Efficient and Secure Search of Enterprise File Systems
时间:2025-04-23
时间:2025-04-23
Efficient and Secure Search of Enterprise File Systems
Ef cientandSecureSearchofEnterpriseFileSystems
AameekSinghGeorgiaTechMudhakarSrivatsaGeorgiaTechGeorgiaTechLingLiu
aameek@cc.gatech.edumudhakar@cc.gatech.edulingliu@cc.gatech.eduABSTRACT
1.INTRODUCTION
Copyrightisheldbytheauthor/owner(s).
,May8–12,2007,Banff,Canada.
.
Efficient and Secure Search of Enterprise File Systems
2.BACKGROUNDANDRELATEDWORK
2.1ModernEnterpriseArchitecture
2.1.1AccessControl
Efficient and Secure Search of Enterprise File Systems
2.2LimitationsofExistingApproaches
Efficient and Secure Search of Enterprise File Systems
3.1.1AccessControlBarrels
3.1.2UserAccessHierarchy
Efficient and Secure Search of Enterprise File Systems
3.2ScalabilityOptimizations
3.2.1ACBMinimality
3.2.2BoundsontheNumberofBarrels
3.2.3OptimizationI–FileIndexDuplication3.2.4OptII–ControlledACASCompromise
Efficient and Secure Search of Enterprise File Systems
4.SYSTEMARCHITECTURE
4.1Pre-processing:CreatingACBs4.3Search
Efficient and Secure Search of Enterprise File Systems
4.4HandlingUpdates
5.EVALUATION
5.1ComparisonwithSingle-IndexApproaches5.1.1Datasets5.2IndexingExperiments5.2.1Pre-processing
Efficient and Secure Search of Enterprise File Systems
)
c 4000es 3500( 3000CSI
em 2500BDI-2
i 2000BDI-5T
g
n
i 1500
x
e 1000
d
n 500
I 0 0 50 100 150 200 250
Number of Files (x 1000)
5.2.2ContentIndexing
Efficient and Secure Search of Enterprise File Systems
)
H P
)
H P
)
H P
W# y# §$# B I yU !D(wGcA w FGp3@E(¦¥£ VU ¤V01QDI w¤U ¦¤£(DyH¦pS£PHD1!¦(VU¡ Ff¢ 1A{F18¦$63© w ¡# 0©©¡ 0#¡©# d© 5¥©# £ W¥©# £¡ p¡£ U© 0 r©#© (¦¥R Uw{F18¦$((©}q '(¦¥ VUuH¤ D¡ F(¤UE(¦¥R ¤p ¦13D¥£©£# y§$# B I y U£$ 5© d d W# 4¦¥ ¦FD3auGp(@ (¦¥ H26bD$THHD1!¦Ff3¤U¡ Ff¢ ab!D(y##¡# B I Iy#"§$# B IyU¢¡%©#GC3¤3D¥¦G HP 3¦$&1'Gp(@ 3¦¥£¦¥S£cr)¥8¦$631©#y$§$¡ B 0©£%$ u# y¡ i§ l kdÆ kd dÆ 6fT 9S£¤¡¤031 ©1!D'3¦¥Cc!(D¥Q ¦(¤"iEW i¾ g1$ 3F2F( Ì2G kº¤¡# y# 0#© B§$# B I y U"©# ©£ y£ U~ 0#© FD( G ¤H¦D#13C1'Gp(6`f1)8! 3¦¥'3@¦¥b1o© ¤H¦D#13B§1cGp(@)1¦$¨3¦¥R3`(3¤Uu¤3 F1!}`2fH'3 S9¦013F$# B I yU 0©£££ U© p¡ 0 r¥©§$ 9$ U$£© p(VU1)2VU1Q¢)8¦$631Õ w (¦¥&{1 (¦¥ 3¦¥ C| f¤3b©¡©£¡© I¥©#© £ 5 U©¥#£$£ U W 0 r¦4D¥¨¦D(R21QpD31!HG{H¦D( wG 3@u3¦¥ ¦¥¤£c¨c!¦$1"#©#y 9U© Iy© B 5#y§$# B I yU£¡%%# p¡£ 5¥©#© £ i# y§$# B I y H¤ D¡ (3¤UP3¦¥i{F18¦$(( }q P(¦¥b U SWi¾#¦D3c1'Gp(@U"©#¡¡% p¡¡¥©#©# y$§$¡ B 0© (VUD¡1!¦(VU`¦¥S£cCH¤ D¡Q(3¤UR¤UR)f¦$(31w(i` 9S£¤¡¤031 ©1!D¨(¦¥£%$ e# y¡ W¥©#© U© £ 9B¡£¡© c!3D¥aAH¦6f¤"i}X)f¦$(( wp3y}q (¦¥'@u!3¤U1)©@¤U1QI¡¡§$£#© I$ U©#y# §$# B Iy HH¤6¤UcQH¤ D¡P3¦¥P¦4Pfb1pFD3 G T aw1'Gp(@U£ U© §$# B IyU£#© I% 5 U£¡£ (¦¥`1wA w cG 3@¨3¦¥¨¦6Dy!P'A3X¤$¦¡HDc¤3¦¥R U W##©#B$©#£§¡##£U 0© !¤¤¡¦01! !8¦ D(fc'¦6¦y3¦yD#£1)© #(¤UED¤¦¡(¦F¦@H Ss36 9`f !D3¨¦1A¦Gp(@¨DH3 TF8(2zÓ~6VG (¤UD¡3A4¤&FG¡£ U$© B#©# B I yU¥ q WÛ 5§¡" y 0 r#w 5
W¥©# X)f¦$((© p s 0"£ U©£ 0 r#%§#§#§## F(¤Uz¡¤f(¤UD¡u(¦¥ 3¦¥wH
¤3¨ FC4m©a$ 9D£FGf¦$( ¨ wu3¦¥£"£ 0¡ ¡¥% 0#© B§$# B I yU£"¡ y#¡ y¡ U¥ 3¤U¦¡1V©f¤$@E¤¤03ccV¦D#1i&G 3@E3¦¥u3¤UH((!¦R¤U¨(2 (3)H¦£# y$§$¡¡p q£%$¡¥ q W¥©#© p s 0" (f 1 9S£¤¡¤03¤B6¨(¦¥ac!3D¥a¤3 c{F18¦$(( (3VUz¡¤3¤UD¡'3¦¥£§$£©£ 0© y 0© U r U …… 此处隐藏:5697字,全部文档内容请下载后查看。喜欢就下载吧 ……