform has dynamic and does not know Property, then Bayes deduces the service trust behavior evaluation that the preferable simulant-client of mechanism logs in high in the clouds, i.e., multiple high in the clouds are to every A client logs in the reliability evaluation of the service behavior of Hadoop framework cloud platform.
After n service interaction occurs for client x and high in the clouds y, during client obtains service, it shows as just The number of Chang Hangwei is u, and improper behavior number is that the successful posterior probability of v, then client x and high in the clouds y direct interactions is obeyed Beta is distributed, its density function is:
Direct degree of belief is
The degree of belief of each client is together decided on by all high in the clouds of Hadoop framework cloud platform.Assuming that it is based on Hadoop High in the clouds number is m in framework cloud platform, and the importance rate that client behavior is judged in each high in the clouds under normal conditions is identical , then the NameNode nodes in cloud platform are to the trust value of client x
Of the invention is exactly mainly to be participated in jointly using DataNode, NameNode/ backup NameNode and JobTracker Evaluation to the trusting behavior of client, then the Service Source obtained using evaluation result control client, so as to prevent malice visitor Family end illicit competition resource, and then reduce the service quality of Hadoop framework cloud security platform.
Hadoop framework cloud security platform trust link by DataNode, NameNode/ backup NameNode and JobTracker, which is realized, scores the trusting behavior of client node, each DataNode nodes in Hadoop framework cloud platform Periodic trust service evaluation is carried out to client, oneself is then transferred to NameNode/ to the assessment result of client Backup NameNode.When NameNode nodes work normally, backup NameNode is in " dormancy " state, otherwise DataNode The trust data that node returns is received by backup NameNode nodes, then carries out trusting calculating processing.JobTracker is mainly used In the monitoring function of Hadoop framework cloud platform, node input information is to come from NameNode/ backup NameNode, export to Each DataNode nodes are used to correct trust value of the DataNode nodes to each client node behavior, then each client Trust link status information stream it is as shown in Figure 1.
When client node accesses Hadoop framework cloud platform, monitoring node JobTracker and trust link control are trusted Node NameNode/ backups NameNode processed carries out trust information interaction, after completing to trust calculating initialization, NameNode/ backups NameNode will select some DataNode nodes to provide client storage and calculate data service, and The DataNode nodes that driving is providing service are formed one by one to the row of existing customer end node according to the location order of deployment For the trust data chain examined, i.e., a upper DataNode node passes to trust value by I/O transmission links next A DataNode nodes, last end DataNode nodes return to all trust values and give NameNode/ backups NameNode.Work as letter Appoint link control node NameNode/ backups NameNode when receiving trust evaluation value, trust monitoring node JobTracker and After trust link control node NameNode/ backups NameNode carries out trust information " exchange " again, monitoring node is trusted JobTracker determines the trust value of client.
Handled according to Hadoop framework cloud platform trust information streaming and result of calculation, each client node behavior are believed Value is appointed to determine that their entities include by three participants:Trust monitoring node JobTracker, trust link control node NameNode/ backups NameNode and memory node DataNode.Client node is in access Hadoop framework cloud platform first Before, trust monitoring node JobTracker to verify its legitimacy using kerberos authentication agreement, then give Legal access cloud platform ticket authorisation.Client node has only passed through the identification of cloud platform, trusts monitoring node JobTracker just carries out its Behavior trustworthiness assessment calculating, and the Behavior trustworthiness value calculation process of client is as shown in Figure 2.
For the client of each access Hadoop framework cloud platform, the present invention participates in evaluation client using all high in the clouds Trust chain transmit trust value one by one and obtain mode, Behavior trustworthiness assessment situation is finally returned into trust monitoring node JobTracker, so as to solve " illegal " behavior in access Hadoop framework cloud platform of " legal " client, effectively improves The service quality of the ecological security system of Hadoop framework cloud platform.
Although reference be made herein to invention has been described for explanatory embodiment of the invention, and above-described embodiment is only this hair Bright preferable embodiment, embodiments of the present invention are simultaneously not restricted to the described embodiments, it should be appreciated that people in the art Member can be designed that a lot of other modifications and embodiment, these modifications and embodiment will fall in principle disclosed in the present application Within scope and spirit.

Claims (4)

  1. A kind of 1. Hadoop framework method for evaluating trust based on Bayes models, it is characterised in that:
    Evaluation of the Hadoop framework cloud security platform trust link to the trusting behavior of client mainly is utilized, then using evaluation result The Service Source for controlling client to obtain, so as to prevent malicious client illicit competition resource, and then reduces Hadoop framework cloud The service quality of security platform.
  2. 2. the Hadoop framework method for evaluating trust based on Bayes models according to claim 1, it is characterised in that:
    The Hadoop framework cloud security platform trust link include DataNode, NameNode/ backup NameNode and JobTracker, realizes the trusting behavior scoring to client node, specifically includes:
    Each DataNode nodes in Hadoop framework cloud platform carry out periodic trust service evaluation to client, then Oneself is transferred to the assessment result of client NameNode/ backups NameNode;When NameNode nodes work normally, Backup NameNode is in " dormancy " state, and the trust data that otherwise DataNode nodes return is connect by backup NameNode nodes Receive, then carry out trusting calculating processing;JobTracker is used for the monitoring function of Hadoop framework cloud platform, node input information It is to come from NameNode/ backup NameNode, exports and be used to correct DataNode nodes to each to each DataNode nodes The trust value of client node behavior;
    When client node accesses Hadoop framework cloud platform, trust monitoring node JobTracker and saved with trust link control Point NameNode/ backups NameNode carries out trust information interaction, and after completing to trust calculating initialization, NameNode/ is standby Part NameNode will select some DataNode nodes to provide client storage and calculate data service, and drive and providing The DataNode nodes of service are examined according to the behavior that the location order of deployment is formed one by one to existing customer end node Trust value is passed to next DataNode by I/O transmission links and saved by trust data chain, i.e., a upper DataNode node Point, last end DataNode nodes return to all trust values and give NameNode/ backups NameNode;Saved when trust link controls When point NameNode/ backups NameNode receives trust evaluation value, trust monitoring node JobTracker and controlled with trust link After node NameNode/ backups NameNode carries out trust information " exchange " again, trust monitoring node JobTracker and determine The trust value of client.
  3. 3. the Hadoop framework method for evaluating trust based on Bayes models according to claim 2, it is characterised in that:
    Each client node Behavior trustworthiness value is by trusting monitoring node JobTracker, trust link control node NameNode/ backups NameNode and memory node DataNode are together decided on, and client node is in access Hadoop framves first Before structure cloud platform, trust monitoring node JobTracker and its legitimacy is verified using kerberos authentication agreement, so Legal access cloud platform ticket authorisation is given afterwards;Client node has only passed through the identification of cloud platform, trusts monitoring Node JobTracker just carries out assessment calculating to its Behavior trustworthiness.
  4. 4. the Hadoop framework method for evaluating trust based on Bayes models according to Claims 2 or 3, it is characterised in that:
    The trust value of client is calculated in the NameNode nodes by the following method:
    After n service interaction occurs for client x and high in the clouds y, during client obtains service, it shows as normal row For number be u, improper behavior number is that the successful posterior probability of v, then client x and high in the clouds y direct interactions obeys Beta Distribution, its density function are:
    <mrow> <mi>B</mi> <mi>e</mi> <mi>t</mi> <mi>a</mi> <mrow> <mo>(</mo> <mi>&amp;theta;</mi> <mo>|</mo> <mi>u</mi> <mo>,</mo> <mi>v</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfrac> <mrow> <mi>&amp;Gamma;</mi> <mrow> <mo>(</mo> <mi>u</mi> <mo>+</mo> <mi>v</mi> <mo>+</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow> <mrow> <mi>&amp;Gamma;</mi> <mrow> <mo>(</mo> <mi>u</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> </mrow> <mi>&amp;Gamma;</mi> <mrow> <mo>(</mo> <mi>v</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </mfrac> <msup> <mi>&amp;theta;</mi> <mi>u</mi> </msup> <msup> <mrow> <mo>(</mo> <mn>1</mn> <mo>-</mo> <mi>&amp;theta;</mi> <mo>)</mo> </mrow> <mi>v</mi> </msup> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow>
    Wherein, Γ (x) is gamma function;
    Direct degree of belief is
    <mrow> <msub> <mi>&amp;theta;</mi> <mrow> <mi>x</mi> <mi>y</mi> </mrow> </msub> <mo>=</mo> <mi>E</mi> <mo>&amp;lsqb;</mo> <mi>B</mi> <mi>e</mi> <mi>t</mi> <mi>a</mi> <mrow> <mo>(</mo> <mi>&amp;theta;</mi> <mo>|</mo> <mi>u</mi> <mo>+</mo> <mn>1</mn> <mo>,</mo> <mi>v</mi> <mo>+</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>&amp;rsqb;</mo> <mo>=</mo> <mfrac> <mrow> <mi>u</mi> <mo>+</mo> <mn>1</mn> </mrow> <mrow> <mi>n</mi> <mo>+</mo> <mn>2</mn> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow>
    Wherein, E [x] takes desired value to Beta distributions;
    The degree of belief of each client is together decided on by all high in the clouds of Hadoop framework cloud platform;Assuming that it is based on Hadoop framework High in the clouds number is m in cloud platform, and the importance rate that client behavior is judged in each high in the clouds under normal conditions be it is identical, then NameNode nodes in cloud platform are to the trust value of client x
    <mrow> <msub> <mi>&amp;theta;</mi> <mi>x</mi> </msub> <mo>=</mo> <mfrac> <mrow> <msub> <mi>&amp;Sigma;</mi> <mrow> <mi>y</mi> <mo>&amp;Element;</mo> <mo>{</mo> <mn>1</mn> <mo>,</mo> <mn>...</mn> <mo>,</mo> <mi>m</mi> <mo>}</mo> </mrow> </msub> <msub> <mi>&amp;theta;</mi> <mrow> <mi>x</mi> <mi>y</mi> </mrow> </msub> </mrow> <mi>m</mi> </mfrac> <mo>.</mo> </mrow>
CN201711310134.3A 2017-12-11 2017-12-11 Hadoop framework method for evaluating trust based on Bayes models Pending CN107995204A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711310134.3A CN107995204A (en) 2017-12-11 2017-12-11 Hadoop framework method for evaluating trust based on Bayes models

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711310134.3A CN107995204A (en) 2017-12-11 2017-12-11 Hadoop framework method for evaluating trust based on Bayes models

Publications (1)

Publication Number Publication Date
CN107995204A true CN107995204A (en) 2018-05-04

Family

ID=62037429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711310134.3A Pending CN107995204A (en) 2017-12-11 2017-12-11 Hadoop framework method for evaluating trust based on Bayes models

Country Status (1)

Country Link
CN (1) CN107995204A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111190909A (en) * 2019-05-17 2020-05-22 延安大学 Data credible processing method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257386A (en) * 2008-03-11 2008-09-03 南京邮电大学 Dynamic accesses control method based on trust model
CN103347028A (en) * 2013-07-15 2013-10-09 福州大学 Peer-to-peer network trust degree measurement model based on Bayes under cloud architecture
US20160299919A1 (en) * 2013-06-03 2016-10-13 Zettaset, Inc. Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257386A (en) * 2008-03-11 2008-09-03 南京邮电大学 Dynamic accesses control method based on trust model
US20160299919A1 (en) * 2013-06-03 2016-10-13 Zettaset, Inc. Management of Intermediate Data Spills during the Shuffle Phase of a Map-Reduce Job
CN103347028A (en) * 2013-07-15 2013-10-09 福州大学 Peer-to-peer network trust degree measurement model based on Bayes under cloud architecture

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
江峰,杨章伟: ""Hadoop云平台中基于行为的信任评估研究"", 《萍乡高等专科学校学报》 *
谢苑: ""基于贝叶斯网络的动态信任模型研究"", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111190909A (en) * 2019-05-17 2020-05-22 延安大学 Data credible processing method

Similar Documents

Publication Publication Date Title
JP6918245B2 (en) Identity verification method and equipment
CN112348204B (en) Safe sharing method for marine Internet of things data under edge computing framework based on federal learning and block chain technology
CN103944722B (en) Identification method for user trusted behaviors under internet environment
US11899808B2 (en) Machine learning for identity access management
WO2021036014A1 (en) Federated learning credit management method, apparatus and device, and readable storage medium
CN107103473A (en) A kind of intelligent contract implementation method based on block chain
CN112434280A (en) Block chain-based federal learning defense method
CN111092910B (en) Database security access method, device, equipment, system and readable storage medium
CN104009959B (en) A kind of cloud access control method that can verify that based on XACML
CN105045597B (en) A kind of JAVA card object reference method and device
CN113779617B (en) State channel-based federal learning task credible supervision and scheduling method and device
CN115499129A (en) Multimode trust cross-chain consensus method, system, medium, equipment and terminal
CN109246178B (en) Online title distribution method and device, server and storage medium
CN107347064A (en) Cloud computing platform Tendency Prediction method based on neural network algorithm
CN107995204A (en) Hadoop framework method for evaluating trust based on Bayes models
CN110458570B (en) Risk transaction management and configuration method and system thereof
CN116170199A (en) Equipment access verification system based on gateway of Internet of things
CN115168830A (en) Login method and login device for detecting user login environment
CN114611112A (en) Excitation system and excitation method for cooperative population intelligence mitigation of undisclosed vulnerabilities
CN112437407A (en) Method and system for calculating initialized safety state of power internet of things wireless terminal equipment based on mixed information entropy
CN109951448A (en) Domain name authentic authentication method and device based on block chain
CN117834304B (en) Autonomous controllable master control network safety protection system
Cui et al. Trust Evaluation of Topological Nodes in Intelligent Connected Vehicles Communication Network under Zero-Trust Environment
CN111988184B (en) Broadcast storm detection and processing method based on situation awareness
CN102739690A (en) Safety data exchange process monitoring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180504