• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

±¹³» ³í¹®Áö

Ȩ Ȩ > ¿¬±¸¹®Çå > ±¹³» ³í¹®Áö > Çѱ¹Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö > Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Á¤º¸Ã³¸®ÇÐȸ ³í¹®Áö ÄÄÇ»ÅÍ ¹× Åë½Å½Ã½ºÅÛ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) ÇÏµÓ ºÐ»ê ÆÄÀÏ ½Ã½ºÅÛ¿¡¼­ ±×·ìÅ° ±â¹Ý Permission Management ½Ã½ºÅÛ ¼³°è
¿µ¹®Á¦¸ñ(English Title) A Design of Permission Management System Based on Group Key in Hadoop Distributed File System
ÀúÀÚ(Author) ±èÇüÁÖ   °­Á¤È£   À¯Çѳª   Àü¹®¼®   Hyungjoo Kim   Jungho Kang   Hanna You   Moonseog Jun  
¿ø¹®¼ö·Ïó(Citation) VOL 04 NO. 04 PP. 0141 ~ 0146 (2015. 04)
Çѱ۳»¿ë
(Korean Abstract)
ÃÖ±Ù ½º¸¶Æ® ±â±â ¹× ¼Ò¼È ³×Æ®¿öÅ© ¼­ºñ½º, ½ºÆ®¸®¹Ö ¼­ºñ½º µî IT ±â¼úÀÇ ¹ß´Þ·Î ÀÎÇØ µ¥ÀÌÅÍ°¡ ±ÞÁõÇÏ¿´´Ù. ÀÌ·¯ÇÑ È¯°æ¿¡ ¸ÂÃç ´ë¿ë·® µ¥ÀÌÅ͸¦ ó¸®ÇÒ ¼ö ÀÖ´Â ±â¼úµµ ÇÔ²² ÁÖ¸ñ¹Þ°í Àִµ¥, °¡Àå ´ëÇ¥ÀûÀÎ ±â¼úÀÌ ÇϵÓÀÌ´Ù. ÇϵÓÀº ¿ÀÇ ¼Ò½º ±â¹ÝÀ¸·Î ¸®´ª½º ±â¹ÝÀÇ ¹ü¿ë ÄÄÇ»ÅÍ¿¡¼­ ½ÇÇàÇÒ ¼ö ÀÖµµ·Ï ¼³°èµÇ¾ú´Ù. Ãʱâ ÇϵÓÀº º¸¾ÈÀÌ °ÅÀÇ µµÀÔµÇÁö ¾Ê¾ÒÀ¸³ª, »ç¿ëÀÚ°¡ ´Ã¾î³²¿¡ µû¶ó º¸¾ÈÀÌ ÇÊ¿äÇÑ µ¥ÀÌÅÍ°¡ Áõ°¡Çϸ鼭 2009³â Ä¿¹ö·Î½º¿Í ÅäÅ« ½Ã½ºÅÛÀ» µµÀÔÇÑ »õ·Î¿î ¹öÀüÀÌ ³ª¿Ô´Ù. ±×·¯³ª ÀÌ ¹æ½ÄÀº ÇϳªÀÇ ºñ¹ÐÅ°¸¸À» »ç¿ëÇÏ°í, »ç¿ëÀÚ¸¶´Ù ºí·Ï¿¡ ´ëÇÑ Á¢±ÙÇã°¡¸¦ ÁöÁ¤ÇÒ ¼ö ¾ø´Ù´Â ¹®Á¦Á¡°ú ÀçÀü¼Û °ø°Ý ¹× À§Àå °ø°Ý µîÀÌ °¡´ÉÇÏ´Ù´Â Ãë¾àÁ¡À» °¡Áö°í ÀÖ´Ù. µû¶ó¼­ º» ³í¹®¿¡¼­´Â ÀÌ·¯ÇÑ Ãë¾àÁ¡À» º¸¾ÈÇϸ鼭 ¼º´ÉÀ» À¯ÁöÇϱâ À§ÇØ »ç¿ëÀÚµéÀ» ³í¸®ÀûÀÎ ±×·ìÀ¸·Î ¹­¾î¼­ ÀÎÁõÇÏ°í, À̸¦ ÅäÅ«¿¡ ¹Ý¿µÇÏ´Â ±×·ìÅ° ±â¹ÝÀÇ ÇÁ·ÎÅäÄÝÀ» Á¦¾ÈÇÏ¿´´Ù. ¼º´ÉÆò°¡ °á°ú Å° »ý¼º¿¡ µû¸¥ ¿À¹öÇìµå°¡ ¾ø°í, ºñ¹ÐÅ° À¯Ãâ¿¡ ´ëÇÑ Ãë¾àÁ¡À» ÇØ°áÇÏ¿´À½À» È®ÀÎÇÏ¿´´Ù.
¿µ¹®³»¿ë
(English Abstract)
Data have been increased enormously due to the development of IT technology such as recent smart equipments, social network services and streaming services. To meet these environments the technologies that can treat mass data have received attention, and the typical one is Hadoop. Hadoop is on the basis of open source, and it has been designed to be used at general purpose computers on the basis of Linux. To initial Hadoop nearly no security was introduced, but as the number of users increased data that need security increased and there appeared new version that introduced Kerberos and Token system in 2009. But in this method there was a problem that only one secret key can be used and access permission to blocks cannot be authenticated to each user, and there were weak points that replay attack and spoofing attack were possible. Hence, to supplement these weak points and to maintain efficiency a protocol on the basis of group key, in which users are authenticated in logical group and then this is reflected to token, is proposed in this paper. The result shows that it has solved the weak points and there is no big overhead in terms of efficiency.
Å°¿öµå(Keyword) ÀÎÁõ   ÇϵӠ  HDFS   Ä¿¹ö·Î½º   ±×·ìÅ°   Authentication   Hadoop   HDFS   Kerberos   Group Key  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå