In order to improve the data access efficiency and enhance the security in IT systems, a layered access control model with classified distributed storage in distributed environment is presented[1,2]. In the model, information is stored in numbers of physical distributed storage nodes. The storage architecture is logically organized into four classes, which includes active data storage, static data storage, backup data storage and data warehouse. Data access efficiency is increased because most applications will concentrate on active data storage or static data storage where the most recently and frequently used data are stored. Data security access is controlled through a 3-layered access control model based on RBAC model[3,4]. The three layers include operation layer, data logic security shield layer and application layer. Operation layer and application layer are to control the authorized access for system managers and application end users respectively. The data logic security shield layer is to shield the difference among the database safety control organizations. It is appreciated after the model has been applied to Zhejiang Fuchunjiang Limited Company.
[1]
Vijayalakshmi Atluri,et al.
Role-based Access Control
,
1992
.
[2]
Soomi Yang.
An Efficient Access Control Model for Highly Distributed Computing Environment
,
2005,
IWDC.
[3]
S. Yamada,et al.
Control for Security and Privacy in Ubiquitous Computing Environments
,
2005
.
[4]
Chang-Joo Moon,et al.
WITHDRAWN: Visual modeling and formal specification of RBAC constraints using semantic web technology
,
2008
.
[5]
Jiawei Han,et al.
Classifying large data sets using SVMs with hierarchical clusters
,
2003,
KDD '03.
[6]
Eiji Kamioka,et al.
Access Control for Security and Privacy in Ubiquitous Computing Environments
,
2005,
IEICE Trans. Commun..
[7]
Chang-Joo Moon,et al.
Visual modeling and formal specification of constraints of RBAC using semantic web technology
,
2007,
Knowl. Based Syst..