Font Size: a A A

Study On The Key Technologies Of The Spatial Data Access Control

Posted on:2013-09-02Degree:DoctorType:Dissertation
Country:ChinaCandidate:Y XuFull Text:PDF
GTID:1220330395480624Subject:Cartography and Geographic Information Engineering
Abstract/Summary:PDF Full Text Request
With the development of geo-information technology and expanding of its domains,geo-spatial data became more and more important in people’s ordinary lives and productions.To meet the demand of people, magnanimous data is produced and shared by web. And at thesame time, the security of spatial data also become more and more important and become themost imoportant problem of the application systems.To data provider, they need their data onlyused by the users have privileges and not shared by web or changed without their permission.Todata users, they need to have correct data and not be balefully changed by others. All of theabove needs can be realized through spatial data access control.Now most researches aboutaccess control is about relation data, and few researchers is carrying out their researches onspatial data. The article discuss about spatial database accessing control technology and datasecurity strategy and access model, and point the latter direction on spatial data accesscontrol.The article contains following contents:(1) Basing on the summing-up of the database secutrity protect technology, we discuss thedatabase access control technology. And as a result, through the combination of thediscretionary access control, mandatory access control and role-based access control, we givean access control frame to contain a multi-granularities, mulriple spatial data access controlsolution.(2) Basing on the analysis of the spatial data authorization and security strategy, we usespatial authorization table to replace the common access control matrix. And we give adiscretionary access control basing on spatial character and its samples.(3) Basing on the analysis of the spatial data security strategy, we discuss the security leveland how to compare between them. Then we give a mandatory access contrl model and itssamples.(4) Basing on R tree index, we fuse the authorization into the tree to avoid the secondspatial check in the access of the spatial object, and by this way we improve the efficiency ofthe strategy check and the query of spatial data.(5) Basing on the analysis of the character of the role-based access contrl model, we give aspatial role-based access contrl model (SRBAC) and spatial hierarchy role-based access controlmodel(SHRBAC) and spatial constraint role-based access control model(SCRBAC), anddiscuss the principle should be obeyed when combain the SHRABC model and SCRBACmodel to SHCRBAC model.(6) Basing on the three types of access control model, we design the access control systemin Beyond dabase system. And basing on the BeyonDB database system, we introduce therealization of the protect of spatial data from database level(thick granularity) to spatial area(dataset level, thin granularity) in Milimap and as a result, proving the correct andfeasibility of the spatial access contrl frame.
Keywords/Search Tags:Access Contrl, Control Frame, Authorization Manage, Security Strategy, Discretionary Access Control, Mandatory Access Control, Spatial Role, SLR tree
PDF Full Text Request
Related items