CN109284629B - Authority control method and system of distributed file storage system - Google Patents

Authority control method and system of distributed file storage system Download PDF

Info

Publication number
CN109284629B
CN109284629B CN201811067203.7A CN201811067203A CN109284629B CN 109284629 B CN109284629 B CN 109284629B CN 201811067203 A CN201811067203 A CN 201811067203A CN 109284629 B CN109284629 B CN 109284629B
Authority
CN
China
Prior art keywords
directory
authority
acl
setting
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811067203.7A
Other languages
Chinese (zh)
Other versions
CN109284629A (en
Inventor
刘颖
李婷婷
李佳颖
李玲侠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Yunhai Information Technology Co Ltd
Original Assignee
Zhengzhou Yunhai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Yunhai Information Technology Co Ltd filed Critical Zhengzhou Yunhai Information Technology Co Ltd
Priority to CN201811067203.7A priority Critical patent/CN109284629B/en
Publication of CN109284629A publication Critical patent/CN109284629A/en
Application granted granted Critical
Publication of CN109284629B publication Critical patent/CN109284629B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a method and a system for controlling authority of a distributed file storage system, which are characterized by comprising the following steps: s1: judging whether the identifier gid in the added user group permission exists in a user database of the distributed file system, if so, turning to the step S2, otherwise, reporting an error and exiting; s2: performing ACL marking on the top-layer directory to replace the original traversal ACL or selecting to perform ACL setting on the top layer; s3: and replacing the original ACL authority verification by the ACL authority verification of the marked upper-layer directory, and if the upper-layer directory is not marked, verifying according to the own authority of the directory.

Description

Authority control method and system of distributed file storage system
Technical Field
The invention belongs to the technical field of file storage authority design, and particularly relates to an authority control method and system of a distributed file storage system.
Background
With the rapid development of a distributed file storage system, the application range is more and more wide, and for a user with a deep directory hierarchy and a large number of files, a long time is required for recursively setting the authority, and the setting needs to be frequently changed and reset after the setting.
When the number of files in the deep directory hierarchy is large, the process of setting ACL (access control list) by using the command setxacl-R is slow in execution, and the setting result is long in time consumption for returning to the user. This is a disadvantage of the prior art.
Therefore, aiming at the defects in the prior art, the authority control method and system of the distributed file storage system are provided; it is very necessary to solve the above-mentioned defects in the prior art.
Disclosure of Invention
The present invention provides a method and a system for controlling authority of a distributed file storage system to solve the above technical problems.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for controlling authority of a distributed file storage system is characterized by comprising the following steps:
s1: judging whether the identifier gid in the added user group permission is in a user database of the distributed file system, if so, turning to the step S2, otherwise, reporting an error and exiting;
s2: performing ACL identification on the top-layer directory to replace the original traversal ACL or selecting to perform ACL setting on the top layer;
s3: and replacing the original ACL authority verification by the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, verifying according to the own authority of the directory.
In the technical scheme, the setxacl-R sets the ACL, needs to traverse all subdirectories and files to set the ACL authority, and returns a processing result to a client after the setting of all subdirectories and files is finished; according to the scheme, the ACL is directly and successfully set for the top-level directory, namely, the result is returned to the upper-level application; user access rights verification is controlled by top-level directory rights.
Preferably, the ACL authority in step S3 adopts a time-first principle: the ACL permission set at the most recent time is the validation ACL.
Preferably, in the time priority principle, a catalog/A/B/C/file is set; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
Preferably, the method for controlling the authority of the distributed file storage system further comprises an authority control test method, and the method comprises the following specific steps:
creating 10 levels of directories in the cluster, setting 10 ten thousand files under each directory, selecting any level of directory to set user group ACL permission rwxvd, and successfully returning a result within 10 seconds by an ACL setting command;
creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed under each directory, selecting any one level of directory to identify user group ACL permission rwxvd, and when successfully returning results within 10 seconds of an ACL setting command to have a top-level ACL directory: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
The invention also provides an authority control system of the distributed file storage system, which is characterized by comprising the following steps:
the authority marking module is used for judging whether the identifier gid in the added user group authority is in a user database of the distributed file system, entering the top-level directory marking module when the user group exists, and otherwise, reporting an error and exiting;
the top-layer directory marking module is used for carrying out ACL identification on the top-layer directory to replace the original traversal ACL or selecting to carry out ACL setting on the top layer;
and the upper-layer directory authority verification module is used for replacing the original own ACL authority verification to the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, the verification is carried out according to the own authority of the directory.
Preferably, in the upper-layer directory permission verification module, the ACL permission adopts a time priority principle: the ACL authority set at the latest time is the effective ACL; in the time priority principle, setting a catalog/A/B/C/file; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
Preferably, the authority control system of the distributed file storage system further includes:
the authority control test module is used for creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed in each directory, any one level of directory is selected to set user group ACL authority rwxvd, and results are successfully returned within 10 seconds after ACL setting commands;
creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed under each directory, selecting any one level of directory to identify user group ACL permission rwxvd, and when successfully returning results within 10 seconds of an ACL setting command to have a top-level ACL directory: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
The invention has the advantages of being suitable for various distributed file storage scenes, convenient for customer operation, strong in usability, capable of more efficiently meeting customer requirements and capable of meeting diversification of products.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Therefore, compared with the prior art, the invention has prominent substantive features and remarkable progress, and the beneficial effects of the implementation are also obvious.
Drawings
Fig. 1 is a schematic block diagram of an authority control system of a distributed file storage system according to the present invention.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings by way of specific examples, which are illustrative of the present invention and are not limited to the following embodiments.
Example 1:
the invention provides a method for controlling authority of a distributed file storage system, which is characterized by comprising the following steps:
s1: judging whether the identifier gid in the added user group permission is in a user database of the distributed file system, if so, turning to the step S2, otherwise, reporting an error and exiting;
s2: performing ACL identification on the top-layer directory to replace the original traversal ACL or selecting to perform ACL setting on the top layer;
s3: and replacing the original ACL authority verification by the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, verifying according to the own authority of the directory.
In the technical scheme, the setxacl-R sets the ACL, needs to traverse all subdirectories and files to set the ACL authority, and returns a processing result to a client after the setting of all subdirectories and files is finished; according to the scheme, the ACL is directly and successfully set for the top-level directory, namely, the result is returned to the upper-level application; user access rights verification is controlled by top-level directory rights.
In this embodiment, the ACL permission in step S3 adopts a time-first principle: the ACL permission set at the most recent time is the validation ACL.
In this embodiment, in the time priority principle, a directory/a/B/C/file is set; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
In this embodiment, the method for controlling the permission of the distributed file storage system further includes a method for testing the permission control, and the method includes the following steps:
creating 10 levels of directories in the cluster, setting 10 ten thousand files under each directory, selecting any level of directory to set user group ACL permission rwxvd, and successfully returning a result within 10 seconds by an ACL setting command;
creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed under each directory, selecting any one level of directory to identify user group ACL permission rwxvd, and when successfully returning results within 10 seconds of an ACL setting command to have a top-level ACL directory: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
Example 2:
as shown in fig. 1, the authority control system of a distributed file storage system provided by the present invention is characterized by comprising: the authority marking module is used for judging whether the identifier gid in the added user group authority is in a user database of the distributed file system, entering the top-level directory marking module when the user group exists, and otherwise, reporting an error and exiting;
the top-layer directory marking module is used for carrying out ACL identification on the top-layer directory to replace the original traversal ACL or selecting to carry out ACL setting on the top layer;
and the upper-layer directory authority verification module is used for replacing the original own ACL authority verification to the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, the verification is carried out according to the own authority of the directory.
In this embodiment, in the upper directory permission verification module, the ACL permission adopts a time-first principle: the ACL authority set at the latest time is the effective ACL; in the time priority principle, setting a catalog/A/B/C/file; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
In this embodiment, the authority control system of the distributed file storage system further includes:
the authority control test module is used for creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed in each directory, any one level of directory is selected to set user group ACL authority rwxvd, and results are successfully returned within 10 seconds after ACL setting commands;
creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed under each directory, selecting any one level of directory to identify user group ACL permission rwxvd, and when successfully returning results within 10 seconds of an ACL setting command to have a top-level ACL directory: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
The above disclosure is only for the preferred embodiments of the present invention, but the present invention is not limited thereto, and any non-inventive changes that can be made by those skilled in the art and several modifications and amendments made without departing from the principle of the present invention shall fall within the protection scope of the present invention.

Claims (7)

1. A method for controlling authority of a distributed file storage system is characterized by comprising the following steps:
s1: judging whether the identifier gid in the added user group permission is in a user database of the distributed file system, if so, turning to the step S2, otherwise, reporting an error and exiting;
s2: performing ACL identification on the top-layer directory to replace the original traversal ACL or selecting to perform ACL setting on the top layer;
s3: and replacing the original ACL authority verification by the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, verifying according to the own authority of the directory.
2. The method according to claim 1, wherein the ACL rights in step S3 adopt a time-first principle: the ACL permission set at the most recent time is the validation ACL.
3. The method according to claim 2, wherein in the time-first principle, directory/a/B/C/file is set; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
4. The method of claim 3, wherein the method further comprises an authorization test method, and the method comprises the following steps:
creating 10 levels of directories in the cluster, setting 10 ten thousand files under each directory, selecting any level of directory to set user group ACL permission rwxvd, and successfully returning a result within 10 seconds by an ACL setting command;
creating 10-level directories in the cluster, selecting 10 ten thousand files under each directory, selecting any one level directory to identify user group ACL permission rwxvd, and successfully returning a result within 10 seconds by an ACL setting command
When a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
5. An entitlement control system for a distributed file storage system, comprising:
the authority judgment identification module is used for judging whether the identification gid in the added user group authority is in a user database of the distributed file system, entering the top-level directory marking module when the user group exists, and otherwise, reporting an error and exiting;
the top-layer directory marking module is used for carrying out ACL identification on the top-layer directory to replace the original traversal ACL or selecting to carry out ACL setting on the top layer;
and the upper-layer directory authority verification module is used for replacing the original own ACL authority verification to the ACL authority verification of the identification upper-layer directory, and if the upper-layer directory identification cannot be carried out, the verification is carried out according to the own authority of the directory.
6. The privilege control system of a distributed file storage system as claimed in claim 5, wherein in the upper directory privilege verification module, the ACL privilege adopts a time priority principle: the ACL authority set at the latest time is the effective ACL; in the time priority principle, setting a catalog/A/B/C/file; firstly, setting u1 rwx-v permission for a C directory, accessing a file and using u1 rwx-v permission of the C directory, namely, the file cannot be deleted when read and written; and setting u1: rwxdv authority for the directory A, accessing the file at the moment, and adopting the authority of the directory A according to a time priority principle: u1 rwxdv is the full control authority.
7. The system of claim 6, wherein the system further comprises:
the authority control test module is used for creating 10 levels of directories in the cluster, wherein 10 ten thousand files are placed in each directory, any one level of directory is selected to set user group ACL authority rwxvd, and results are successfully returned within 10 seconds after ACL setting commands;
creating 10-level directories in the cluster, selecting 10 ten thousand files under each directory, selecting any one level directory to identify user group ACL permission rwxvd, and successfully returning a result within 10 seconds by an ACL setting command
When a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, setting u1: r-x-v authority for the D directory, and verifying rwxdv for the top-level ACL authority for the D directory after deleting the ACL attribute of the D directory;
when a top level ACL directory exists: creating an/A/B/C/D directory, identifying u1: rwxdv authority for the A directory, identifying u1: r-x-v authority for the D directory, and after deleting the ACL attribute of the D directory identification, verifying rwxdv for the top-level ACL authority for the D directory;
when no top level ACL directory exists: creating/A/B/C/D directory, marking u1: r-x-v authority on the D directory, deleting ACL attribute of the D directory identification, and then, taking the D authority of the directory as UGO authority;
when no top level ACL directory exists: and creating an/A/B/C/D directory, setting u1: r-x-v authority for the D directory, and deleting the ACL attribute of the D directory, wherein the D authority of the directory is UGO authority.
CN201811067203.7A 2018-09-13 2018-09-13 Authority control method and system of distributed file storage system Active CN109284629B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811067203.7A CN109284629B (en) 2018-09-13 2018-09-13 Authority control method and system of distributed file storage system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811067203.7A CN109284629B (en) 2018-09-13 2018-09-13 Authority control method and system of distributed file storage system

Publications (2)

Publication Number Publication Date
CN109284629A CN109284629A (en) 2019-01-29
CN109284629B true CN109284629B (en) 2021-08-31

Family

ID=65180510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811067203.7A Active CN109284629B (en) 2018-09-13 2018-09-13 Authority control method and system of distributed file storage system

Country Status (1)

Country Link
CN (1) CN109284629B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274609A (en) * 2020-01-19 2020-06-12 苏州浪潮智能科技有限公司 User permission inheritance method and device of distributed file storage system
CN111475481A (en) * 2020-02-29 2020-07-31 苏州浪潮智能科技有限公司 HDFS resource permission testing method, system, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107679420A (en) * 2017-10-23 2018-02-09 郑州云海信息技术有限公司 A kind of authority setting method and system based on distributed file system
CN107688753A (en) * 2017-09-01 2018-02-13 郑州云海信息技术有限公司 A kind of method and apparatus of ACL controls of authority
CN107748849A (en) * 2017-10-25 2018-03-02 郑州云海信息技术有限公司 A kind of authority control method and system based on NFS
CN108491549A (en) * 2018-04-09 2018-09-04 深圳市茁壮网络股份有限公司 The creation method and device of file directory in a kind of distributed memory system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10044718B2 (en) * 2015-05-27 2018-08-07 Google Llc Authorization in a distributed system using access control lists and groups

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107688753A (en) * 2017-09-01 2018-02-13 郑州云海信息技术有限公司 A kind of method and apparatus of ACL controls of authority
CN107679420A (en) * 2017-10-23 2018-02-09 郑州云海信息技术有限公司 A kind of authority setting method and system based on distributed file system
CN107748849A (en) * 2017-10-25 2018-03-02 郑州云海信息技术有限公司 A kind of authority control method and system based on NFS
CN108491549A (en) * 2018-04-09 2018-09-04 深圳市茁壮网络股份有限公司 The creation method and device of file directory in a kind of distributed memory system

Also Published As

Publication number Publication date
CN109284629A (en) 2019-01-29

Similar Documents

Publication Publication Date Title
CN100517313C (en) Method and system of verifying metadata of a migrated file
US9460303B2 (en) Operating large scale systems and cloud services with zero-standing elevated permissions
US8566908B2 (en) Database application security
CN107679420B (en) Permission setting method and system based on distributed file system
CN105487556B (en) The flight control method and flight control assemblies of unmanned vehicle
CN109284629B (en) Authority control method and system of distributed file storage system
CN106302609A (en) A kind of access method and device
CN109858278B (en) File permission setting method and device, computer equipment and storage medium
CN106295265A (en) A kind of method and device of user authority management
CN114168930A (en) Hive authority control method, device, equipment and readable storage medium
CN108280361A (en) A kind of authority classification management method and device
CN112257097A (en) Partition authority management method based on distributed database
CN110221991B (en) Control method and system for computer peripheral equipment
CN115718666A (en) Fine-grained dynamic authority control method and system for WEB service
WO2010091607A1 (en) Method for providing custom access control mode in file system
KR102182573B1 (en) Apparatus for Setting Access Permission in Large-Scale Data Environment and Computer-Readable Recording Medium with Program therefor
CN110928860B (en) Data migration method and device
CN110717153B (en) Authority verification method and device
KR20220115061A (en) Devices and methods for safe storage of media containing personal data and erasure of stored personal data
CN104751069B (en) Data safety access method and system thereof
CN114564706A (en) User authority management method and device, electronic equipment and storage medium
RU2676223C1 (en) Method for separating database objects based on privacy labels
US7974953B1 (en) System and method for deletion of writeable PPIS
CN105808989A (en) Permission auditing method and device
CN111199049A (en) File authority management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant