Unlock instant, AI-driven research and patent intelligence for your innovation.

Data access method, system and data warehouse

A data access and data collection technology, applied in the direction of digital data authentication, digital data protection, electronic digital data processing, etc., can solve the problems of not having file 2 access rights, different rights, difficulties, etc.

Active Publication Date: 2018-03-27
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A file generally only belongs to one user and group, so it is difficult for different users to have different permissions on the same file
[0003] For example: in the existing Hadoop distributed file system (English: Hadoop Distributed File System, abbreviation: HDFS), different users only operate on the file system that the user has access to, and it is difficult to implement complex cross-user access control, such as user 1 Only has the access right to file 1 created by user 1, but not to file 2 created by user 2. User 1 can only operate on file 1, but not on file 2.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method, system and data warehouse
  • Data access method, system and data warehouse
  • Data access method, system and data warehouse

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Figure 1a A flowchart showing a data access method according to Embodiment 1 of the present invention. Such as Figure 1aAs shown, the data access methods include:

[0059] Step 100: Receive an access request event submitted by a first user, where the access request event carries multiple data sets to be accessed specified by the first user, and the multiple data sets are created by multiple users.

[0060] Specifically, a data warehouse such as Hive can access a file system based on a parallel computing (English: MapReduce, abbreviation: MR) system. A user data set may be stored in the data warehouse, and the data set may be implemented in the form of a user data table, and the user data set may belong to different users. In actual business scenarios, users may need to cross access each other's data sets. For example, a first user may need to associate a second user's user data table with its own user data table. The second user may be a user other than the first u...

Embodiment 2

[0073] figure 2 A flowchart showing a data access method according to Embodiment 2 of the present invention. figure 2 Winning mark and Figure 1a The same steps have the same functions, and detailed descriptions of these steps are omitted for brevity.

[0074] Such as figure 2 As shown, this embodiment and Figure 1a The main difference in the data access methods shown is that step 140 may include:

[0075] Step 200, obtaining the identity authentication authority of each user ID;

[0076] Step 210, establishing a corresponding relationship between the identity authentication authority of each user ID and the file storage path information corresponding to each data set;

[0077] Therefore, in step 150 of the above embodiment, the parallel access task issued by the data warehouse to the parallel computing system may also include the corresponding relationship.

[0078] For example, if Figure 1b As shown, after Hive receives the access request event, it can search for...

Embodiment 3

[0085] image 3 A flowchart showing a data access method according to Embodiment 3 of the present invention. image 3 Winning mark and Figure 1a and figure 2 The same steps in have the same functions, and for the sake of brevity, detailed descriptions of these steps are omitted.

[0086] Such as image 3 As shown, this embodiment and Figure 1a and figure 2 The main difference of the data access methods shown is that, if the identity authentication authority includes a super token, step 140 may also include:

[0087] Step 300, obtain a super token, and the super token allows access to data collections of all users.

[0088] Specifically, a super token that can access the data sets of all users in the file system can be preset, and the super token can be stored in the authority configuration information module of the user access table of the data warehouse. After the data warehouse receives the access request event, the super token can be obtained from the authority c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a data access method, system and data warehouse, wherein the data access method includes receiving an access request event submitted by a first user; determining the access rights of the first user to the multiple data sets; if the The first user has the access authority to access each data set, and determines a plurality of user identifications corresponding to the plurality of data sets; acquires file storage path information corresponding to each data set; and obtains according to the plurality of user identifications Identity authentication authority corresponding to each user ID; issue parallel access tasks to the parallel computing system. By sending identity authentication authority and file storage path information corresponding to multiple user IDs to the parallel computing system, cross-user access can be realized, and one user can access data collections of multiple users.

Description

technical field [0001] The invention relates to the field of file management, in particular to a data access method, system and data warehouse. Background technique [0002] The file system can be used to manage file storage. Common file systems include the file system of linux and the file system of windows. They all have access rights management methods for different users or groups of users, which can include read file content, modify file content, and executable permissions. A file generally only belongs to one user and group, so it is difficult for different users to have different permissions on the same file. [0003] For example: in the existing Hadoop distributed file system (English: Hadoop Distributed File System, abbreviation: HDFS), different users only operate on the file system that the user has access to, and it is difficult to implement complex cross-user access control, such as user 1 Only has access authority to file 1 created by user 1, but not to file ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F21/31G06F21/62
CPCG06F21/6218
Inventor 王文理袁静陈本华何志强
Owner HUAWEI CLOUD COMPUTING TECH CO LTD