Method and system for accessing big data system

A big data and access request technology, applied in the field of big data security, can solve problems such as hidden dangers of big data systems, and achieve the effects of improving security, facilitating unified management, and ensuring security

Inactive Publication Date: 2017-08-08
中国移动通信集团陕西有限公司
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the above problems, the present invention provides a method and system for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for accessing big data system
  • Method and system for accessing big data system
  • Method and system for accessing big data system

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0074] Such as figure 1 As shown, the present invention discloses a method of accessing a big data system, the method comprising:

[0075] Step 101: Detect whether an operation access request to the big data system from the application side is received through the application programming interface API.

[0076] Specifically, the application party may be an application object of a big data system including users, system application programs, and the like.

[0077] Step 102: When the operation access request is received, obtain the identity authentication information provided by the application side.

[0078] Step 103: According to the identity authentication information, perform an identity authentication test on the application party according to a preset identity authentication rule.

[0079] Step 104: When the application meets the identity authentication conditions, determine whether the operation access request is an authorized request with authority.

[0080] Step 105:...

no. 2 example

[0084] In order to make the technical solution of the present invention more perfect, this embodiment will describe a preferred embodiment of the implementation process of the method for accessing the big data system in the first embodiment on the basis of the first embodiment.

[0085] Here, when the application party does not meet the identity authentication conditions, or when the operation access request is an unauthorized request without permission, a reminder message can also be sent to the application party through the API.

[0086] Further, as figure 2 As shown, based on the first embodiment, before the operation access request is forwarded to the big data system in step 104, the method also includes judging the request content in the operation access request sent by the application side, and the specific steps include:

[0087] Step 201: Analyzing whether the request content in the operation access request contains sensitive data.

[0088] Specifically, the sensitiv...

no. 3 example

[0115] Specifically, in this embodiment, the specific composition and structure of the agent platform formed in the previous two embodiments will be described in detail.

[0116] Such as Figure 5 , Figure 6 , Figure 7 , Figure 8 As shown, the scheme has constructed a proxy layer based on the big data system as a whole. The application interface API of the proxy layer is called by the application side. After the API of the proxy layer receives the operation and access request from the application side, the proxy platform The functions include identity authentication, access control, data security protection, operation records, etc. for the application side; the authentication of the application side can be carried out through the authentication center, specifically based on the network authentication protocol Kerberos to realize the unified authentication of the application side's access to the big data platform ,sign in. Administrators, analysts, and maintainers of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for accessing a big data system, and relates to the field of big data security. The method comprises the following steps: detecting whether an operation access request specific to the big data system sent by an application party is received or not through an application programming interface (API); when the operation access request is received, acquiring identity authentication information provided by the application party; performing identity authentication detection on the application party according to the identity authentication information and a preset identity authentication rule; when the application party conforms to the identity authentication condition, judging whether the operation access request is an authorized request having permission or not; and when the operation access request is the authorized request having the permission, forwarding the operation access request to the big data system according to the operation access request. Through the scheme, the security of data stored in a big data platform can be enhanced greatly.

Description

technical field [0001] The invention relates to the field of big data security, in particular to a method and system for accessing a big data system. Background technique [0002] Big data and cloud computing have set off a research boom in the world. In the process of vigorously promoting big data and cloud computing, big data security has become the key to overcome. At present, the security protection for the big data system basically adopts the traditional method: the access to the big data system is carried out through the 4A bastion machine using SSH tools, and the data security depends on the access control of commands and vaults. However, there are multiple access paths to big data systems. For example: In addition to SSH, it can also be accessed through the API provided by the big data system. At this time, the traditional bastion machine method cannot protect the API from accessing data. It can be seen that there are technical loopholes in the existing technology...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/08H04L63/10
Inventor 王晓春
Owner 中国移动通信集团陕西有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products