CN106685994A - Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission - Google Patents

Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission Download PDF

Info

Publication number
CN106685994A
CN106685994A CN201710096473.XA CN201710096473A CN106685994A CN 106685994 A CN106685994 A CN 106685994A CN 201710096473 A CN201710096473 A CN 201710096473A CN 106685994 A CN106685994 A CN 106685994A
Authority
CN
China
Prior art keywords
gis
cloud
cloud gis
resource
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710096473.XA
Other languages
Chinese (zh)
Inventor
葛莹
艾斯卡尔·阿布力米提
陈刚锐
鲍倩
刘磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHU filed Critical Hohai University HHU
Priority to CN201710096473.XA priority Critical patent/CN106685994A/en
Publication of CN106685994A publication Critical patent/CN106685994A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The invention relates to a cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission. The cloud GIS resource access control method has the characteristics that different GIS roles are constructed on the basis of attributes of different cloud GIS resource users, and then self-defined configurations are recorded for purchased services according to own organization structures and role system models, so that the requirements of lessees are met and the flexibility is higher; databases of the lessees are stored for the lessees with higher requirements for isolation by adopting an independent database mode, while a mode for sharing the databases and data architectures is adopted for common users, so that the advantages of the independent databases and shared databases and data architectures are combined and simultaneously the requirements of the users for different service qualities are also met; and hierarchical management is introduced into the traditional access control model based on geographic roles (GRBAC), so that role management is in order and the load for permission management is reduced.

Description

A kind of cloud GIS resource access control methods based on GIS role hierarchy authorities
Technical field
The present invention relates to a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities, belong to the visit of cloud resource Ask technical field.
Background technology
Traditional access control is typically the information resources that user stores correlation on believable server, and by server Check whether the user of request is qualified and access the resource being stored thereon.But under cloud computing environment, this access control mould Formula can fail, and be because asking the user for accessing and to be accessed for server general not in same inter-trust domain, and user with The form of tenant conducts interviews to cloud platform, and server no longer has the role for being trusted completely.
According to the definition of cloud computing, the information resources that cloud platform protects its related using certain access control technology. Wang Yuding etc. (2015) summarizes the access control technology of current cloud computing and is divided into three parts:Access control rule, access control Model and encryption mechanism.Access control rule has the isolation of multi-tenant and realizes the access control of virtual machine by hypervisor System;Access control model has task-based access control model, based on the cloud computing access control of attribute model, based on UCON The cloud computing access control of model, the cloud computing access control based on BLP models.Confidentiality mechanism has based on ABE cipher mechanisms Cloud computing access control.
ABE cipher mechanisms are cloud computing access control models.Its advantage is by the embedded AES of encryption rule, nothing Decryption side need to be known, be suitable for distributed computing environment, have the disadvantage that efficiency and extensibility are relatively low, particularly be had in cloud platform When substantial amounts of user and information resources, the administrative mechanism such as encryption, user's group and key has enhanced scalability.
The content of the invention
The technical problem to be solved is to provide a kind of cloud GIS resources based on GIS role hierarchy authorities and accesses Control method, can effectively strengthen the safety of private clound GIS platform, improve the control of authority efficiency of management.
The present invention is employed the following technical solutions to solve above-mentioned technical problem:The present invention devises a kind of based on GIS angles The cloud GIS resource access control methods of colour gradation authority, are realized by cloud GIS resouce controllers for cloud GIS resources user Cloud GIS resources accessing controls, wherein, each cloud GIS Resource Servers possess respectively corresponding access privilege control set of strategies, Characterized in that, cloud GIS resouce controllers every predetermined period be respectively each cloud GIS Resource Servers generate and as or It is updated to each cloud GIS Resource Servers system public key corresponding respectively;The control method comprises the steps:
Step A. cloud GIS resouce controllers control correspondence according to the cloud GIS resource access requests of cloud GIS resource user Cloud GIS Resource Servers are encrypted using its corresponding system public key for related cloud GIS resources, obtain target ciphertext, And the access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers;
Step B. cloud GIS resouce controllers are according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted, structure using default first algorithm Into cloud GIS resource user private keys;
Step C. cloud GIS resouce controllers deposit access privilege control set of strategies and cloud GIS resources user institute according to it Corresponding relation between correspondence GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS are provided Source user private key is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, it is private for cloud GIS resources user Key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS resources are in plain text.
As a preferred technical solution of the present invention:The cloud GIS resouce controllers are respectively each every predetermined period Individual cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key it is same When, remove the target ciphertext stored in cloud GIS resouce controllers, and corresponding access privilege control set of strategies.
As a preferred technical solution of the present invention:The cloud GIS resouce controllers include cloud platform configuration manager, Trusted authorization controller and cloud GIS resource access controllers, wherein, cloud platform configuration manager is used for registration storage cloud GIS moneys Source user attributes information, builds each cloud GIS Resource Servers access privilege control set of strategies corresponding respectively;It is credible to award Power controller is used for according to cloud GIS resource user attributes information, is the corresponding GIS role of cloud GIS resources user distribution Level privileges, and trusted authorization controller every predetermined period be respectively each cloud GIS Resource Servers generate and as or It is updated to each cloud GIS Resource Servers system public key corresponding respectively;The control method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud according to the cloud GIS resource access requests of cloud GIS resource user GIS Resource Servers are encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtain target ciphertext, and Access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers;
Step B. trusted authorization controller is according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm, Cloud GIS resource user private keys are constituted, then, cloud GIS resource user private keys are sent respectively to cloud by trusted authorization controller GIS resource access controllers and cloud GIS resource user;
Step C. cloud GIS resource access controllers enter according to default first algorithm for cloud GIS resource user private keys Row decryption, obtains GIS role hierarchy authorities corresponding to cloud GIS resource user, and then cloud GIS resource access controllers are according to it Deposited access privilege control set of strategies and the corresponding relation corresponding to cloud GIS resource user between GIS role hierarchy authorities, will The corresponding target ciphertext of access privilege control set of strategies is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, it is private for cloud GIS resources user Key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS resources are in plain text.
As a preferred technical solution of the present invention:The trusted authorization controller is respectively each every predetermined period Cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key it is same When, remove the target ciphertext stored in cloud GIS resource access controllers, and corresponding access privilege control set of strategies.
As a preferred technical solution of the present invention:First algorithm is random enciphering and deciphering algorithm.
A kind of cloud GIS resource access control methods based on GIS role hierarchy authorities of the present invention, using above technology Scheme compared with prior art, with following technique effect:The cloud GIS based on GIS role hierarchy authorities of present invention design is provided Source access control method, builds different GIS roles, then the group according to its own based on different cloud GIS resources user attributes Structure and role system model are knitted, for the self-defining configuration of service log bought, meets the requirement of tenant, motility is more It is high;Higher tenant stores tenant database by the way of self contained data base to be required to isolation, and for domestic consumer Then adopt shared data bank, the mode of shared data framework, with reference to self contained data base and shared data bank, shared data framework While advantage, the requirement of the different service quality of user is also met;In traditional access based on geographical role (GRBAC) Hierarchy management is introduced in Controlling model so that Role Management is in good order, mitigate the burden of rights management.
Description of the drawings
Fig. 1 is that the framework of the designed cloud GIS resource access control methods based on GIS role hierarchy authorities of the present invention is illustrated Figure.
Specific embodiment
The specific embodiment of the present invention is described in further detail with reference to Figure of description.
As shown in figure 1, the present invention devises a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities, Cloud GIS resources accessing controls are realized for cloud GIS resource user by cloud GIS resouce controllers, in the middle of actual application, Each cloud GIS Resource Servers possess respectively corresponding access privilege control set of strategies, and cloud GIS resouce controllers are every default Cycle be respectively each cloud GIS Resource Servers generate and as or to be updated to each cloud GIS Resource Servers respectively corresponding System public key, at the same time, cloud GIS resouce controllers remove the target ciphertext that stored in cloud GIS resouce controllers, and Corresponding access privilege control set of strategies;In the control method concrete application, comprise the steps:
Step A. cloud GIS resouce controllers control correspondence according to the cloud GIS resource access requests of cloud GIS resource user Cloud GIS Resource Servers are encrypted using its corresponding system public key for related cloud GIS resources, obtain target ciphertext, And the access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers.
Step B. cloud GIS resouce controllers are according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are carried out using default random enciphering and deciphering algorithm Encryption, constitutes cloud GIS resource user private keys.
Step C. cloud GIS resouce controllers deposit access privilege control set of strategies and cloud GIS resources user institute according to it Corresponding relation between correspondence GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS are provided Source user private key is sent to cloud GIS resource user.
Default random enciphering and deciphering algorithm when step D. cloud GIS resources user is registered using it, makes for cloud GIS resources User's private key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains Obtain cloud GIS resources in plain text.
As shown in figure 1, based on the above-mentioned designed cloud GIS resource access control methods based on GIS role hierarchy authorities, this In the middle of actual application, for the cloud GIS resouce controllers, further design includes cloud platform configuration management for invention Device, trusted authorization controller and cloud GIS resource access controllers, wherein, cloud platform configuration manager is used for registration storage cloud GIS Resource user attributes information, builds each cloud GIS Resource Servers access privilege control set of strategies corresponding respectively;It is credible Authorization controller is used for according to cloud GIS resource user attributes information, is the corresponding GIS angles of cloud GIS resources user distribution Colour gradation authority, and trusted authorization controller every predetermined period be respectively each cloud GIS Resource Servers generate and conduct Or the system public key being updated to corresponding to each cloud GIS Resource Servers difference;At the same time, trusted authorization controller removes cloud The target ciphertext stored in GIS resource access controllers, and corresponding access privilege control set of strategies, the controlling party Method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud according to the cloud GIS resource access requests of cloud GIS resource user GIS Resource Servers are encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtain target ciphertext, and Access privilege control set of strategies with reference to corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers.
Step B. trusted authorization controller is according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers System public key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are entered using default random enciphering and deciphering algorithm Row encryption, constitutes cloud GIS resource user private keys, and then, trusted authorization controller respectively sends out cloud GIS resource user private keys Give cloud GIS resource access controllers and cloud GIS resource user.
Step C. cloud GIS resource access controllers are directed to cloud GIS resource user according to default random enciphering and deciphering algorithm Private key is decrypted, and obtains GIS role hierarchy authorities corresponding to cloud GIS resource user, then cloud GIS resource access controllers According to its deposit access privilege control set of strategies with cloud GIS resource user corresponding to it is corresponding between GIS role hierarchy authorities Relation, by the corresponding target ciphertext of access privilege control set of strategies cloud GIS resource user is sent to.
Default random enciphering and deciphering algorithm when step D. cloud GIS resources user is registered using it, makes for cloud GIS resources User's private key is decrypted, and obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains Obtain cloud GIS resources in plain text.
In practical application, for accidental enciphering algorithm, it is designed specifically to accidental enciphering algorithm and generates four groups of parameters s_arg0, S_arg1, t_arg and v_arg, they belong to SA-attributes collection.Wherein, s_arg0 and s_arg1 are no less than 16 English alphabets Two random strings constituted with numeral, t_arg is that the present invention applies the current time millisecond value of cloud GIS platform, v_arg It is the identification code of cloud GIS Resource Servers, the identification code of each cloud GIS Resource Servers is different, SA described in these parameters Property set is stored in cloud platform configuration manager, then after being read by trusted authorization controller, is generated by accidental enciphering algorithm System public key.And designed cloud generalized information system is directed to GIS role hierarchy authorities, can be according to user GIS professional standards and cloud The desirability of GIS resources, such as creates following three kinds geographical roles:
Towards 0 grade of the GIS (GeoLevel0) of domestic consumer:There are no the personnel of GIS Professional knowledges;
Towards 1 grade of the GIS (GeoLevel1) of GIS professionals:Possess the analysis personnel of certain GIS Professional knowledges;
Towards 2 grades of the GIS (GeoLevel2) of GIS developer:Possess GIS Professional knowledges, and GIS exploitations can be engaged in Personnel.
As shown in figure 1, for each cloud GIS Resource Servers, can be configured according to GIS resource types, such as set Put GIS Resource Servers, geographical data bank server, original data server, virtual machine server, GIS server in station, GIS APP servers and cloud storage service device;Wherein, each GIS server is as follows:
The GIS Resource Servers, for providing geographical process service, Map Services, image service, geographic element clothes Business, geocoding service, geographical geometry service, the issue of geographical network service, management and application service, its access control policy Collection is the GIS resource services application permission to be provided to the 0 grade of role of GIS towards domestic consumer, to towards professional's 1 grade of role of GIS provides the GIS resource services and issues authority, and to the 2 grades of roles of GIS towards developer the GIS is provided The Service Management authority of resource.
The GIS server in station, for providing the customization service of GIS websites, it is allowed to the GIS resources of cloud resource user The GIS websites are published to as service, its access control policy collection is that the 0 grade of role of GIS towards domestic consumer is provided The access rights of public GIS websites, provide the 1 grade of role of GIS towards professional the GIS site access authorities of customization, right 2 grades of roles of GIS towards developer provide the scalable GIS site access authority of customization.
The geographical data bank server, for providing the application service of enterprise-level geographical data bank, its access control plan Slightly collection is to provide the read-only access authority of enterprise-level geographical data bank to the 0 grade of role of GIS towards domestic consumer, to towards special 1 grade of role of GIS of industry personnel provides enterprise-level geographical data bank access limit, and the 2 grades of roles of GIS towards developer are carried For the full control authority of enterprise-level geographical data bank.
The virtual machine server, for providing the virtualization of the hardware infrastructure computing resource of private clound GIS platform Service, its access control policy collection is not provide the 0 grade of role of GIS towards domestic consumer the virtual machine service of customization, right 1 grade of role of GIS towards professional provides the virtual machine service of customization, and the 2 grades of roles of GIS towards developer are provided The scalable virtual machine service of customization.
The cloud storage service device, for providing the virtualization of the hardware infrastructure storage resource of private clound GIS platform Service, its access control policy collection is, to the 0 grade of role of GIS towards domestic consumer 20GB cloud storage services are provided, to towards 1 grade of role of GIS of professional provides 50GB cloud storage services, and to the 2 grades of roles of GIS towards developer Shen on demand is provided Please cloud storage service.
GIS APP servers, for providing the use and second development interface service of GIS APP, its access control policy Collection is provided GIS APP to the 0 grade of role of GIS towards domestic consumer and browses service, to towards 1 grade of angle of GIS of professional Color provides GIS APP using service, provides GIS APP to the 2 grades of roles of GIS towards professional and uses and secondary development clothes Business.
Original data server, for providing the browsing, upload of initial data, download service, its access control policy collection It is the browse right of initial data to be provided to the 0 grade of role of GIS towards domestic consumer, to 1 grade of the GIS towards professional Role provides initial data and browses and upload permissions, 2 grades of roles of GIS of developer are provided the browsing of initial datas, on Pass and download permission.
Based on the cloud GIS resource access control methods designed by the invention described above based on GIS role hierarchy authorities, based on not Different GIS roles are built with cloud GIS resources user attributes, then the organizational structure and role system model according to its own, For the self-defining configuration of service log bought, meet the requirement of tenant, motility is higher;Isolation is required higher Tenant stores tenant database by the way of self contained data base, and for domestic consumer then adopts shared data bank, shares number According to the mode of framework, while with reference to self contained data base and shared data bank, shared data framework advantage, user is also met Different service quality requirement;Hierarchy management is introduced in traditional access control model based on geographical role (GRBAC), So that Role Management is in good order, mitigate the burden of rights management.
Embodiments of the present invention are explained in detail above in conjunction with accompanying drawing, but the present invention is not limited to above-mentioned enforcement Mode, in the ken that those of ordinary skill in the art possess, can be with the premise of without departing from present inventive concept Make a variety of changes.

Claims (5)

1. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities, are directed to by cloud GIS resouce controllers Cloud GIS resource user realizes cloud GIS resources accessing controls, wherein, each cloud GIS Resource Servers possess respectively corresponding Access privilege control set of strategies, it is characterised in that cloud GIS resouce controllers are respectively each cloud GIS resources every predetermined period Server generate and as or be updated to each cloud GIS Resource Servers respectively corresponding to system public key;The control method Comprise the steps:
Step A. cloud GIS resouce controllers control correspondence cloud GIS according to the cloud GIS resource access requests of cloud GIS resource user Resource Server is encrypted using its corresponding system public key for related cloud GIS resources, obtains target ciphertext, and is combined Access privilege control set of strategies corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resouce controllers;
System of the step B. cloud GIS resouce controllers according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers is public Key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm, constitute cloud GIS resource user private keys;
Step C. cloud GIS resouce controllers are according to corresponding to it deposits access privilege control set of strategies and cloud GIS resource user Corresponding relation between GIS role hierarchy authorities, the corresponding target ciphertext of access privilege control set of strategies and cloud GIS resources are made User's private key is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, enters for cloud GIS resource user private keys Row decryption, obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS moneys Source is in plain text.
2. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 1, its feature It is:The cloud GIS resouce controllers every predetermined period be respectively each cloud GIS Resource Servers generate and as or more Newly while system public key corresponding for each cloud GIS Resource Servers difference, remove what is stored in cloud GIS resouce controllers Target ciphertext, and corresponding access privilege control set of strategies.
3. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 1, its feature It is:The cloud GIS resouce controllers include that cloud platform configuration manager, trusted authorization controller and cloud GIS resources access control Device processed, wherein, cloud platform configuration manager is used for registration storage cloud GIS resource user attributes information, builds each cloud GIS moneys Source server access privilege control set of strategies corresponding respectively;Trusted authorization controller is used for according to cloud GIS resource user Attribute information, is the corresponding GIS role hierarchy authorities of cloud GIS resources user distribution, and trusted authorization controller every Predetermined period be respectively each cloud GIS Resource Servers generate and as or be updated to each cloud GIS Resource Servers difference institute Corresponding system public key;The control method comprises the steps:
Step A. trusted authorization controller controls correspondence cloud GIS according to the cloud GIS resource access requests of cloud GIS resource user Resource Server is encrypted using the system public key corresponding to it for correspondence cloud GIS resources, obtains target ciphertext, and is combined Access privilege control set of strategies corresponding to cloud GIS Resource Servers, in being uploaded to cloud GIS resource access controllers;
System of the step B. trusted authorization controller according to corresponding to cloud GIS resource access request medium cloud GIS Resource Servers is public Key, and the GIS role hierarchy authorities corresponding to cloud GIS resource user, are encrypted using default first algorithm, are constituted Cloud GIS resource user private keys, then, cloud GIS resource user private keys are sent respectively to cloud GIS moneys by trusted authorization controller Source access controller and cloud GIS resource user;
Step C. cloud GIS resource access controllers are solved according to default first algorithm for cloud GIS resource user private keys It is close, GIS role hierarchy authorities corresponding to cloud GIS resource user are obtained, then cloud GIS resource access controllers are deposited according to it Access privilege control set of strategies and the corresponding relation corresponding to cloud GIS resource user between GIS role hierarchy authorities, will access The corresponding target ciphertext of control of authority set of strategies is sent to cloud GIS resource user;
Default first algorithm when step D. cloud GIS resources user is registered using it, enters for cloud GIS resource user private keys Row decryption, obtains system public key therein, and is decrypted for target ciphertext using system public key is obtained, and obtains cloud GIS moneys Source is in plain text.
4. a kind of cloud GIS resource access control methods based on GIS role hierarchy authorities according to claim 3, its feature It is:The trusted authorization controller is respectively each cloud GIS Resource Servers and generates and conduct or renewal every predetermined period While system public key corresponding for each cloud GIS Resource Servers difference, remove and stored in cloud GIS resource access controllers Target ciphertext, and corresponding access privilege control set of strategies.
5. a kind of cloud GIS resources based on GIS role hierarchy authorities access control according to any one in Claims 1-4 Method processed, it is characterised in that:First algorithm is random enciphering and deciphering algorithm.
CN201710096473.XA 2017-02-22 2017-02-22 Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission Pending CN106685994A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710096473.XA CN106685994A (en) 2017-02-22 2017-02-22 Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710096473.XA CN106685994A (en) 2017-02-22 2017-02-22 Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission

Publications (1)

Publication Number Publication Date
CN106685994A true CN106685994A (en) 2017-05-17

Family

ID=58861743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710096473.XA Pending CN106685994A (en) 2017-02-22 2017-02-22 Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission

Country Status (1)

Country Link
CN (1) CN106685994A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924115A (en) * 2018-06-25 2018-11-30 武汉众智鸿图科技有限公司 A kind of Simulation spatial service authority control method and system
CN109583170A (en) * 2018-11-30 2019-04-05 苏州东巍网络科技有限公司 A kind of the weight reducing cloud data encryption storage system and method for intelligent terminal
CN110765192A (en) * 2019-10-18 2020-02-07 广东省城乡规划设计研究院 GIS data management and processing method based on cloud platform
CN113132488A (en) * 2021-04-22 2021-07-16 云上青海大数据产业有限公司 Method for managing resources of cloud computing system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system
CN105337965A (en) * 2015-10-10 2016-02-17 浪潮(北京)电子信息产业有限公司 Data acquisition method and device
CN105656864A (en) * 2014-11-27 2016-06-08 航天恒星科技有限公司 TCM-based key management system and management method
CN106411857A (en) * 2016-09-07 2017-02-15 河海大学 Private cloud GIS service access control method based on virtual isolation mechanism

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103534976A (en) * 2013-06-05 2014-01-22 华为技术有限公司 Data security protection method, server, host, and system
CN105656864A (en) * 2014-11-27 2016-06-08 航天恒星科技有限公司 TCM-based key management system and management method
CN105337965A (en) * 2015-10-10 2016-02-17 浪潮(北京)电子信息产业有限公司 Data acquisition method and device
CN106411857A (en) * 2016-09-07 2017-02-15 河海大学 Private cloud GIS service access control method based on virtual isolation mechanism

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108924115A (en) * 2018-06-25 2018-11-30 武汉众智鸿图科技有限公司 A kind of Simulation spatial service authority control method and system
CN108924115B (en) * 2018-06-25 2020-12-01 武汉众智鸿图科技有限公司 Space service authority control method and system
CN109583170A (en) * 2018-11-30 2019-04-05 苏州东巍网络科技有限公司 A kind of the weight reducing cloud data encryption storage system and method for intelligent terminal
CN109583170B (en) * 2018-11-30 2020-11-13 苏州东巍网络科技有限公司 Slimming cloud data encryption storage system and method for intelligent terminal
CN110765192A (en) * 2019-10-18 2020-02-07 广东省城乡规划设计研究院 GIS data management and processing method based on cloud platform
CN113132488A (en) * 2021-04-22 2021-07-16 云上青海大数据产业有限公司 Method for managing resources of cloud computing system

Similar Documents

Publication Publication Date Title
CN109559124B (en) Cloud data security sharing method based on block chain
US8850593B2 (en) Data management using a virtual machine-data image
CN105103488B (en) By the policy Enforcement of associated data
Seiger et al. SecCSIE: a secure cloud storage integrator for enterprises
CN108418784A (en) A kind of distributed cross-domain authorization and access control method based on properties secret
CN103327084B (en) The cloud storage system of a kind of public and private mixed distribution formula and cloud storage method
CN108259422B (en) Multi-tenant access control method and device
CN110222518B (en) Trusted authority access control method based on block chain
CN108667605B (en) Data encryption and decryption method and device
CN104935590A (en) HDFS access control method based on role and user trust value
CN104378386A (en) Method for cloud data confidentiality protection and access control
CN106685994A (en) Cloud GIS (Geographic Information System) resource access control method based on GIS role grade permission
CN104718526A (en) Secure mobile framework
CN103220141B (en) A kind of protecting sensitive data method and system based on group key strategy
CN106992988A (en) A kind of cross-domain anonymous resource sharing platform and its implementation
CN107302524A (en) A kind of ciphertext data-sharing systems under cloud computing environment
CN103535007A (en) Managed authentication on a distributed network
WO2018116230A1 (en) Hybrid blockchain based record management system
Chai et al. BHE-AC: A blockchain-based high-efficiency access control framework for Internet of Things
Zhou et al. Research on multi-authority CP-ABE access control model in multicloud
CN105790929A (en) High-efficient access control method based on rule redundancy elimination in encryption environment
WO2017165948A1 (en) Data storage and access platform with jurisdictional control
Sanghi et al. Enhance the data security in cloud computing by text steganography
Wang et al. Blockchain for Public Safety: A Survey of Techniques and Applications
Wu et al. Research on access control of smart home in NDN (short paper)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170517

RJ01 Rejection of invention patent application after publication