Access control method and system for object cloud storage

An access control and object technology, applied in the field of information security, can solve problems such as multiple sources, increased scale, role assignment and management difficulties

Inactive Publication Date: 2016-02-24
INST OF INFORMATION ENG CAS
View PDF5 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But at present, their access control schemes all adopt DAC (Discretionary Access Control, autonomous access control) and RBAC (RoleBased Access Control, role-based access control) models, but these two models cannot meet the application requirements of enterprise cloud storage, and there are some defects, mainly Expressed as:
[0007] 1) With the increase in the number of users and resources, the scale of ACL (AccessControlList, access control list) in DAC increases sharply, which is difficult to manage and maintain;
[0008] 2) To perform fin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and system for object cloud storage
  • Access control method and system for object cloud storage
  • Access control method and system for object cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] In order to make the above objects, features and advantages of the present invention more obvious and understandable, the present invention will be further described below through specific embodiments and accompanying drawings.

[0072] In this implementation case, the Figure 4 The structure of the database system is shown and described in detail Figure 4 In the table structure of the database system, PK in the figure indicates that the item is the primary key of the data table, and FK indicates that the item is the foreign key of the data table.

[0073] Set two user tables in the database system, which are divided into administrator table and common user table, and the object data file is a separate table. The data structure and data content of the data table are shown in Tables 1 and 2 below.

[0074] Table 1: Data structure of the data table TAdmin

[0075] field name

Types of

illustrate

ID

Integer

User ID

name

Char ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an access control method and system for object cloud storage. According to the method, data is stored at a cloud side in object storage structure, and the uploading and downloading of a file object are realized at a client side; when a server receives a request, the security level and security category of the request user are extracted, and the security levels and security categories of the user and the object file are judged through the mandatory access control method. The method and system can conveniently provide services for various clients and mobile terminals. As the two attributes, i.e. the security level and security category, are taken into consideration for the access control policy, the security of the object data is greatly improved. The method and system are capable of supporting the storage of large data volume, and effectively protecting the data privacy.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a method and system for realizing access control to media resource files in a cloud storage environment. Background technique [0002] The rapid development of cloud computing has changed people's understanding of traditional infrastructure services and data storage. Because cloud computing can reduce the cost of storage and computing, cloud storage services are increasingly trusted by enterprises and individuals. However, the use of cloud storage will bring serious security threats to important data. When unauthorized access touches the data, it will affect the confidentiality and integrity of the data. [0003] The following two patents are related to cloud storage control technology: [0004] Chinese invention patent application CN201310071664.2 discloses an attribute-based cloud storage access control system, which realizes the verification by decrypting and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/02H04L63/10H04L63/20H04L67/10
Inventor 杨腾飞陈驰于晶孙红涛
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products