CN102611699A - Method and system for access control in cloud operation system - Google Patents

Method and system for access control in cloud operation system Download PDF

Info

Publication number
CN102611699A
CN102611699A CN2012100429978A CN201210042997A CN102611699A CN 102611699 A CN102611699 A CN 102611699A CN 2012100429978 A CN2012100429978 A CN 2012100429978A CN 201210042997 A CN201210042997 A CN 201210042997A CN 102611699 A CN102611699 A CN 102611699A
Authority
CN
China
Prior art keywords
user
information
role
visit
operation set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012100429978A
Other languages
Chinese (zh)
Inventor
房体盈
朱波
朱锦雷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN2012100429978A priority Critical patent/CN102611699A/en
Publication of CN102611699A publication Critical patent/CN102611699A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a method and system for access control in a cloud operation system. The method comprises the steps of: respectively allocating role information corresponding to a user for each user accessing the cloud operation system; configuring an operation set corresponding to a role for each piece of role information, wherein the operation set records access permission information of the cloud operation system allowing the role to access a functional module; when receiving an access request of some user, obtaining the role information of the user; and according to the operation set corresponding to the role information of the user, controlling the access initiated by the user.

Description

The method and system of access control in a kind of cloud operating system
Technical field
The present invention relates to computer realm, relate in particular to the method and system of access control in a kind of cloud operating system.
Background technology
Current, by the industry approval, cloud operating system (cloud OS) realizes and is committed to practice gradually gradually in cloud computing.In cloud OS; Services such as calculating, storage, network, virtual resource are provided for the user; Because number of users will be very many, this just has higher requirement to the system safety aspect, and the work of system management is also said very heavy; How user's access rights being carried out safety, managed the permission modification that reaches in the face of complicated rationally, efficiently, is the important topic that cloud OS faces.
Summary of the invention
The present invention provides the method and system of access control in a kind of cloud operating system, the technical problem that solve be how to user's access rights carry out safety, rationally, management efficiently.
For solving the problems of the technologies described above, the invention provides following technical scheme:
The method of access control in a kind of cloud operating system, the functional module in the said cloud operating system is separate, and wherein said method comprises:
For each user who visits said cloud operating system distributes the corresponding Role Information of this user respectively;
Be the pairing operation set of each Role Information this role of configuration, wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
When receiving a certain user's access request, obtain said user's Role Information;
According to the pairing operation set of said user's Role Information, said Client-initiated visit is controlled.
Preferably, said method also has following characteristics: said each user for the said cloud operating system of visit distributes the corresponding Role Information of this user respectively, comprising:
Obtain user's identity identification information;
According to said identity identification information is that said user distributes corresponding Role Information.
Preferably, said method also has following characteristics: the pairing operation set of said Role Information according to said user, said Client-initiated visit is controlled, and comprising:
Obtain user's visit information, wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module;
Judge whether said visit information is recorded in the operation set;
If said visit information is recorded in the operation set, then allow said user to initiate visit; Otherwise, refuse said user and initiate visit.
Preferably, said method also has following characteristics: said method also comprises:
After the role who receives the user changes request, change request according to said role, to said user's Role Information.
The system of access control in a kind of cloud operating system, the functional module in the said cloud operating system is separate, and wherein said system comprises:
Distributor, each user who is used to the said cloud operating system of visit distributes the corresponding Role Information of this user respectively;
Inking device links to each other with said distributor, is used to the pairing operation set of each Role Information this role of configuration, and wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
Deriving means links to each other with said inking device, when receiving a certain user's access request, obtains said user's Role Information;
Control device links to each other with said deriving means, is used for according to the pairing operation set of said user's Role Information, and said Client-initiated visit is controlled.
Preferably, said system also has following characteristics: said distributor comprises:
First acquisition module is used to obtain user's identity identification information;
Distribution module, being used for according to said identity identification information is that said user distributes corresponding Role Information.
Preferably, said system also has following characteristics: control device comprises:
Second acquisition module is used to obtain user's visit information, and wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module;
Judge module links to each other with said second acquisition module, is used for judging whether said visit information is recorded in operation set;
Control module links to each other with said judge module, is recorded in operation set if be used for said visit information, then allows said user to initiate visit; Otherwise, refuse said user and initiate visit.
Preferably, said system also has following characteristics: said system also comprises:
Updating device links to each other with deriving means with said distributor, is used for after the role who receives the user changes request, changing request according to said role, to said user's Role Information.
Embodiment provided by the invention; Through distribute suitable role to the user, let user and access rights interrelate, thereby make when access control; Come effectively control user's visit by the pairing operation set of this role; Can reduce the complexity of empowerment management, reduce administration overhead, and the environment of a complicated safety policy of reasonable realization can also be provided for the keeper.
Description of drawings
Fig. 1 is the schematic flow sheet of the method embodiment of access control in the cloud operating system provided by the invention;
Fig. 2 is the structural representation of the system embodiment of access control in the cloud operating system provided by the invention;
Fig. 3 is the structural representation of distributor 201 in the system shown in Figure 2;
Fig. 4 is the structural representation of control device 204 in the system shown in Figure 2;
Fig. 5 is another structural representation of system shown in Figure 2.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, will combine accompanying drawing and specific embodiment that the present invention is made further detailed description below.Need to prove that under the situation of not conflicting, embodiment among the application and the characteristic among the embodiment be combination in any each other.
For solving cloud OS system access control problem, according to cloud OS characteristic, a kind of follow-on access control scheme based on the role has been proposed, different users is according to the role access different functional of taking on and visit different server groups.Specifically:
Cloud operating system provides the physical infrastructure service for the user: calculating, storage, network, virtual resource; In the face of various user; Guarantee the safety and efficiency of sea of clouds OS access control, will not have the disabled user of authority to keep outside of the door, a kind of rational access control mechanisms must be provided.Different access privilege is different, and access rights have determined whether a user or programmer have the right a certain specific resources is carried out certain operation, can solve this problem based on role's access control.
Need to prove that functional module is separate in the cloud operating system as referred to herein, does not promptly intercouple, be appreciated that the function that realizes for individual module need not to call the code information of other modules.
Fig. 1 is the schematic flow sheet of the method embodiment of access control in the cloud operating system provided by the invention.Among the method embodiment shown in Figure 1, the functional module in the said cloud operating system is separate, and wherein said method embodiment comprises:
Step 101, distribute the corresponding Role Information of this user respectively for each user of the said cloud operating system of visit;
Specifically, obtaining user's identity identification information, is that said user distributes corresponding Role Information according to said identity identification information; For example, can confirm this user task for accomplishing in enterprise according to identity identification information, perhaps, the powers and responsibilities in enterprise, thus for the user role is set according to above-mentioned information.
Certainly, same user can be a plurality of roles' member, and promptly same user can play the part of a plurality of roles; Equally, a role can have a plurality of user members
Further, the user can change in the role, and system can add, delete the role.Specifically, change request through the role who receives the user, and change request, upgrade said user's Role Information according to said role.
Step 102, be the pairing operation set of each Role Information this role of configuration, wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
Wherein, the role can regard the set of one group of operation as, and different roles has the different operation collection, and these operation sets can be distributed by the safety officer.
Wherein this cloud operating system of operation set record allows the mode of operation of this role to each functional module, can all can wait for not allowing visit, read-only, read-write.Certainly, also can further limit operating right to the subfunction in the individual module.
Step 103, when receiving a certain user's access request, obtain said user's Role Information;
Step 104, according to the pairing operation set of said user's Role Information, visit is controlled to said Client-initiated.
Specifically, obtain user's visit information, wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module; Judge whether said visit information is recorded in the operation set; If said visit information is recorded in the operation set, then allow said user to initiate visit; Otherwise, refuse said user and initiate visit.
When in the customer requirements access system during certain resource; The role that system obtains the user earlier and taken on; Whether the role who judges this user again has this system resource of authority visit, and then the functional module and the server group of control user capture, and will keep outside of the door less than the user who authorizes.
Method embodiment provided by the invention; Through distribute suitable role to the user, let user and access rights interrelate, thereby make when access control; Come effectively control user's visit by the pairing operation set of this role; Can reduce the complexity of empowerment management, reduce administration overhead, and the environment of a complicated safety policy of reasonable realization can also be provided for the keeper.
Need to prove that because tide sea of clouds OS number of users will be very many, the work of system management will be very heavy also.In order to alleviate the pressure of system management, just need the differentiated control of realization system, with the work dispersion of management system, according to such demand, tide sea of clouds OS has proposed the Managed Solution of user's classification, server grouping and partition functionality module.Wherein:
User's classification; All users of system are divided into two types: safety officer, common management person.The safety officer manages common management person only, can manage Any user and role, and user and role are authorized, and various constraintss are set.Common management person has the operating right of specific functional modules, concrete server group, and operating right is given through the role.
The server of server divides into groups; The function that provides according to server is different, server is divided into three groups: memory node group, network node group, computing node group.
The partition functionality module: based on the characteristics of role's access control, the functional module among the sea of clouds OS is that the role according to the user divides, and promptly each functional module has relatively independent function.The authorities that system is all are divided on the basis of each sub-function module, and each authority all is under the jurisdiction of some functional modules.
Fig. 2 is the structural representation of the system embodiment of access control in the cloud operating system provided by the invention.In conjunction with method embodiment shown in Figure 1, the functional module in the operating system of cloud described in the system shown in Figure 2 embodiment is separate, wherein:
Distributor 201, each user who is used to the said cloud operating system of visit distributes the corresponding Role Information of this user respectively;
Inking device 202 links to each other with said distributor 201, is used to the pairing operation set of each Role Information this role of configuration, and wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
Deriving means 203 links to each other with said inking device 202, when receiving a certain user's access request, obtains said user's Role Information;
Control device 204 links to each other with said deriving means 203, is used for according to the pairing operation set of said user's Role Information, and said Client-initiated visit is controlled.
Fig. 3 is the structural representation of distributor 201 in the system shown in Figure 2.Distributor 201 shown in Figure 3 comprises:
First acquisition module 301 is used to obtain user's identity identification information;
Distribution module 302, being used for according to said identity identification information is that said user distributes corresponding Role Information.
Fig. 4 is the structural representation of control device 204 in the system shown in Figure 2.Control device 204 shown in Figure 4 comprises:
Second acquisition module 401 is used to obtain user's visit information, and wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module;
Judge module 402 links to each other with said second acquisition module 401, is used for judging whether said visit information is recorded in operation set;
Control module 403 links to each other with said judge module 402, is recorded in operation set if be used for said visit information, then allows said user to initiate visit; Otherwise, refuse said user and initiate visit.
Fig. 5 is another structural representation of system shown in Figure 2.System shown in Figure 5 also comprises:
Receiving system 501 links to each other with said distributor 201, and the role who is used to receive the user changes request;
Updating device 502 links to each other with said deriving means 203 with said receiving system 501, is used for changing request according to said role, upgrades said user's Role Information.
System embodiment provided by the invention; Through distribute suitable role to the user, let user and access rights interrelate, thereby make when access control; Come effectively control user's visit by the pairing operation set of this role; Can reduce the complexity of empowerment management, reduce administration overhead, and the environment of a complicated safety policy of reasonable realization can also be provided for the keeper.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the described protection range of claim.

Claims (8)

1. the method for access control in the cloud operating system is characterized in that the functional module in the said cloud operating system is separate, and wherein said method comprises:
For each user who visits said cloud operating system distributes the corresponding Role Information of this user respectively;
Be the pairing operation set of each Role Information this role of configuration, wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
When receiving a certain user's access request, obtain said user's Role Information;
According to the pairing operation set of said user's Role Information, said Client-initiated visit is controlled.
2. method according to claim 1 is characterized in that, said each user for the said cloud operating system of visit distributes the corresponding Role Information of this user respectively, comprising:
Obtain user's identity identification information;
According to said identity identification information is that said user distributes corresponding Role Information.
3. method according to claim 1 is characterized in that, the pairing operation set of said Role Information according to said user is controlled said Client-initiated visit, comprising:
Obtain user's visit information, wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module;
Judge whether said visit information is recorded in the operation set;
If said visit information is recorded in the operation set, then allow said user to initiate visit; Otherwise, refuse said user and initiate visit.
4. method according to claim 1 is characterized in that, said method also comprises:
After the role who receives the user changes request, change request according to said role, to said user's Role Information.
5. the system of access control in the cloud operating system is characterized in that the functional module in the said cloud operating system is separate, and wherein said system comprises:
Distributor, each user who is used to the said cloud operating system of visit distributes the corresponding Role Information of this user respectively;
Inking device links to each other with said distributor, is used to the pairing operation set of each Role Information this role of configuration, and wherein said operation set records said cloud operating system and allows the access authority information of this role to functional module;
Deriving means links to each other with said inking device, when receiving a certain user's access request, obtains said user's Role Information;
Control device links to each other with said deriving means, is used for according to the pairing operation set of said user's Role Information, and said Client-initiated visit is controlled.
6. system according to claim 5 is characterized in that, said distributor comprises:
First acquisition module is used to obtain user's identity identification information;
Distribution module, being used for according to said identity identification information is that said user distributes corresponding Role Information.
7. system according to claim 5 is characterized in that control device comprises:
Second acquisition module is used to obtain user's visit information, and wherein said visit information comprises functional module that the user will visit and to the mode of operation of this functional module;
Judge module links to each other with said second acquisition module, is used for judging whether said visit information is recorded in operation set;
Control module links to each other with said judge module, is recorded in operation set if be used for said visit information, then allows said user to initiate visit; Otherwise, refuse said user and initiate visit.
8. system according to claim 5 is characterized in that, said system also comprises:
Updating device links to each other with deriving means with said distributor, is used for after the role who receives the user changes request, changing request according to said role, to said user's Role Information.
CN2012100429978A 2012-02-22 2012-02-22 Method and system for access control in cloud operation system Pending CN102611699A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012100429978A CN102611699A (en) 2012-02-22 2012-02-22 Method and system for access control in cloud operation system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012100429978A CN102611699A (en) 2012-02-22 2012-02-22 Method and system for access control in cloud operation system

Publications (1)

Publication Number Publication Date
CN102611699A true CN102611699A (en) 2012-07-25

Family

ID=46528853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012100429978A Pending CN102611699A (en) 2012-02-22 2012-02-22 Method and system for access control in cloud operation system

Country Status (1)

Country Link
CN (1) CN102611699A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904892A (en) * 2012-10-17 2013-01-30 浪潮(北京)电子信息产业有限公司 Security model and security strategy of cloud computing data center operating system
CN103067406A (en) * 2013-01-14 2013-04-24 暨南大学 Access control system and access control method between public cloud and private cloud
CN103716412A (en) * 2014-01-03 2014-04-09 汉柏科技有限公司 Cloud computing system and method and device for controlling user permission through quadratic mapping of cloud computing system
CN104199979A (en) * 2014-09-24 2014-12-10 国云科技股份有限公司 Modeled data source management system and method thereof
CN104994086A (en) * 2015-06-26 2015-10-21 北京京东尚科信息技术有限公司 Database cluster authority control method and device
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system
CN105721420A (en) * 2015-12-11 2016-06-29 中国地质调查局发展研究中心 Access authority control method and reverse agent server
CN105868649A (en) * 2016-03-29 2016-08-17 上海赞越软件服务中心 Synthetic operation mechanism based on role settings
CN106961441A (en) * 2017-04-06 2017-07-18 中国民航大学 A kind of user's dynamic accesses control method for Hadoop cloud platform
CN107104931A (en) * 2016-02-23 2017-08-29 中兴通讯股份有限公司 A kind of access control method and platform
CN109472159A (en) * 2018-11-15 2019-03-15 泰康保险集团股份有限公司 Access control method, device, medium and electronic equipment
CN109948360A (en) * 2019-02-26 2019-06-28 维正知识产权服务有限公司 A kind of more control domain security kernel construction methods and system for complex scene
CN113495921A (en) * 2020-04-02 2021-10-12 北京京东振世信息技术有限公司 Routing method and device of database cluster

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
CN101340444A (en) * 2008-08-26 2009-01-07 华为技术有限公司 Fireproof wall and server policy synchronization method, system and apparatus
CN101588242A (en) * 2008-05-19 2009-11-25 北京亿企通信息技术有限公司 Method and system for realizing authority management
CN101901465A (en) * 2009-05-26 2010-12-01 北京正辰科技发展有限责任公司 Operational safety based on comprehensive management platform system
CN102004868A (en) * 2009-09-01 2011-04-06 上海杉达学院 Role access control-based information system data storage layer and building method
CN102195956A (en) * 2010-03-19 2011-09-21 富士通株式会社 Cloud service system and user right management method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0697662A1 (en) * 1994-08-15 1996-02-21 International Business Machines Corporation Method and system for advanced role-based access control in distributed and centralized computer systems
CN101588242A (en) * 2008-05-19 2009-11-25 北京亿企通信息技术有限公司 Method and system for realizing authority management
CN101340444A (en) * 2008-08-26 2009-01-07 华为技术有限公司 Fireproof wall and server policy synchronization method, system and apparatus
CN101901465A (en) * 2009-05-26 2010-12-01 北京正辰科技发展有限责任公司 Operational safety based on comprehensive management platform system
CN102004868A (en) * 2009-09-01 2011-04-06 上海杉达学院 Role access control-based information system data storage layer and building method
CN102195956A (en) * 2010-03-19 2011-09-21 富士通株式会社 Cloud service system and user right management method thereof

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904892A (en) * 2012-10-17 2013-01-30 浪潮(北京)电子信息产业有限公司 Security model and security strategy of cloud computing data center operating system
CN103067406A (en) * 2013-01-14 2013-04-24 暨南大学 Access control system and access control method between public cloud and private cloud
CN103067406B (en) * 2013-01-14 2015-07-22 暨南大学 Access control system and access control method between public cloud and private cloud
CN103716412A (en) * 2014-01-03 2014-04-09 汉柏科技有限公司 Cloud computing system and method and device for controlling user permission through quadratic mapping of cloud computing system
CN104199979A (en) * 2014-09-24 2014-12-10 国云科技股份有限公司 Modeled data source management system and method thereof
CN104994086A (en) * 2015-06-26 2015-10-21 北京京东尚科信息技术有限公司 Database cluster authority control method and device
CN104994086B (en) * 2015-06-26 2018-09-04 北京京东尚科信息技术有限公司 A kind of control method and device of data-base cluster permission
CN105225072A (en) * 2015-11-05 2016-01-06 浪潮(北京)电子信息产业有限公司 A kind of access management method of multi-application system and system
CN105225072B (en) * 2015-11-05 2020-12-04 浪潮(北京)电子信息产业有限公司 Access management method and system for multiple application systems
CN105721420B (en) * 2015-12-11 2019-04-16 中国地质调查局发展研究中心 Access right control method and Reverse Proxy
CN105721420A (en) * 2015-12-11 2016-06-29 中国地质调查局发展研究中心 Access authority control method and reverse agent server
CN107104931A (en) * 2016-02-23 2017-08-29 中兴通讯股份有限公司 A kind of access control method and platform
CN105868649A (en) * 2016-03-29 2016-08-17 上海赞越软件服务中心 Synthetic operation mechanism based on role settings
CN106961441B (en) * 2017-04-06 2020-05-22 中国民航大学 User dynamic access control method for Hadoop cloud platform
CN106961441A (en) * 2017-04-06 2017-07-18 中国民航大学 A kind of user's dynamic accesses control method for Hadoop cloud platform
CN109472159A (en) * 2018-11-15 2019-03-15 泰康保险集团股份有限公司 Access control method, device, medium and electronic equipment
CN109948360A (en) * 2019-02-26 2019-06-28 维正知识产权服务有限公司 A kind of more control domain security kernel construction methods and system for complex scene
CN113495921A (en) * 2020-04-02 2021-10-12 北京京东振世信息技术有限公司 Routing method and device of database cluster
CN113495921B (en) * 2020-04-02 2023-09-26 北京京东振世信息技术有限公司 Routing method and device for database cluster

Similar Documents

Publication Publication Date Title
CN102611699A (en) Method and system for access control in cloud operation system
CN106506521B (en) Resource access control method and device
CN110990150A (en) Tenant management method and system of container cloud platform, electronic device and storage medium
CN103049482B (en) The implementation method that in a kind of distributed heterogeneous system, data fusion stores
CN108092945B (en) Method and device for determining access authority and terminal
CN109284839A (en) Mobile operation management platform safe operation and big data application system under cloud environment
CN105183820A (en) Multi-tenant supported large data platform and tenant access method
CN102917006B (en) A kind of unified control and management method and device realizing computational resource and object permission
CN102231693A (en) Method and apparatus for managing access authority
CN104363211A (en) Method and system for managing authority
CN102567675A (en) User authority management method and system in business system
CN105184144A (en) Multi-system privilege management method
CN102904892A (en) Security model and security strategy of cloud computing data center operating system
CN107659450A (en) Distribution method, distributor and the storage medium of big data cluster resource
CN102638566A (en) BLOG system running method based on cloud storage
CN105303119A (en) Multi-data center privilege management method and system
CN106789267B (en) Public cloud management system and management method
CN105046165A (en) Network project platform hierarchy right control method
WO2010028583A1 (en) Method and apparatus for managing the authority in workflow component based on authority component
CN112835977A (en) Database management method and system based on block chain
CN110765192A (en) GIS data management and processing method based on cloud platform
CN102904877A (en) Binary serialization role permission management method based on cloud storage
CN106533961A (en) Flow control method and device
CN114650170B (en) Cross-cluster resource management method, device, equipment and storage medium
CN107360103A (en) A kind of Operation & Maintenance System and resource regulating method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120725