CN106685994A - Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission - Google Patents
Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission Download PDFInfo
- Publication number
- CN106685994A CN106685994A CN201710096473.XA CN201710096473A CN106685994A CN 106685994 A CN106685994 A CN 106685994A CN 201710096473 A CN201710096473 A CN 201710096473A CN 106685994 A CN106685994 A CN 106685994A
- Authority
- CN
- China
- Prior art keywords
- gis
- cloud
- cloud gis
- resource
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Abstract
The invention relates to a cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission. The cloud GIS resource access control method has the characteristics that different GIS roles are constructed on the basis of attributes of different cloud GIS resource users, and then self-defined configurations are recorded for purchased services according to own organization structures and role system models, so that the requirements of lessees are met and the flexibility is higher; databases of the lessees are stored for the lessees with higher requirements for isolation by adopting an independent database mode, while a mode for sharing the databases and data architectures is adopted for common users, so that the advantages of the independent databases and shared databases and data architectures are combined and simultaneously the requirements of the users for different service qualities are also met; and hierarchical management is introduced into the traditional access control model based on geographic roles (GRBAC), so that role management is in order and the load for permission management is reduced.
Description
Technical field
The present invention relates to a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities, belong to the visit of cloud resource
Ask technical field.
Background technology
Traditional access control is typically the information resources that user stores correlation on believable server, and by server
Check whether the user of request is qualified and access the resource being stored thereon.But under cloud computing environment, this access control mould
Formula can fail, and be because asking the user for accessing and to be accessed for server general not in same inter-trust domain, and user with
The form of tenant conducts interviews to cloud platform, and server no longer has the role for being trusted completely.
According to the definition of cloud computing, the information resources that cloud platform protects its related using certain access control technology.
Wang Yuding etc. (2015) summarizes the access control technology of current cloud computing and is divided into three parts:Access control rule, access control
Model and encryption mechanism.Access control rule has the isolation of multi-tenant and realizes the access control of virtual machine by hypervisor
System;Access control model has task-based access control model, based on the cloud computing access control of attribute model, based on UCON
The cloud computing access control of model, the cloud computing access control based on BLP models.Confidentiality mechanism has based on ABE cipher mechanisms
Cloud computing access control.
ABE cipher mechanisms are cloud computing access control models.Its advantage is by the embedded AES of encryption rule, nothing
Decryption side need to be known, be suitable for distributed computing environment, have the disadvantage that efficiency and extensibility are relatively low, particularly be had in cloud platform
When substantial amounts of user and information resources, the administrative mechanism such as encryption, user's group and key has enhanced scalability.
The content of the invention
The technical problem to be solved is to provide a kind of cloud GIS resources based on GIS role hierarchy authorities and accesses
Control method, can effectively strengthen the safety of private clound GIS platform, improve the control of authority efficiency of management.
The present invention is employed the following technical solutions to solve above-mentioned technical problem:The present invention devises a kind of based on GIS angles
The cloud GIS resource access control methods of colour gradation authority, are realized by cloud GIS resouce controllers for cloud GIS resources user
Cloud GIS resources accessing controls, wherein, each cloud GIS Resource Servers possess respectively corresponding access privilege control set of strategies,
Characterized in that, cloud GIS resouce controllers every predetermined period be respectively each cloud GIS Resource Servers generate and as or
It is updated to each cloud GIS Resource Servers system public key corresponding respectively;The control method comprises the steps:
Step A. cloud GIS resouce controllers control correspondence according to the cloud GIS resource access requests of cloud GIS resource user
Cloud GIS Resource Servers are encrypted using its corresponding system public key for related cloud GIS resources, obtain target ciphertext,
And the access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers;
Step B. cloud GIS resouce controllers are according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers
System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted, structure using default first algorithm
Into cloud GIS resource user private keys;
Step C. cloud GIS resouce controllers deposit access privilege control set of strategies and cloud GIS resources user institute according to it
Corresponding relation between correspondence GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS are provided
Source user private key is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, it is private for cloud GIS resources user
Key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud
GIS resources are in plain text.
As a preferred technical solution of the present invention:The cloud GIS resouce controllers are respectively each every predetermined period
Individual cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key it is same
When, remove the target ciphertext stored in cloud GIS resouce controllers, and corresponding access privilege control set of strategies.
As a preferred technical solution of the present invention:The cloud GIS resouce controllers include cloud platform configuration manager,
Trusted authorization controller and cloud GIS resource access controllers, wherein, cloud platform configuration manager is used for registration storage cloud GIS moneys
Source user attributes information, builds each cloud GIS Resource Servers access privilege control set of strategies corresponding respectively;It is credible to award
Power controller is used for according to cloud GIS resource user attributes information, is the corresponding GIS role of cloud GIS resources user distribution
Level privileges, and trusted authorization controller every predetermined period be respectively each cloud GIS Resource Servers generate and as or
It is updated to each cloud GIS Resource Servers system public key corresponding respectively;The control method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud according to the cloud GIS resource access requests of cloud GIS resource user
GIS Resource Servers are encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtain target ciphertext, and
Access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers;
Step B. trusted authorization controller is according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers
System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm,
Cloud GIS resource user private keys are constituted, then, cloud GIS resource user private keys are sent respectively to cloud by trusted authorization controller
GIS resource access controllers and cloud GIS resource user;
Step C. cloud GIS resource access controllers enter according to default first algorithm for cloud GIS resource user private keys
Row decryption, obtains GIS role hierarchy authorities corresponding to cloud GIS resource user, and then cloud GIS resource access controllers are according to it
Deposited access privilege control set of strategies and the corresponding relation corresponding to cloud GIS resource user between GIS role hierarchy authorities, will
The corresponding target ciphertext of access privilege control set of strategies is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, it is private for cloud GIS resources user
Key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud
GIS resources are in plain text.
As a preferred technical solution of the present invention:The trusted authorization controller is respectively each every predetermined period
Cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key it is same
When, remove the target ciphertext stored in cloud GIS resource access controllers, and corresponding access privilege control set of strategies.
As a preferred technical solution of the present invention:First algorithm is random enciphering and deciphering algorithm.
A kind of cloud GIS resource access control methods based on GIS role hierarchy authorities of the present invention, using above technology
Scheme compared with prior art, with following technique effect:The cloud GIS based on GIS role hierarchy authorities of present invention design is provided
Source access control method, builds different GIS roles, then the group according to its own based on different cloud GIS resources user attributes
Structure and role system model are knitted, for the self-defining configuration of service log bought, meets the requirement of tenant, motility is more
It is high;Higher tenant stores tenant database by the way of self contained data base to be required to isolation, and for domestic consumer
Then adopt shared data bank, the mode of shared data framework, with reference to self contained data base and shared data bank, shared data framework
While advantage, the requirement of the different service quality of user is also met;In traditional access based on geographical role (GRBAC)
Hierarchy management is introduced in Controlling model so that Role Management is in good order, mitigate the burden of rights management.
Description of the drawings
Fig. 1 is that the framework of the designed cloud GIS resource access control methods based on GIS role hierarchy authorities of the present invention is illustrated
Figure.
Specific embodiment
The specific embodiment of the present invention is described in further detail with reference to Figure of description.
As shown in figure 1, the present invention devises a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities,
Cloud GIS resources accessing controls are realized for cloud GIS resource user by cloud GIS resouce controllers, in the middle of actual application,
Each cloud GIS Resource Servers possess respectively corresponding access privilege control set of strategies, and cloud GIS resouce controllers are every default
Cycle be respectively each cloud GIS Resource Servers generate and as or to be updated to each cloud GIS Resource Servers respectively corresponding
System public key, at the same time, cloud GIS resouce controllers remove the target ciphertext that stored in cloud GIS resouce controllers, and
Corresponding access privilege control set of strategies;In the control method concrete application, comprise the steps:
Step A. cloud GIS resouce controllers control correspondence according to the cloud GIS resource access requests of cloud GIS resource user
Cloud GIS Resource Servers are encrypted using its corresponding system public key for related cloud GIS resources, obtain target ciphertext,
And the access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers.
Step B. cloud GIS resouce controllers are according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers
System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are carried out using default random enciphering and deciphering algorithm
Encryption, constitutes cloud GIS resource user private keys.
Step C. cloud GIS resouce controllers deposit access privilege control set of strategies and cloud GIS resources user institute according to it
Corresponding relation between correspondence GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS are provided
Source user private key is sent to cloud GIS resource user.
Default random enciphering and deciphering algorithm when step D. cloud GIS resources user is registered using it, makes for cloud GIS resources
User's private key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains
Obtain cloud GIS resources in plain text.
As shown in figure 1, based on the above-mentioned designed cloud GIS resource access control methods based on GIS role hierarchy authorities, this
In the middle of actual application, for the cloud GIS resouce controllers, further design includes cloud platform configuration management for invention
Device, trusted authorization controller and cloud GIS resource access controllers, wherein, cloud platform configuration manager is used for registration storage cloud GIS
Resource user attributes information, builds each cloud GIS Resource Servers access privilege control set of strategies corresponding respectively;It is credible
Authorization controller is used for according to cloud GIS resource user attributes information, is the corresponding GIS angles of cloud GIS resources user distribution
Colour gradation authority, and trusted authorization controller every predetermined period be respectively each cloud GIS Resource Servers generate and conduct
Or the system public key being updated to corresponding to each cloud GIS Resource Servers difference;At the same time, trusted authorization controller removes cloud
The target ciphertext stored in GIS resource access controllers, and corresponding access privilege control set of strategies, the controlling party
Method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud according to the cloud GIS resource access requests of cloud GIS resource user
GIS Resource Servers are encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtain target ciphertext, and
Access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers.
Step B. trusted authorization controller is according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers
System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are entered using default random enciphering and deciphering algorithm
Row encryption, constitutes cloud GIS resource user private keys, and then, trusted authorization controller respectively sends out cloud GIS resource user private keys
Give cloud GIS resource access controllers and cloud GIS resource user.
Step C. cloud GIS resource access controllers are directed to cloud GIS resource user according to default random enciphering and deciphering algorithm
Private key is decrypted, and obtains GIS role hierarchy authorities corresponding to cloud GIS resource user, then cloud GIS resource access controllers
According to its deposit access privilege control set of strategies with cloud GIS resource user corresponding to it is corresponding between GIS role hierarchy authorities
Relation, by the corresponding target ciphertext of access privilege control set of strategies cloud GIS resource user is sent to.
Default random enciphering and deciphering algorithm when step D. cloud GIS resources user is registered using it, makes for cloud GIS resources
User's private key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains
Obtain cloud GIS resources in plain text.
In practical application, for accidental enciphering algorithm, it is designed specifically to accidental enciphering algorithm and generates four groups of parameters s_arg0,
S_arg1, t_arg and v_arg, they belong to SA-attributes collection.Wherein, s_arg0 and s_arg1 are no less than 16 English alphabets
Two random strings constituted with numeral, t_arg is that the present invention applies the current time millisecond value of cloud GIS platform, v_arg
It is the identification code of cloud GIS Resource Servers, the identification code of each cloud GIS Resource Servers is different, SA described in these parameters
Property set is stored in cloud platform configuration manager, then after being read by trusted authorization controller, is generated by accidental enciphering algorithm
System public key.And designed cloud generalized information system is directed to GIS role hierarchy authorities, can be according to user GIS professional standards and cloud
The desirability of GIS resources, such as creates following three kinds geographical roles:
Towards 0 grade of the GIS (GeoLevel0) of domestic consumer:There are no the personnel of GIS Professional knowledges;
Towards 1 grade of the GIS (GeoLevel1) of GIS professionals:Possess the analysis personnel of certain GIS Professional knowledges;
Towards 2 grades of the GIS (GeoLevel2) of GIS developer:Possess GIS Professional knowledges, and GIS exploitations can be engaged in
Personnel.
As shown in figure 1, for each cloud GIS Resource Servers, can be configured according to GIS resource types, such as set
Put GIS Resource Servers, geographical data bank server, original data server, virtual machine server, GIS server in station,
GIS APP servers and cloud storage service device;Wherein, each GIS server is as follows:
The GIS Resource Servers, for providing geographical process service, Map Services, image service, geographic element clothes
Business, geocoding service, geographical geometry service, the issue of geographical network service, management and application service, its access control policy
Collection is the GIS resource services application permission to be provided to the 0 grade of role of GIS towards domestic consumer, to towards professional's
1 grade of role of GIS provides the GIS resource services and issues authority, and to the 2 grades of roles of GIS towards developer the GIS is provided
The Service Management authority of resource.
The GIS server in station, for providing the customization service of GIS websites, it is allowed to the GIS resources of cloud resource user
The GIS websites are published to as service, its access control policy collection is that the 0 grade of role of GIS towards domestic consumer is provided
The access rights of public GIS websites, provide the 1 grade of role of GIS towards professional the GIS site access authorities of customization, right
2 grades of roles of GIS towards developer provide the scalable GIS site access authority of customization.
The geographical data bank server, for providing the application service of enterprise-level geographical data bank, its access control plan
Slightly collection is to provide the read-only access authority of enterprise-level geographical data bank to the 0 grade of role of GIS towards domestic consumer, to towards special
1 grade of role of GIS of industry personnel provides enterprise-level geographical data bank access limit, and the 2 grades of roles of GIS towards developer are carried
For the full control authority of enterprise-level geographical data bank.
The virtual machine server, for providing the virtualization of the hardware infrastructure computing resource of private clound GIS platform
Service, its access control policy collection is not provide the 0 grade of role of GIS towards domestic consumer the virtual machine service of customization, right
1 grade of role of GIS towards professional provides the virtual machine service of customization, and the 2 grades of roles of GIS towards developer are provided
The scalable virtual machine service of customization.
The cloud storage service device, for providing the virtualization of the hardware infrastructure storage resource of private clound GIS platform
Service, its access control policy collection is, to the 0 grade of role of GIS towards domestic consumer 20GB cloud storage services are provided, to towards
1 grade of role of GIS of professional provides 50GB cloud storage services, and to the 2 grades of roles of GIS towards developer Shen on demand is provided
Please cloud storage service.
GIS APP servers, for providing the use and second development interface service of GIS APP, its access control policy
Collection is provided GIS APP to the 0 grade of role of GIS towards domestic consumer and browses service, to towards 1 grade of angle of GIS of professional
Color provides GIS APP using service, provides GIS APP to the 2 grades of roles of GIS towards professional and uses and secondary development clothes
Business.
Original data server, for providing the browsing, upload of initial data, download service, its access control policy collection
It is the browse right of initial data to be provided to the 0 grade of role of GIS towards domestic consumer, to 1 grade of the GIS towards professional
Role provides initial data and browses and upload permissions, 2 grades of roles of GIS of developer are provided the browsing of initial datas, on
Pass and download permission.
Based on the cloud GIS resource access control methods designed by the invention described above based on GIS role hierarchy authorities, based on not
Different GIS roles are built with cloud GIS resources user attributes, then the organizational structure and role system model according to its own,
For the self-defining configuration of service log bought, meet the requirement of tenant, motility is higher;Isolation is required higher
Tenant stores tenant database by the way of self contained data base, and for domestic consumer then adopts shared data bank, shares number
According to the mode of framework, while with reference to self contained data base and shared data bank, shared data framework advantage, user is also met
Different service quality requirement;Hierarchy management is introduced in traditional access control model based on geographical role (GRBAC),
So that Role Management is in good order, mitigate the burden of rights management.
Embodiments of the present invention are explained in detail above in conjunction with accompanying drawing, but the present invention is not limited to above-mentioned enforcement
Mode, in the ken that those of ordinary skill in the art possess, can be with the premise of without departing from present inventive concept
Make a variety of changes.
Claims (5)
1. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities, are directed to by cloud GIS resouce controllers
Cloud GIS resource user realizes cloud GIS resources accessing controls, wherein, each cloud GIS Resource Servers possess respectively corresponding
Access privilege control set of strategies, it is characterised in that cloud GIS resouce controllers are respectively each cloud GIS resources every predetermined period
Server generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key;The control method
Comprise the steps:
Step A. cloud GIS resouce controllers control correspondence cloud GIS according to the cloud GIS resource access requests of cloud GIS resource user
Resource Server is encrypted using its corresponding system public key for related cloud GIS resources, obtains target ciphertext, and is combined
Access privilege control set of strategies corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers;
System of the step B. cloud GIS resouce controllers according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers is public
Key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm, constitute cloud
GIS resource user private keys;
Step C. cloud GIS resouce controllers are according to corresponding to it deposits access privilege control set of strategies and cloud GIS resource user
Corresponding relation between GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS resources are made
User's private key is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, enters for cloud GIS resource user private keys
Row decryption, obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS moneys
Source is in plain text.
2. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 1, its feature
It is:The cloud GIS resouce controllers every predetermined period be respectively each cloud GIS Resource Servers generate and as or more
Newly while system public key corresponding for each cloud GIS Resource Servers difference, remove what is stored in cloud GIS resouce controllers
Target ciphertext, and corresponding access privilege control set of strategies.
3. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 1, its feature
It is:The cloud GIS resouce controllers include that cloud platform configuration manager, trusted authorization controller and cloud GIS resources access control
Device processed, wherein, cloud platform configuration manager is used for registration storage cloud GIS resource user attributes information, builds each cloud GIS moneys
Source server access privilege control set of strategies corresponding respectively;Trusted authorization controller is used for according to cloud GIS resource user
Attribute information, is the corresponding GIS role hierarchy authorities of cloud GIS resources user distribution, and trusted authorization controller every
Predetermined period be respectively each cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers difference institute
Corresponding system public key;The control method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud GIS according to the cloud GIS resource access requests of cloud GIS resource user
Resource Server is encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtains target ciphertext, and is combined
Access privilege control set of strategies corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers;
System of the step B. trusted authorization controller according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers is public
Key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm, are constituted
Cloud GIS resource user private keys, then, cloud GIS resource user private keys are sent respectively to cloud GIS moneys by trusted authorization controller
Source access controller and cloud GIS resource user;
Step C. cloud GIS resource access controllers are solved according to default first algorithm for cloud GIS resource user private keys
It is close, GIS role hierarchy authorities corresponding to cloud GIS resource user are obtained, then cloud GIS resource access controllers are deposited according to it
Access privilege control set of strategies and the corresponding relation corresponding to cloud GIS resource user between GIS role hierarchy authorities, will access
The corresponding target ciphertext of control of authority set of strategies is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, enters for cloud GIS resource user private keys
Row decryption, obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS moneys
Source is in plain text.
4. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 3, its feature
It is:The trusted authorization controller is respectively each cloud GIS Resource Servers and generates and conduct or renewal every predetermined period
While system public key corresponding for each cloud GIS Resource Servers difference, remove and stored in cloud GIS resource access controllers
Target ciphertext, and corresponding access privilege control set of strategies.
5. a kind of cloud GIS resources based on GIS role hierarchy authorities access control according to any one in Claims 1-4
Method processed, it is characterised in that:First algorithm is random enciphering and deciphering algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710096473.XA CN106685994A (en) | 2017-02-22 | 2017-02-22 | Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710096473.XA CN106685994A (en) | 2017-02-22 | 2017-02-22 | Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106685994A true CN106685994A (en) | 2017-05-17 |
Family
ID=58861743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710096473.XA Pending CN106685994A (en) | 2017-02-22 | 2017-02-22 | Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106685994A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924115A (en) * | 2018-06-25 | 2018-11-30 | 武汉众智鸿图科技有限公司 | A kind of Simulation spatial service authority control method and system |
CN109583170A (en) * | 2018-11-30 | 2019-04-05 | 苏州东巍网络科技有限公司 | A kind of the weight reducing cloud data encryption storage system and method for intelligent terminal |
CN110765192A (en) * | 2019-10-18 | 2020-02-07 | 广东省城乡规划设计研究院 | GIS data management and processing method based on cloud platform |
CN113132488A (en) * | 2021-04-22 | 2021-07-16 | 云上青海大数据产业有限公司 | Method for managing resources of cloud computing system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103534976A (en) * | 2013-06-05 | 2014-01-22 | 华为技术有限公司 | Data security protection method, server, host, and system |
CN105337965A (en) * | 2015-10-10 | 2016-02-17 | 浪潮(北京)电子信息产业有限公司 | Data acquisition method and device |
CN105656864A (en) * | 2014-11-27 | 2016-06-08 | 航天恒星科技有限公司 | TCM-based key management system and management method |
CN106411857A (en) * | 2016-09-07 | 2017-02-15 | 河海大学 | Private cloud GIS service access control method based on virtual isolation mechanism |
-
2017
- 2017-02-22 CN CN201710096473.XA patent/CN106685994A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103534976A (en) * | 2013-06-05 | 2014-01-22 | 华为技术有限公司 | Data security protection method, server, host, and system |
CN105656864A (en) * | 2014-11-27 | 2016-06-08 | 航天恒星科技有限公司 | TCM-based key management system and management method |
CN105337965A (en) * | 2015-10-10 | 2016-02-17 | 浪潮(北京)电子信息产业有限公司 | Data acquisition method and device |
CN106411857A (en) * | 2016-09-07 | 2017-02-15 | 河海大学 | Private cloud GIS service access control method based on virtual isolation mechanism |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108924115A (en) * | 2018-06-25 | 2018-11-30 | 武汉众智鸿图科技有限公司 | A kind of Simulation spatial service authority control method and system |
CN108924115B (en) * | 2018-06-25 | 2020-12-01 | 武汉众智鸿图科技有限公司 | Space service authority control method and system |
CN109583170A (en) * | 2018-11-30 | 2019-04-05 | 苏州东巍网络科技有限公司 | A kind of the weight reducing cloud data encryption storage system and method for intelligent terminal |
CN109583170B (en) * | 2018-11-30 | 2020-11-13 | 苏州东巍网络科技有限公司 | Slimming cloud data encryption storage system and method for intelligent terminal |
CN110765192A (en) * | 2019-10-18 | 2020-02-07 | 广东省城乡规划设计研究院 | GIS data management and processing method based on cloud platform |
CN113132488A (en) * | 2021-04-22 | 2021-07-16 | 云上青海大数据产业有限公司 | Method for managing resources of cloud computing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109559124B (en) | Cloud data security sharing method based on block chain | |
US8850593B2 (en) | Data management using a virtual machine-data image | |
CN105103488B (en) | By the policy Enforcement of associated data | |
Seiger et al. | SecCSIE: a secure cloud storage integrator for enterprises | |
CN108418784A (en) | A kind of distributed cross-domain authorization and access control method based on properties secret | |
CN103327084B (en) | The cloud storage system of a kind of public and private mixed distribution formula and cloud storage method | |
CN108259422B (en) | Multi-tenant access control method and device | |
CN110222518B (en) | Trusted authority access control method based on block chain | |
CN108667605B (en) | Data encryption and decryption method and device | |
CN104935590A (en) | HDFS access control method based on role and user trust value | |
CN104378386A (en) | Method for cloud data confidentiality protection and access control | |
CN106685994A (en) | Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission | |
CN104718526A (en) | Secure mobile framework | |
CN103220141B (en) | A kind of protecting sensitive data method and system based on group key strategy | |
CN106992988A (en) | A kind of cross-domain anonymous resource sharing platform and its implementation | |
CN107302524A (en) | A kind of ciphertext data-sharing systems under cloud computing environment | |
CN103535007A (en) | Managed authentication on a distributed network | |
WO2018116230A1 (en) | Hybrid blockchain based record management system | |
Chai et al. | BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things | |
Zhou et al. | Research on multi-authority CP-ABE access control model in multicloud | |
CN105790929A (en) | High-efficient access control method based on rule redundancy elimination in encryption environment | |
WO2017165948A1 (en) | Data storage and access platform with jurisdictional control | |
Sanghi et al. | Enhance the data security in cloud computing by text steganography | |
Wang et al. | Blockchain for Public Safety: A Survey of Techniques and Applications | |
Wu et al. | Research on access control of smart home in NDN (short paper) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170517 |
|
RJ01 | Rejection of invention patent application after publication |