A spark-oriented access control method and system

A technology of access control and access control strategy, which is applied in the directions of instruments, computing, and electrical digital data processing, etc., can solve problems such as unsupported data sources, long development cycle, uneven access control support, etc., and achieve good scalability Effect

Active Publication Date: 2021-12-10
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

First of all, various external data source systems have uneven support for access control
Secondly, although the middleware-style access control enhancement system can provide fine-grained access control, it cannot yet support all data sources
Due to the need to shield the differences of various heterogeneous data sources, the middleware system is highly complex and has a long development cycle, which requires continuous support for new data sources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A spark-oriented access control method and system
  • A spark-oriented access control method and system
  • A spark-oriented access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0040] In order to express the object, technical solution and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings in the implementation examples of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art by adopting the design structures and ideas of the present invention without making creative efforts belong to the scope of protection of the present invention.

[0041] The present invention provides a Spark-oriented access control method and system, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a Spark-oriented access control method, the steps of which include: identifying identity information of a user accessing the Spark system, finding all relevant access control rules from an access control strategy set, and converting the access control rules into security control rules; According to the safety control rules, the logical plan of the user is safely rewritten, and the logical plan is transformed into a safe logical plan that meets the access requirements; for the external data input into the Spark system, its identity and structural information are saved; Optimize the above security logic plan, generate runnable code according to the optimized security logic plan, select and control external data through identity identification and structural information, and realize access control of Spark data processing. The invention also provides a Spark-oriented access control system.

Description

technical field [0001] The present invention relates to the field of data security technology of Spark, a big data analysis tool, in particular to a Spark-oriented access control method and system, which limits the user's access authority to the data in the data set during the data analysis process, so that the user can only follow the access control method. It is required to access specific field components in data records, and finally realize fine-grained access control of data. Background technique [0002] Big data contains great value, and big data tools to mine these values ​​become the key to controlling big data. Spark (full name: Apache Spark) has become the most popular big data tool today and has received great attention from all walks of life. Although Spark technology has made great progress in terms of performance and versatility, it still faces many problems, among which data security is a major hidden danger that needs to be solved urgently. First, the enor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62
CPCG06F21/6218
Inventor 文雨宁方潇史岗孟丹
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products