Font Size: a A A

The Research And Design On Security Access Control In The Big Data Resource Of Employment

Posted on:2016-01-04Degree:MasterType:Thesis
Country:ChinaCandidate:D ChangFull Text:PDF
GTID:2298330467993220Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Due to rapid popularization of the network technology and the rapid development of communication technology, more and more information is digitized and widely used across the network. Based on the big data analysis and data mining technology has been paid to more and more research and development, the security problem of network, especially the problem of data security has been paid more attention. Access control as an important part of security service system, the core idea is that realize the relation of access between subject and object by formulate accessing purview of user to ensure the data will not be captured by the ineligible user and protect the data form unauthorized modification or destruction by the legal user.This paper based on the research and implementation of the project called ’The employment information service system and application demonstration of labor life cycle". Firstly systematically analyze the realization principle, strategy mechanism, advantages, disadvantages and applicability of three main access control. We give a scheme on privacy protection based on the characteristics of our system having bigger audience, diversified roles and precision data management. Its purpose is both non-disclosure the user privacy information during publishing and consumption, but also maximize the utility of the data. In addition, this paper has expanded the theory on account of data access control based on role, put forward a data access control model based on role and data items. Not only make full use of the advantage of role-based access control, but also achieve the precision management of data.This paper complete the security access control module of the business system with the combination of above proposed solution, which provides unified access control and authorization management, the interface between access control and distributed storage system, the interfaces between access control and privacy protection system. The practice shows that this solution has a clear authorization management, complete data controlled for users in different roles. It is useful for privacy protection for information systems in big data area.
Keywords/Search Tags:Access Control, Privacy Protection, Data Staging, RoleData Items
PDF Full Text Request
Related items