Data resource authority management method based on access control list

A technology of access control list and data resources, which is applied in the direction of electronic digital data processing, digital data authentication, instruments, etc., can solve the problems of low query efficiency and bloated content of access control list, and achieve the convenience of independent development, shorten the query time, interface clear effect

Inactive Publication Date: 2011-07-20
TSINGHUA UNIV
View PDF3 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the public resource data in a large-scale distributed storage system includes more than millions of files. If each file is saved with an access control list record, the content of the access control list will be bloated and the query efficiency will be low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data resource authority management method based on access control list
  • Data resource authority management method based on access control list

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The data resource authority management method based on the access control list proposed by the present invention is described as follows in conjunction with the accompanying drawings and embodiments.

[0022] For a large-scale distributed storage system containing massive public resource data, in order to improve the response speed, the most effective measure is to reduce the number of records in the database as much as possible and shorten the single query time. The public resource data in a large-scale distributed storage system includes more than several million files, and most of the access control lists have the same value. Therefore, the core idea of ​​the present invention is to adopt the authority inheritance strategy, so that the authority value of the parent directory is inherited when creating a new object or copying an object, thereby reducing repeated records and shortening the time for querying data as much as possible.

[0023] Such as figure 1 As shown,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data resource authority management method based on an access control list, which comprises the following steps: S1: setting an access control authority list and a related user list for a directory / file of data resources on the basis of authority inheritance rules; S2: retrieving a name of a user who is going to access from an accessible user group name set, an authority value set and a user name set of the directory / file to be accessed, and receiving the returned authority value; S3: judging whether the authority value is null, and if not, executing S4; and S4: permitting the user who is going to access to execute the corresponding access operation according to the authority value, and if the authority value is null, retrieving the name of the user who is going to access in a recursive mode, and returning to the step S3. The method can enhance the access authority inquiry efficiency of large-volume data resources, and implement simple and independent data resource authority management and control.

Description

technical field [0001] The invention relates to the technical field of data resource rights management and control, in particular to a data resource rights management method based on an access control list. Background technique [0002] Access control list is usually used to describe the access control permission of a file / directory. It is an access control method used by many operating systems. It provides multiple ways for the operating system to control the resources that operators can access. It is an operating system or distribution It is a key core component of traditional system management and an important way to protect the security of data and resources in the system. [0003] The most basic functions of the access control list include: replying to the permission of the resource accessed by the client; providing an interface for users to query or operate the access control permission; administrators can modify the access control permission of the user group correspo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/30
Inventor 杨广文许春聪黄小猛
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products