Font Size: a A A

Research On Storage Optimization Technology Of Big Data Access Control Strategy

Posted on:2021-05-03Degree:MasterType:Thesis
Country:ChinaCandidate:X N LiangFull Text:PDF
GTID:2428330629482579Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of social technology,the Internet has been widely used in people's daily life and work.While accessing Internet applications and obtaining the required information,a large amount of data has been generated correspondingly.These data are in PB speed Rapidly rising,people began to enter the era of big data.The widespread application of big data improves the convenience of our lives while also creating inevitable problems,such as data risks and security issues.So far,the solution to the risks and challenges is to manage data uniformly and control access requests.Based on the attributes of resources,users,and operating contexts,that is,operations,an attribute access model is proposed.This model is the most widely used among multiple access models.An access control method that is wide,flexible and extensible.The basic decision-making elements of this model are the object and subject attributes.The requester's own attribute set and the reasonable access rights are set to effectively make use of the separation of decision authority and policy management.However,with the increase of policy data,attribute-based access control also has problems such as low efficiency of permission management,insufficient flexibility and inability to store policies safely.In recent years,blockchain as a new technology first appeared in the field of digital cryptocurrency,and one of its main functions provides new ideas for solving security storage based on attribute access control strategies.As a hash chain,blockchain has the characteristics of immutability,verifiability and decentralization.It uses blockchain transactions to implement distributed management of access control strategies.Transaction data is always stored on the blockchain and cannot be It has been tampered with,so that users can flexibly manage and control data and facilitate system audits.However,as the access control strategy continues to increase,the data on the blockchain cannot be deleted,the number of nodes will continue to increase,the storage pressure on the blockchain will gradually increase,and conflicts and redundant strategies in the strategy set will continue to increase.,Inquiry and use efficiency continue to decrease.In response to this problem,this paper proposes a static strategy optimization algorithm based on a big data environment.The optimized strategy set is stored on the blockchain to achieve the purpose of storage optimization,which can significantly improve storage efficiency and strategy application accuracy.The main work of static strategy optimization is as follows:(1)Strategy analysis: The strategy is considered as two kinds of decision effects(permit and deny),the main body of the strategy,environment,resources,operational attributes and decision results are combined and expressed as a set of attributes;(2)Calculation of similarity value: Use the principle of Jaccard similarity coefficient to find the ratio between the size of the intersection of two sets of strategies and the size of the union,ranging from 0 to 1.When the two strategies are identical,the ratio is 1,and when the strategies are completely different,the ratio is 0;(3)Strategy grouping: Only the similarity values of resource attributes and operation attributes between policies may have conflict or redundancy.According to the basic situation of conflict strategy and redundancy strategy,the strategy set is grouped according to the similarity value,that is,when the similarity value of the two strategy resource attributes and the operation attribute is 1;(4)Strategy optimization: Propose an algorithm that optimizes conflict and redundancy strategies.Prioritize rejection and retain the original intention of the strategy as much as possible,but on the premise of deleting more strategies,split,merge or delete conflict strategies and redundancy strategies.In the experimental stage,the theoretical analysis results are compared with the simulation experimental results,and it is concluded that the use of this solution can greatly optimize the access control strategy in the big data environment,make the static strategy more accurate,and improve storage efficiency.
Keywords/Search Tags:Big data, Access control strategy, Jaccard similarity coefficient, Conflict strategy elimination, Redundancy strategy elimination
PDF Full Text Request
Related items