Font Size: a A A

Design And Implementation Of Access Control Model In The Comprehensive Integrated System Of Drilling And Completion Data

Posted on:2022-04-09Degree:MasterType:Thesis
Country:ChinaCandidate:Y L PanFull Text:PDF
GTID:2481306323955609Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The integrated drilling and completion data system involves massive data,which are collected and used in drilling and completion production operations.The system is mainly used by all organizations of a petroleum group,which has a large number of users.Users of different organizations access the system according to their own responsibilities.Different users have different data access requirements and functional operations in the system.However,System suffers from security threat due to the frequent access without identity verification for user’s login,and it cannot confirm that if logged-in user is a legitimate user of the petroleum group.In addition,In order to meet requirements of users from different organizations,legitimate users need to be granted effective permissions to access the system.In order to ensure security of Comprehensive Integrated System of Drilling and Completion Data,and to grant users permissions flexibility who are from different organizations and departments,this thesis focuses on designing an access control model for the system and implementing identity authentication based on the AD domain.First,the thesis analyzes several mainstream access control models and compares the advantages and disadvantages of each model.Besides,the thesis chooses a role-based access control model and improve it on the basis of it.Then this thesis four-layer access control model –RGDU,which increases the granularity of access control and ensures the flexibility of authorization by adding organizations and duty to the RBAC model,and implying hierarchical constraints on them.The identity of users is verified based on the AD domain before logging in system.First,After deploying the AD domain for the group,this thesis use CAS for identity authentication.In addition,according to the actual access control requirements of the system,this thesis also completes the realization of system access control function modules and builds it as an independent functional service on the Microservice,and call other functional modules of the system.Further more,the Microservice is implemented by Spring Cloud.In conclusion,this thesis finally realizes flexible authorization for users with different responsibilities in different organizations,and performs identity authentication for user login at the same time.This thesis realizes system access control and guarantees system security,facilitating the efficiency of drilling and completion operation data.The research of this thesis effectively reduces the time cost and economic cost of actual production,and has far-reaching significance for the smooth advancement of drilling and completion projects.
Keywords/Search Tags:Access Control Model, Role, AD Domain Identity Authentication, Microservice
PDF Full Text Request
Related items