Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mass graph data fine-grained access control method based on security tags

A security label and access control technology, applied in the field of massive data processing, can solve problems such as capacity and diversity characteristics aggravating security and privacy issues, and achieve the effects of easy access management, multi-level security, and simplified security design.

Active Publication Date: 2021-04-23
BEIJING SCISTOR TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, while graph data processing improves the analysis effect of massive relational data, the inherent speed, capacity and diversity of big data also exacerbate security and privacy issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass graph data fine-grained access control method based on security tags
  • Mass graph data fine-grained access control method based on security tags
  • Mass graph data fine-grained access control method based on security tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0025] The present invention proposes a fine-grained access control method for massive graph data based on security labels, which is a special design and access control optimization for graph data stored in key-value type. In key-value stored graph data, both nodes and edges are part of the graph data. When organizing graph data by points, such as figure 1 As shown, the point is used as the key KEY, the attribute of the point and the edge associated with the point are used as the value VALUE, and for the edge, the edge is used as the key, and the attribute of the edge is used as the value. The invention sets security labels on key-value pairs of points or edges for access control of points or edges, and sets security labe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mass graph data fine-grained access control method based on security tags, and belongs to the field of mass data processing. The method comprises the steps that a security label is added in a point / edge / attribute storage structure of graph data and user information and used for determining security requirements needed by access, the security label does not need to be defined in advance, and the security label is set after data generation or security design is completed; and when graph data query is carried out, the user security label is compared with the security label of the point / edge / attribute data to judge whether the user has permission to access the data or not. The security tag supports logic expression representation, and security access control of different granularities is realized by adopting a point, edge and attribute three-level granularity security tag; according to the invention, bit operation is adopted to accelerate security label logic calculation and filtering calculation of point / edge / attribute data. According to the method, the security of mass graph data access is greatly improved while the graph data access performance is not sacrificed.

Description

technical field [0001] The invention belongs to the technical field of mass data processing, and relates to a technical solution for performing fine-grained access control on mass key-value storage map data based on security labels. Background technique [0002] The development of information and communication technology has opened up the era of the Internet of Everything. With the help of graph data processing technology in big data, the potential value of a large amount of related data in social, e-commerce, transportation, finance, Internet of Things and other industries can be tapped. Compared with traditional relational data, graph data is especially suitable for large-scale relationship analysis. It has the following characteristics: First, graph data adopts entity relationship modeling that is closer to the real world, which is intuitive and easy to understand, while relational data is more complex and abstract. Second, graph data query uses a way that is more suitabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F16/583G06F16/538G06F16/51
Inventor 谢铭李晓军冯加军陈锡伟李晓静陈龙
Owner BEIJING SCISTOR TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products