Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 400-403.doi: 10.11896/JsJkx.191000066

• Information Security • Previous Articles     Next Articles

New Approach for Graded and Classified Cloud Data Access Control for Public Security Based on TFR Model

GU Rong-Jie, WU Zhi-ping and SHI Huan   

  1. The Third Research Institute of the Ministry of Public Security,Shanghai 201204,China
  • Published:2020-07-07
  • About author:GU Rong-Jie, born in 1977, Ph.D, professor.His main research interests include network security, massive information processing and police informatization.
    WU Zhi-ping, born in 1985, postgra-duate, assistant professor.His main research interests include police informatization, access control, and database security.

Abstract: In recent years,the development of big data for public security is accelerating.The unified construction of public security data centers around the country has brought about high centralization of sensitive data,thus the risk of leakage of information regarding national security and illegal use of personal information is sharply increasing.On the basis of traditional data security protection methods such as data encryption and role-based access control,this paper presents a new access control model based on data grade and classification.Based on the grading and classification of data sensitivity,personnel and data,this model can achieve hierarchical control based on the level of data table,data field and data record,which is helpful to achieve precise access authorization control of grading and classification for sensitive public security data with higher flexibility and finer granularity,and can be effectively applied to the construction of data access security control system of modern big data cloud platform for smart public security.This model has been applied to the construction of smart public security in some areas and has achieved satisfied results.

Key words: Authorized access, Big data, Graded and classified access control, Public security cloud, Sensitive data

CLC Number: 

  • TP391
[1] Sohu News.The Ministry of Public Security established the Leading Group for the National Big Data Work in Public Security.http://news.cyol.com/yuanchuang/2018-01/25/content_16901261.htm.
[2] Sohu News.The National Meeting of Directors of Public Security was convened:focus on the development of big data in public security.http://www.sohu.com/a/291349459_653639.
[3] Sohu News.Hot news interpretation | The Ministry of Public Security:Six Key Tasks in the Construction of ‘Smart Public Security’.http://www.sohu.com/a/291349459_653639.
[4] HONG F.Introduction to Access Control.Wuhan:Huazhong University of Science and Technology Press,2010.
[5] SANDHU R S,COYNE E J,FEINSTEIN H L,et al.RoleBased Access Control Models.IEEE Computer,1996,29(2):38-47.
[6] SANDHU R S,FERRAIOLO D F,KUHN D R.The NIST model for role-based access control:towards a unified standard//ACM Workshop on Role-Based Access Control.ACM SIGSAC,2000:47-63.
[7] OSBORN S L.Role-based access control:past,present and future//International Conference on Privacy,Security and Trust:Bridge the Gap Between PST Technologies and Business Services.ACM,2006:4.
[8] SERVOS D,OSBORN S L.Current Research and Open Problems in Attribute-Based Access Control.ACM Computing Survey,2017,49(4):65:1-65:45.
[1] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[2] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[3] SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73.
[4] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[5] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[6] YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117.
[7] WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85.
[8] WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211.
[9] TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203.
[10] ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242.
[11] LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264.
[12] ZHANG Guang-jun, ZHANG Xiang. Mechanism and Path of Optimizing Institution of Legislative Evaluation by Applying “Big Data+Blockchain” [J]. Computer Science, 2021, 48(10): 324-333.
[13] YE Ya-zhen, LIU Guo-hua, ZHU Yang-yong. Two-step Authorization Pattern of Data Product Circulation [J]. Computer Science, 2021, 48(1): 119-124.
[14] ZHAO Hui-qun, WU Kai-feng. Big Data Valuation Algorithm [J]. Computer Science, 2020, 47(9): 110-116.
[15] MA Meng-yu, WU Ye, CHEN Luo, WU Jiang-jiang, LI Jun, JING Ning. Display-oriented Data Visualization Technique for Large-scale Geographic Vector Data [J]. Computer Science, 2020, 47(9): 117-122.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!