A permission generation and configuration method based on Rules and FP-Growth algorithm

Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He
{"title":"A permission generation and configuration method based on Rules and FP-Growth algorithm","authors":"Lei Zhu, Ziheng Zhang, Xinhong Hei, Yichuan Wang, Ziliang Yang, Feixiong Hu, Ping He","doi":"10.1109/NaNA53684.2021.00092","DOIUrl":null,"url":null,"abstract":"With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Networking and Network Applications (NaNA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NaNA53684.2021.00092","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

With the development of computer technology, lots of enterprises had begun to build a data platform, and the data and its services already paly the import role in enterprises. However, the guarantee the data security is the primary task of platform, and data access control, especially the fine-grained access control model, had become an important means to enhance the security of platform. In this paper, we propose a data access permission configuration method based on rules and FP-growth. Specifically, FP-Growth algorithm is first used to obtain the frequent items and the association relations of data, which can be transformed into the enumerable permission configuration items. Then, the correspondence and frequency of data items are calculated to acquire the frequent items, the permission configuration acting on the data table columns is obtained according to the frequency of used data items. By filtering the strong association relation, the data items that are more closely related in the association relation and the corresponding data item values are finally obtained, and they are converted into the permission configuration that acts on the rows of the data table. The proposed method has been tested and verified to meet business needs, and the performance consumption is below the threshold. Moreover, it is feasible to utilize classical data mining algorithms to generate permission configuration, which has begun to apply the Blueking Data Platform.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于规则和FP-Growth算法的权限生成和配置方法
随着计算机技术的发展,许多企业已经开始搭建数据平台,数据及其服务已经在企业中扮演着重要的角色。然而,保证数据安全是平台的首要任务,数据访问控制,特别是细粒度访问控制模型,已成为增强平台安全性的重要手段。本文提出了一种基于规则和fp增长的数据访问权限配置方法。首先使用FP-Growth算法获取数据的频繁项和关联关系,并将其转化为可枚举的权限配置项。然后,计算数据项的对应关系和频率,获得频繁项,根据数据项的使用频率,得到作用在数据表列上的权限配置。通过对强关联关系的过滤,最终获得关联关系中相关度较高的数据项及其对应的数据项值,并将其转换为作用于数据表行上的权限配置。所提出的方法经过测试和验证,满足业务需求,性能消耗低于阈值。此外,利用经典的数据挖掘算法生成权限配置是可行的,这已经开始在蓝king数据平台上得到应用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Covert Communication in D2D Underlaying Cellular Network Online Scheduling of Machine Learning Jobs in Edge-Cloud Networks Dual attention mechanism object tracking algorithm based on Fully-convolutional Siamese network Fatigue Detection Technology for Online Learning The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1