System and method for controlling access to web services resources

ABSTRACT

A system and method for controlling access to web services resources. A system may include a storage medium configured to store instructions and one or more processors configured to access the storage medium. The instructions may be executable by at least one of the processors to implement a web services access control system (ACS) configured to receive requests. Each request specifies an access operation to be performed with respect to a corresponding resource. Each of the requests is associated with a corresponding principal. For each received request, the ACS may be further configured to determine whether an access control entry exists that is associated with both the resource and principal associated with the request and that specifies an access type sufficient to perform the access operation. If no such entry exists, the ACS may deny the request.

This application is a Continuation of U.S. application Ser. No.11/351,904, filed Feb. 10, 2006, now U.S. Pat. No. 8,447,829, which isincorporated by reference herein in its entirety.

BACKGROUND OF THE INVENTION

1. Field of the Invention

This invention relates to computer security and, more particularly, totechniques for controlling access to web services resources.

2. Description of the Related Art

The Internet and its associated communication protocols andinfrastructure enable sophisticated information exchange to occurirrespective of the locations of the participants. As access to thepublic Internet continues to proliferate, and as Internet protocolsbecome increasingly common for information exchange within privatenetworks (intranets), techniques for implementing various computingapplications and services in a distributed fashion continue to evolve.

In the web services model of computing, an entity may make some sort ofcomputational service available to users through an interface usingweb-based Internet protocols such as the Hypertext Transport Protocol,for example. Thus, instead of simply presenting relatively staticread-only data such as web pages to a user, an entity may employ similartechniques to implement more sophisticated services as web services. Forexample, a generic data storage service may be presented to users as aweb service. Using appropriate web services protocols, users withInternet access may be able to store data objects to the data storageservice and later access them from any location.

The web services approach may facilitate the presentation of services ordata to large numbers of users in a location- and platform-independentfashion. However, it may not be desirable to allow all users equalaccess to all services or data. For example, a user that storespersistent state information (e.g., a data object) via a web service maywish to restrict other users from reading or modifying the storedinformation. Similarly, an entity offering a web service may wish tooffer different levels of service to different users, for example on thebasis of a user's willingness to pay for a given level of service.

Existing techniques for managing control of access to web servicesresources may generally lack in sophistication. Such existing techniquesmay typically distinguish user privileges at the domain level, offeringor denying a user access to all services offered through a particularweb domain or high-level address based on user authentication. Undersuch techniques, it may be difficult to distinguish web servicesresources at finer levels of granularity, such as the level of anindividual object or other web services resource.

Management of web services access control information at finer levels ofgranularity may also create data management challenges, particularly forlarge-scale web services implementations. For example, in systems withmany different users and web services resources to be managed, aconsiderable quantity of access control data may need to be generated,stored, and selectively retrieved in order to enforce the desired accesscontrol policies. Such data management tasks may impact the overallperformance of the services offered, for example if completion of a webservices request is dependent upon retrieval and evaluation of relevantaccess control data.

SUMMARY

Various embodiments of a system and method for controlling access to webservices resources are disclosed. According to one embodiment, a systemmay include a storage medium configured to store instructions and one ormore processors configured to access the storage medium. Theinstructions may be executable by at least one of the processors toimplement a web services access control system, which may be configuredto receive requests each specifying one or more access operations to beperformed with respect to a corresponding web services resource, whereeach of the requests is associated with a corresponding one of one ormore principals. For each received request, the web services accesscontrol system may be further configured to determine whether an accesscontrol entry exists that is associated with both the web servicesresource corresponding to the received request and the correspondingprincipal associated with the received request, and that specifies oneor more access types, wherein the one or more access types aresufficient to perform the one or more access operations specified by thereceived request. In response to determining that such an access controlentry does not exist for a given received request, the web servicesaccess control system may be further configured to deny the givenreceived request.

According to another embodiment, a system may include a web servicesinterface configured to receive a web services request from a webservices client, where the web services request specifies a principal, aweb services resource, and an access operation requested to be performedwith respect to the web services resource on behalf of the principal.The system may further include a web services access control system thatis configured to receive the web services request from the web servicesinterface and in response to receiving the web services request,determine whether the principal has sufficient access privileges toperform the access operation with respect to the web services resource.The web services access control system may be further configured toreturn an indication to the web services client of whether or not theprincipal has sufficient access privileges to perform the accessoperation with respect to the web services resource.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram illustrating one embodiment of a web servicesarchitecture.

FIGS. 2A-C are block diagrams illustrating various embodiments of a webservices architecture including an access control system.

FIG. 3 illustrates one embodiment of a table including access controlentries corresponding to web services resources.

FIG. 4 is a flow diagram illustrating one embodiment of a method ofoperation of a web services architecture including an access controlsystem.

FIG. 5 is a flow diagram illustrating one embodiment of a method ofoperation of an access control system to verify access privileges ofprincipals with respect to web services resources.

FIG. 6 illustrates one embodiment of a table including entriesconfigured to store access group information for an access controlsystem.

FIG. 7 is a block diagram illustrating a system architecture in which aweb services access control system is deployed as a web service.

FIG. 8 is a flow diagram illustrating one embodiment of a method ofoperation of a web services access control system as a web service.

FIG. 9 is a block diagram illustrating one embodiment of a data storeconfigured to store structured data records among a distributed set ofhosts.

FIG. 10 is a flow diagram illustrating one embodiment of a method ofpartitioning a table including structured data records for storagewithin a data store.

FIG. 11 illustrates one example of a table and a corresponding dataview.

FIG. 12 is a block diagram illustrating one embodiment of a storagehost.

FIG. 13 is a flow diagram illustrating one embodiment of a method ofoperation of a storage host to store a structured data record.

FIG. 14 illustrates one example of a table augmented with metadata.

FIG. 15 illustrates one example of a table including entriescorresponding to structured data records that have been updated ordeleted.

FIGS. 16A-B are flow diagrams illustrating one embodiment of a method ofsynchronizing replicas of blocks among storage hosts.

FIG. 17 illustrates one embodiment of a state machine configured fortracking the operational state of a storage host.

FIG. 18 is a block diagram illustrating an exemplary computer system.

While the invention is susceptible to various modifications andalternative forms, specific embodiments thereof are shown by way ofexample in the drawings and will herein be described in detail. Itshould be understood, however, that the drawings and detaileddescription thereto are not intended to limit the invention to theparticular form disclosed, but on the contrary, the intention is tocover all modifications, equivalents and alternatives falling within thespirit and scope of the present invention as defined by the appendedclaims.

DETAILED DESCRIPTION OF EMBODIMENTS

Introduction

The evolution of web services as a model for offering computationalservices to users depends on the extension of the web services model tooffer data security appropriate to the resources being offered. Inconventional approaches, web services security typically relies on userauthentication. Such authentication often relies on user identityinformation independent of the specific service or resource requested bya user, granting or denying access to large groups of services on thebasis of a given user's credentials. However, as web services evolve tooffer persistent data services such as object storage, queue management,account management and other services, the question of access privilegesincreasingly depends on the intersection of users and specificresources. For example, a user that owns a particular data object storedvia a web services data storage system may wish to grant specified typesof access to that particular data object to some users but not others.Further, the same user may wish to grant a different set of accessprivileges with respect to a different data object. To support suchflexibility in granting access to resources, a model of web servicesaccess control may take into account user information in conjunctionwith access properties associated with those resources.

In the following discussion, an access control system is firstdescribed. In various embodiments, the access control system may beconfigured to store and retrieve access control information associatedwith web services resources, where for a particular web servicesresource, the access control information may include informationidentifying a particular user or principal as well as informationidentifying the access privileges held by the principal with respect tothe particular web services resource. The access control system may beconfigured to use such access control information to determine whether arequest to perform an access operation on a given web services resourceon behalf of a given principal should be allowed to proceed.

In instances where the access control system supports many differentprincipals and web services resources, a considerable quantity of accesscontrol information may be generated. Performance of the access controlsystem may depend on the access control information being reliablystored, so as to minimize the risk of loss of data, and readilyavailable. For example, in embodiments where the access control systemis physically distributed across geographically dispersed sites, storinga single copy of access control information at one site may slow overallsystem performance relative to distributing copies of access controlinformation among various sites. Following discussion of the accesscontrol system, a distributed storage system configured to replicate anddistribute storage of structured data records indicative of accesscontrol information among a number of storage nodes is described.

Overview of Web Services System Architecture

As mentioned previously, many different types of applications, functionsor services may be implemented as web services. Generally speaking,implementing a function or service as a web service may encompassproviding any of a variety of standardized application programminginterfaces (APIs) configured to allow different software programs tocommunicate (e.g., to request services and respond to such requests) inan autonomous, web-based and typically platform-independent manner.Through a web services API, a web services client may submit a webservices request to a web services host or provider, which mayresponsively process the request and return appropriate results to theclient as defined by the web services API. For example, an enterprisemay choose to expose certain enterprise data (e.g., catalog data,inventory data, customer data or other types of data) and/or certainenterprise functions (e.g., query functions, electronic commercefunctions, generic data storage or computational functions, etc.) toexternal clients via a web services interface. Client applications couldthen access the exposed data and/or functions via the web servicesinterface, even though the accessing application may be configured toexecute on an entirely different platform (e.g., a different operatingsystem or system architecture) than the platform hosting the exposeddata or functions.

One example of a high-level web services system architecture is shown inFIG. 1. In the illustrated embodiment, a web services client 110 may beconfigured to communicate via a network 120 with a web servicesinterface 130 in order to submit web services requests directed to a webservices resource 140. Generally speaking, web services client 110 (orsimply, client 110) may correspond to any application or programconfigured to generate and convey a web services request to web servicesinterface 130 (or simply, interface 130) using one or more suitableprotocols, such as those described below. While in some embodiments, webservices client 110 may correspond to a web browser or other applicationthat may provide a user with direct access to various Internet-basedresources, in other embodiments web services client 110 may betransparently embedded within another application or an operatingsystem. As an example, in one embodiment a data storage web service maybe employed to provide data storage for an office application such as aword processor or spreadsheet. In such an embodiment, web servicesclient 110 may be integrated within the office application or theoperating system on which the application executes, such that userrequests to store data may be processed by client 110 to generate webservices requests directed to the data storage service. In some suchembodiments, the user may be unaware of underlying web servicesactivity. For example, from the user's perspective, the webservices-implemented data storage may be indistinguishable from localstorage (e.g., a disk drive local to the system employed by the user).

Network 120 may generally correspond to any type of communicationnetwork suitable for conveying web services traffic between client 110and interface 130. For example, network 120 may include local areanetwork (LAN) technology such as wired or wireless Ethernet technology,telecommunication network technology such as dial-up telephony, digitalsubscriber line (DSL) or cable modem networking, or any suitablecombination of these or other technologies. In various embodiments,network 120 may correspond to a private network such as an enterpriseintranet, a public network such as the public Internet, or a combinationof the two.

Web services interface 130 may generally correspond to thatfunctionality necessary to receive and process web services requestsfrom clients such as client 110 and to direct the requests to theappropriate web services resources 140 referenced by the requests. Insome embodiments, interface 130 may be configured to perform additionalfunctions, such as authentication of user identity credentials (e.g.,user ID and password authentication), load balancing or other suitablefunctions. In some embodiments, interface 130 may be configured to passvalid, authorized web services requests along to resources 140 insubstantially the same format in which the request arrived (e.g., as anXML document, described below). In other embodiments, interface 130 maybe configured to translate the request from the format of the webservices API to the format of an API appropriate to the underlyingresource 140.

In general, web services resource 140 (or simply, resource 140) maycorrespond to any uniquely identifiable web services endpoint. In someembodiments, resource 140 may be identified by a corresponding UniformResource Locator (URL) of the general format:

<protocol>://<host.domain>/<path>

where <protocol> specifies a transport protocol to be used to access theresource (e.g., HTTP or another suitable transport protocol),<host.domain> specifies the name or, alternatively, Internet Protocol(IP) numeric address of a host to which a web services request for theidentified resource should be directed by the transport protocol, and<path> identifies the path to be resolved by the host to access theidentified resource. One example of a URL corresponding to a resource140 is:http://storage.host.com/smith/music/Artist/Album/Trackl.mp3In this example, the company host.com may provide a storage serviceaccessible through the host storage.host.com. This host may maintain anamespace for resources distinguished by usernames, where theillustrated URL is associated with the user smith. User smith mayfurther subdivide his portion of the resource namespace using anarbitrary number of levels of hierarchy that the host may navigate toaccess the resource, which in this case is an MP3 file.

It is noted that in some embodiments, a Uniform Resource Identifier(URI) of the general format may be used in place of a URL to identify aresource 140. Generally speaking, a URI may identify host, domain andpath information associated with a resource 140 that may be sufficientto uniquely identify that resource within a particular naming scheme, orsimply “scheme.” A given scheme may correspond to a particular standardor specification for assigning identifiers within that scheme. Often, ascheme may specify rules of syntax for generation of well-formedidentifiers within that scheme. A URI may have the general format:

<scheme>:<host.domain>/<path>

where host, domain and path may be as described above with respect to aURL. In some instances, the scheme of a URI for a resource may alsocorrespond to a protocol that may be used to access the resource. Insuch cases, a URI may directly correspond to a (possibly identicallyformatted) URL. However, it is noted that different URLs may exist for agiven URI. For example, a URI defined within an HTTP scheme may beaccessed via a URL specifying the HTTP protocol, or via another URLspecifying a different type of transport protocol, such as FTP. Moreinformation regarding resource naming using URIs and URLs may be found,e.g., in the Internet standards track protocol document entitled RequestFor Comments (RFC) 3986, or a suitable successor document.

A web services resource 140 may correspond to a data object, such as afile including audio, video, still image, text, executable code or anyother suitable type of data. Generally speaking, a data object may havepersistent content or state that may be stored, retrieved or modified asa result of a web services request. Typically, a data object resourcemay not perform a function other than to retain its state until itsstate is altered, for example by a suitable web services request. Inother instances, a resource 140 may correspond to a service. In contrastto a data object, a service resource may be configured to take inputdata or parameters, perform some function, and return an output as aresult or consequence of the function. For example, a service resourcemay be implemented as an application program or script, such as aJavascript module, that may execute some function in response to a webservices request. In some cases, resources 140 may combine aspects ofdata object and service resources. For example, a queuing web servicemay allow users to establish and persistently store entries into queueresources, as well as to perform operations on established queues totransform their state.

It is noted that in some embodiments, client 110, interface 130 andresource 140 may denote any suitable configuration of computer system(s)or portions of computer systems configured to implement the respectivefunctionality of these components. An exemplary embodiment of such acomputer system is discussed below in conjunction with the descriptionof FIG. 18. However, in such embodiments, it is noted that theillustrated partitioning of functionality need not map directly to acorresponding partitioning of computer systems. For example, in oneembodiment interface 130 and resource 140 may be implemented by the samesystem. Alternatively, any of these components may be distributed forimplementation across several distinct systems. It is also noted thatwhile singular elements are shown in FIG. 1, the illustratedarchitecture may be extended to support arbitrary numbers of clients110, networks 120, instances of interface 130 and resources 140,distributed across any suitable number of computer systems.

In some embodiments, provisioning a web service may encompass the use ofparticular protocols which may be executable, for example as part ofinterface 130, to publish available web services to potential users, todescribe the interfaces of web services sufficiently to allow users toinvoke web services properly, to allow users to select and differentiateamong web services for a particular transaction, and to provide a formatfor exchanging web services data in a flexible and platform-independentmanner. Specifically, in one embodiment a provider of a web serviceencompassing one or more resources 140 may register the service using aversion of the Universal Discovery Description and Integration (UDDI)protocol, which may function as a general directory through whichpotential resource users may locate web services of interest. The webservice provider may also publish specific details regarding how awell-formed web services request from a client 110 should be formatted(e.g., what specific parameters are required or allowed, the data typeor format to be used for a given parameter, etc.). For example, suchinterface details may be published (e.g., within a UDDI directory entry)using a version of the Web Services Description Language (WSDL).

In many embodiments, web services request and response data is exchangedbetween a client 110 and interface 130 through the use of messages ordocuments formatted as platform-independent structured data, such as adocument formatted in compliance with a version of eXtensible MarkupLanguage (XML). For example, in one embodiment, a web services resource140 may be configured to provide inventory status information for itemsstored in inventory within a storage facility. A web services request toprovide inventory status information for a given inventory item may beembodied in an XML document including fields identifying the item ofinterest, the type of data requested (e.g., inventory status data), andpossibly other fields, in which each field is delimited by an XML tagdescribing the type of data the field represents. The response to such arequest from interface 130 or the resource 140 may include an XMLdocument containing the requested data. In some embodiments, webservices-related documents may be transmitted between applicationsmaking requests and targeted web services using a web-based datatransfer protocol, such as a version of the Hypertext Transfer Protocol(HTTP), for example.

Different types of web services requests and responses may yield XMLdocuments that bear little content in common, which may complicate thehandling and interpretation of such documents. For example, in differentversions of a free-form XML document specifying a web services request,the actual web service that is requested may appear at different placeswithin different document versions, which may require a recipient of thedocument to buffer or parse a good deal of document data beforeunderstanding what the document is for. Consequently, in someembodiments, the XML documents containing web services request/responsedata may encapsulated within additional XML data used to define amessaging framework, e.g., a generic format for exchanging documents ormessages having arbitrary content. For example, in one embodiment webservices requests or responses may be XML documents formatted accordingto a version of the SOAP protocol (some versions of which may also beknown as Simple Object Access Protocol), which in various versions maydefine distinct document sections such as an “envelope” (e.g., which mayinclude a specification of the document type, the intended recipient webservice, etc.) as well as a message body that may include arbitrary XMLmessage data (e.g., the particular details of the web services request).However, in some embodiments, web services may be implemented usingdifferent protocols and standards for publishing services and formattingand exchanging messages.

Additionally, in some embodiments, a web services system may beimplemented without using document-based techniques such as SOAP-typeprotocols. For example, as an alternative to a document-based approach,a web service may be implemented using a Representational State Transfer(REST)-type architecture. Generally speaking, in REST-typearchitectures, web services requests may be formed as commands conveyedvia a transport protocol, such as PUT or GET commands conveyed via aversion of the HTTP protocol. Those parameters of the request that mightbe embedded within a document in a document-based web servicesarchitecture may instead be included as components or elements of atransport protocol command in a REST-type architecture. Other suitableconfigurations of web services architectures are possible andcontemplated.

Web Services Access Control System

In some embodiments, the system architecture shown in FIG. 1 may beaugmented to include components configured to provide a resource-basedweb services access control model. One such embodiment is shown in FIG.2A, in which an access control service (ACS) 150 is interposed betweenweb services interface 130 and a number of web services resources 140.ACS 150 may be configured to store and retrieve access controlinformation within a data store 160, as described in greater detailbelow. Although a single instance of ACS 150 is shown, it iscontemplated in some embodiments, that multiple instances of ACS 150 maybe deployed in a distributed fashion, for example across computingresources located in different physical facilities.

In the illustrated embodiment, web services client 110 may be configuredto submit web services requests directed to one or more resources 140 onbehalf of a principal 100. Generally speaking, principal 100 maycorrespond to any uniquely identifiable entity that may be grantedaccess privileges or rights with respect to a particular resource 140.For example, a principal 100 may correspond to an individual user. Insome embodiments, web services client 110 may be configured to submitweb services requests on behalf of multiple different principals 100,while in other embodiments there may exist a one-to-one correspondingbetween each instance of client 110 and each principal 100. Theillustrated system may support an arbitrary number of principals 100 inaddition to an arbitrary number of resources 140.

Each principal 100 may have an associated access identifier. In oneembodiment, an access identifier of a principal 100 may include a tupleor concatenation of at least two components: a subject pool identifierthat may unique identify one of several possible principal namespaces,and a principal ID that may uniquely identify the principal 100 withinthe namespace of a particular subject pool. For example, the subjectpool may be configured to distinguish different business or otherentities that manage or offer web services. In such an embodiment,different entities (e.g., different online merchants A and B) mayindependently authorize a principal 100 to access various web services,and each may assign a principal ID unique within their respectivesubject pools. Generally speaking, the components of an identifierassociated with a principal 100 may be represented in any suitableformat, such as a numerical or string format. It is noted that inembodiments in which a principal's access identifier includes a subjectpool namespace, a single user that seeks to access resources 140 ofentities corresponding to different subject pools may have multipledistinct access identifiers corresponding to the different subjectpools. That is, in such embodiments, an individual user may correspondto multiple distinct principals 100 with respect to resources 140. Inother embodiments, it is contemplated that principal access identifiersmay be implemented as globally unique identifiers without using subjectpool or other namespace identifiers. In some such embodiments, there mayexist a one-to-one correspondence between individual users andprincipals 100.

Generally speaking, for a given request submitted on behalf of aprincipal 100 to perform a particular type of access operation withrespect to a particular resource 140, ACS 150 may be configured todetermine whether access control information associated with theprincipal 100 and the particular resource 140 indicates that therequested access operation is permissible. In one embodiment, suchaccess control information may be formatted within a data structurereferred to as an access control entry (ACE). ACS 150 may be configuredto generate, evaluate and modify access control entries for resources140 as well as to store and retrieve ACEs to and from data store 160.

In one embodiment, an access control entry may specify an identifier ofa particular resource 140, an access identifier of a particularprincipal 100, and one or more access types that denote the type ofaccess operations the particular principal 100 may perform with respectto the particular resource 140. For example, as noted above, in someembodiments resources 140 may correspond to respective URLs or URIs andprincipals 100 may correspond to respective access identifiers includinga subject pool and a principal ID. Thus, an example ACE may include thefollowing information:

Resource: http://store.host.com/users/smith/file.txt

Principal ID: 198306950293

Subject Pool: HostComStorageCustomers-Americas

Access Type: FullControl

In this example, the ACE includes a URI identifying a particularresource, which in this case denotes a text file stored at a particularhost address. The ACE also includes an access identifier explicitlydenoted as a twelve-digit numeric principal ID value and a stringidentifying the subject pool within which the principal ID is defined.The ACE indicates that the principal 100 identified by the indicatedsubject pool and principal ID has the access type “FullControl” withrespect to the identified resource 140. In one embodiment, this accesstype may be a standard access type defined for any type of resource 140that indicates that any type of access operation defined for a resource140 may be performed on behalf of the indicated principal 100. Forexample, if read, write and delete operations are defined for a givenresource 140, a principal 100 having the FullControl access type mayrequest to perform any of these operations on the given resource 140.

Generally speaking, access types for a resource 140 may be definedrelative to the operations that the resource 140 supports. In someembodiments, for each operation supported by a resource 140, there mayexist a corresponding access type. For example, for the given resource140 mentioned in the previous paragraph, Reader, Writer and Deleteraccess types may be defined to correspond to the read, write and deleteoperations. In other embodiments, a given access type may apply tomultiple different access operations. For example, a resource 140 maycorrespond to a queuing service configured to provide data or eventstorage having the operational semantics of a queue data structure. Sucha resource 140 may be configured to support operations to configure ordelete queues as well as operations to enqueue, dequeue, or read entriesstored to a particular queue. In one embodiment, an Enqueuer access typemay be defined to correspond to the enqueue operation, a Dequeuer accesstype may be defined to correspond to the read and dequeue operations,and a Manager access type may be defined to correspond to the configureand delete queue operations.

For a given access operation relative to a particular resource 140, agiven access type may be necessary, sufficient, or both necessary andsufficient, depending on the access policy to be enforced for theparticular resource 140. For example, the FullControl operation may besufficient to perform any resource operation, as mentioned above. Forthe previous queuing service example, the Manager access type may beboth necessary and sufficient to perform either of the configure ordelete queue operations. In some embodiments, a particular accessoperation may require that a principal 100 have multiple specific accesstypes. That is, no single access type may be sufficient to perform theparticular operation. It is contemplated that a principal 100 may beassociated with more than one access type with respect to a givenresource 140. In some embodiments, an ACE may be configured to indicateall access types granted to the indicated principal 100 for theindicated resource 140, while in other embodiments multiple distinctACEs may be used to indicate each distinct access type granted to aprincipal 100.

An ACE may be implemented as a structured data record in any of a numberof suitable ways. In one embodiment, access control information for aresource 140 may be implemented as one or more tables each includingrecords and fields. One example of such a table is illustrated in FIG.3. In the illustrated embodiment, resource table 300 may include anumber of ACEs 310, each of which corresponds to a record including anumber of fields. Specifically, ACE 310 includes a resource URI field320, a principal ID field 330, a subject pool field 340, and an accesstype field 350.

In one embodiment, table 300 may be implemented as a relational table inwhich the meaning or data type of a particular field is defined as afunction of the position of the field within the table. For example, arelational schema may be specified for table 300 that explicitly definesthe first column of the table to correspond to resource URI data, thesecond column to principal ID data, and so forth. In an alternativeembodiment, table 300 may be implemented as a collection of records inwhich the meaning of a field does not depend on the position of thefield within the record, but instead is indicated by an explicit tagassociated with the contents of the field. For example, the recordscomprising table 300 may be formatted in a suitable markup language,such as a version of eXtensible Markup Language (XML). One example of anXML record corresponding to the previously presented example ACE is:

<record id=“1”>

<resourceID>http://store.host.com/users/smith/file.txt</resourceID>

<principalID>198306950293</principalID>

<subjectPool>HostComStorageCustomers-Americas</subjectPool>

<accessType>FullControl</accessType>

</record>

In this example, each field of the record is expressly delimited by atag that may govern how the field is interpreted. That is, the recordmay be considered self-describing, in that it may include both data andmetadata (e.g., the tags) that instruct as to the significance of thedata. It is noted that in other embodiments, any suitable techniques forimplementing relational data, self-describing data or a combination ofthe two may be used to implement data structures for storing accesscontrol information, such as table 300.

In one embodiment, ACS 150 may be configured to store and retrieve ACEs310 within data store 160, as well as to process ACEs to determinewhether requests to perform access operations to various resources 140on behalf of principals 100 are allowable. ACS 150 may be configured topresent a variety of functions for creating, storing, searching andperforming other relevant actions on ACEs via one or more APIs. Forexample, ACS 150 may be configured to present such functions as webservices calls that may be directly or indirectly invoked by clients110. Alternatively, ACS 150 may be configured to present such functionsthrough an API that may not be visible as a web service. For example,ACS 150 may be configured to treat those components or entities (e.g.,web services interface 130) on its side of network 120 as “local,” andto present a private Java or HTTP interface for accessing ACEs to localcomponents without making the interface visible to clients 110 or otherentities separate from ACS 150 by network 120. In some embodiments, ACS150 may present both a web services interface and a local interface formanaging access control information, although the functionalitysupported by each interface may differ in some cases.

ACS 150 may be configured to support a variety of operations forcreating and managing ACEs for various resources 140. In one embodiment,ACS 150 may support the basic set of operations CreateResource,GrantAccess, and RevokeAccess. The CreateResource operation, in oneembodiment, may accept as parameters a resource identifier (e.g., a URLor URI) corresponding to a given resource 140 as well as an accessidentifier (e.g., a subject pool ID and a principal ID) indicating theprincipal 100 on behalf of which the given resource 140 is beingcreated. In response to invocation of the CreateResource operation, ACS150 may be configured to generate an ACE 310 that reflects the providedresource and principal identifying information, and to store thegenerated ACE within data store 160 (described in detail below). In someembodiments, ACS 150 may first determine whether an ACE 310 alreadyexists for the given resource 140, and if so, may return an errorcondition as a result of the CreateResource operation instead ofgenerating a new ACE 310. It is contemplated that ACS 150 may also beconfigured to detect other types of error conditions during theprocessing of the CreateResource or other access control operations, andto return appropriate error status information. For example, if anoperation failed to complete due to a communication error, hardwarefault, security violation or other reason, ACS 150 may be configured toreport a corresponding error to the calling entity on behalf of whichthe operation was initiated (e.g., web services interface 130 or aclient 110).

In one embodiment, during processing of the CreateResource operation,ACS 150 may set the access type field of the generated ACE 310 to theFullControl access type, indicating that the identified principal 100may perform any operation with respect to the given resource 140. Insome embodiments, any principal 100 having the FullControl access typewith respect to a resource 140 may be considered an owner of thatresource 140. In some such embodiments, ACS 150 may enforce therequirement that a resource 140 may have only one principal 100 as anowner, while in other embodiments, an arbitrary number of principals 100may be designated as owners.

The GrantAccess operation may be processed by ACS 150 to add an ACE 310for a given existing resource (e.g., a resource 140 for which aCreateResource had previously been performed). In one embodiment, theGrantAccess operation may accept parameters including: a resourceidentifier corresponding to a given resource 140, an indication of anaccess type to be granted with respect to the given resource 140, and anaccess identifier indicating the principal 100 to which the indicatedaccess type is to be granted with respect to the given resource 140. Insome embodiments, only an owner of a resource 140 (e.g., a principal 100having the FullControl or another suitable access type for that resource140) may be allowed to perform the GrantAccess operation. In some suchembodiments, the GrantAccess operation may require a parameterindicating the access identifier corresponding to the principal 100 thatinvoked the GrantAccess operation. To process the GrantAccess operationin such embodiments, ACS 150 may be configured to determine whether anACE 310 exists that indicates that the invoking principal 310 has theFullControl access type with respect to the given resource 140. If so,ACS 150 may be configured to generate a new ACE 310 corresponding to theprincipal 100 to which access has been granted, and may store the newACE 310 within data store 160. In some embodiments, if the new ACE 310would essentially duplicate an existing ACE 310, or if the invokingprincipal 100 does not have sufficient privileges to request theGrantAccess operation, ACS 150 may abort the operation and return anerror.

The RevokeAccess operation may be processed by ACS 150 to remove anexisting ACE 310 from data store 160 for a given existing resource 140,thereby breaking the association between the principal 100, the resource140 and the access type indicated in the removed ACE 310. In oneembodiment, the RevokeAccess operation may accept parameters including:a resource identifier corresponding to a given resource 140, and anaccess identifier indicating the principal 100 whose access to the givenresource 140 is to be revoked. In one embodiment, to process theRevokeAccess operation ACS 150 may be configured to remove all existingACEs 310 that indicate the given resource 140 and the indicatedprincipal 100. In other embodiments, the RevokeAccess operation mayfurther allow one or more specific access types to be revoked.Correspondingly, ACS 150 may be configured to remove only those ACEs 310that indicate the given resource 140, the indicated principal 100, andat least one of the specified access types, leaving other ACEs 310intact.

As with the GrantAccess operation, in some embodiments only a principal100 having FullControl or another sufficient access type for a resource140 may be allowed to invoke the RevokeAccess operation.Correspondingly, in some such embodiments ACS 150 may be configured todetermine whether the invoking principal 100 has sufficient privilegesto request the RevokeAccess operation. If not, ACS 150 may generate anerror condition. An error may also be generated for other circumstances,such as if no ACE 310 matching the specified parameters exists to berevoked. As described in greater detail below in conjunction with thedescription of data store 160, in some embodiments, ACS 150 requestingthat a given ACE 310 be removed from data store 160 may result in thegiven ACE 310 being marked as deleted, although the data contents of theACE record may be preserved within data store 160 for an arbitraryperiod of time after the record is marked as deleted.

As mentioned above, in some embodiments, only a principal 100 with ownerprivileges for a resource 140 (e.g., the FullControl or another suitableaccess type) may be allowed to change the state of ACEs 310corresponding to that resource. In other embodiments, different accesstypes instead of or in addition to the FullControl access type may bedefined with respect to operations for managing access controlinformation of a resource 140. For example, an access type may beassociated with each of the GrantAccess, RevokeAccess or otheroperations supported by ACS 150, such that a principal having theappropriate access type may be allowed to perform correspondingoperations on the access control information of a resource 140.

It is further contemplated that in some embodiments, a principal 100that has privileges to alter the access control information of aresource 140 (e.g., as reflected in ACEs 310) may be allowed to delegatethose privileges to other principals 100 (e.g., through the creation ofACEs 310 specifying appropriate access types). In other embodiments, ACS150 may be configured to prevent the delegation of such privileges,either globally or on a per-resource basis according to the resource'saccess control policy. For example, ACS 150 may be configured to preventone principal 100 having the FullControl access type for a resource 140from performing a GrantAccess operation to add another principal 100 tothat resource 140 with the FullControl access type.

In some embodiments, ACS 150 may also be configured to store additionaltables that may be partially or totally derived from the access controlinformation stored in table 300. For example, table 300 may completelyreflect the known associations between principals 100 and resources 140.However, this information may be processed in several different ways bydifferent types of operations, such as described below. For example, indifferent circumstances it may be relevant to query access controlinformation according to either resources 140 (e.g., to determineassociated principals 100) or principals 100 (e.g., to determineassociated resources 140). Thus, in some embodiments, ACS 150 may beconfigured to generate and maintain one or more tables that correspondto different views of the data reflected in table 300. For example, datain two different table views may be respectively optimized for searchingaccording to either principals 100 or resources 140. Such table viewsmay be stored within data store 160 in a manner similar to storage oftable 300. In some such embodiments, either ACS 150 or data store 160may be configured to update or refresh such derivative tables inresponse to changes in the primary data from which those tables arederived.

The operations just described (or suitable variants thereof), asimplemented by ACS 150 and invoked through the actions of principals 100and clients 110, may function to generate a body of access controlinformation for a variety of resources 140 and principals 100, organizedas ACEs 310 arranged within one or more tables 300 that may be stored bydata store 160. In one embodiment, ACS 150 may be configured to processthis body of access control information to determine whether principals'requests to perform access operations directed to various resources 140should be allowed or denied. Specifically, in one embodiment ACS 150 mayimplement a HasAccess operation that may take parameters including anaccess identifier of a given principal 100, a resource identifier of aresource 140 for which an access operation on behalf the given principal100 has been requested, and a required access type for the requestedaccess operation, as specified by an access policy associated with theresource 140. (In some embodiments, as detailed below, the HasAccessoperation may also receive a list of container resources correspondingto the specified resource 140, where the ACEs of the container resourcesmay be examined in addition to the ACE of the specified resource 140.)ACS 150 may process the HasAccess operation to determine whether therequest is allowable.

The operation of the general web services architecture of FIG. 2A inprocessing access requests directed to web services resources will firstbe considered, followed by a specific embodiment of the operation of ACS150 in the context of such request processing. One embodiment of amethod of operation of the system architecture of FIG. 2A is shown inFIG. 4. Referring collectively to FIGS. 2A, 3 and 4, operation begins inblock 400 where web services client 110, on behalf of a principal 100,generates a request specifying one or more access operations directed toa web services resource 140. For example, client 110 may generate anHTTP request or an XML document specifying the URI of the resource 140as well as information about the requested operation (e.g., read, write,delete or any other defined operation).

The client 110 may then convey the generated request to web servicesinterface 130 (block 402). For example, client 110 may convey therequest via network 120 using appropriate transport and networkprotocols. Upon receipt, interface 130 may attempt to authenticate theprincipal 100 corresponding to the request (block 404). For example,interface 130 may attempt to verify the credentials of the principal100, which may be included within the request or received through aseparate interrogation conducted by interface 130. Such credentials mayinclude the principal's access identifier or another identifier, such asa username, as well as a password, cookie or other type of securitytoken. Interface 130 may then attempt to verify the credentials againstan authority, such as an internal database of credentials or a thirdparty authentication service.

If interface 130 cannot authenticate the principal 100, in oneembodiment interface 130 may instruct that the principal 100 be treatedas an anonymous user. For example, when forwarding the request to ACS150 for further action, interface 130 may substitute the fields of theprincipal's access identifier (e.g., the subject pool and principal IDfields, in one embodiment) with predefined data indicative of ananonymous user. In other embodiments, interface 130 may simply rejectthe request if the principal 100 cannot be authenticated. In someembodiments, interface 130 may treat a previously-authenticatedprincipal 100 as authenticated for certain subsequent requests withoutdeliberately verifying the principal's credentials. For example,interface 130 may implement state information allowing a previouslyauthenticated principal 100 to remain authenticated for a certain periodof time, or indefinitely provided a timeout period (e.g., 30 minutes)has not elapsed between the principal's requests.

Interface 130 may then convey the request to ACS 150 for processing(block 406). In some embodiments, interface 130 may invoke, on behalf ofthe principal 100 corresponding to the request, a particular function oroperation presented by the API exposed by ACS 150, such as the HasAccessoperation, for example. In some such embodiments, interface 130 may notpresent the actual request received from client 110, but may insteadselect appropriate data from that request (e.g., the URI of therequested resource 140, the access identifier of the principal 100,etc.) to be used in generating an appropriate call to ACS 150. In otherembodiments, interface 130 may simply pass along the received messagedocument corresponding to the web services request to ACS 150,specifying additional data (e.g., authentication results) within themessage as appropriate (e.g., as additional data within the body of themessage, as SOAP parameters, or in another suitable fashion).

In response, ACS 150 may determine whether the principal 100 hassufficient privileges to perform the requested access operation withrespect to the specified resource 140 (block 408). For example, ACS 150may retrieve and analyze one or more ACEs 310 with respect to theprincipal's granted access types (if any) relative to the requiredaccess type for the operation, as described below. If ACS 150 determinesthat the principal 100 does have sufficient privileges, the request maybe forwarded to the resource 140 for processing (block 410) and theresource 140 may provide results and/or status information to beconveyed back to the client 110 via interface 130 (block 412). If ACS150 determines that the principal 100 lacks sufficient privileges, therequest may be denied or inhibited (block 414). For example, an errorindication may be returned to client 110 via interface 130. In someembodiments, failed requests may be dropped without notifying the client110 or principal 100.

One embodiment of a method of operation of ACS 150 to verify the accessprivileges of principals 100 with respect to requested access operationson resources 140 is illustrated in FIG. 5. In the illustratedembodiment, operation begins in block 500 where ACS 150 receivesrequests to perform access operations that are submitted on behalf ofprincipals 100 and directed to corresponding web services. For example,ACS 150 may receive requests that are submitted by clients 110 on behalfof principals 100 and that are forwarded via interface 130, as describedabove with respect to FIG. 4.

For each received request specifying a desired access operation, aparticular resource 140 and a particular principal 100, ACS 150 may beconfigured to determine whether an ACE 130 exists that is associatedwith both the particular resource 140 and the particular principal 100,and that specifies one or more access types that are sufficient (eitherindividually or collectively) to perform the specified access operation(blocks 502-504).

For example, ACS 150 may be configured to search through one or moreinstances of table 300 (which may be stored as a collection of recordsby data store 160, in some embodiments) to determine whether any ACE 310matches the resource identifier (e.g., the URL or URI) of the particularresource 140 and the access identifier (e.g., subject pool and principalID) of the particular principal 100, and further includes one or moreaccess types sufficient to perform the specified access operationaccording to the access policy in place for the particular resource 140.

In various embodiments, ACS 150 may employ any suitable search strategy.For example, ACS 150 may first request data store 160 to return all ACEs310 corresponding to the particular resource 140, and may then filterthese according to the particular principal 100. In another embodiment,ACS 150 may request all ACEs 310 corresponding to the particularprincipal 100 and may then filter these according to the particularresource 140. In still another embodiment, ACS 150 may convey a set ofsearch parameters to data store 160 and allow the latter to conduct itsown search strategy.

To determine whether the access type(s) specified by an ACE 310 aresufficient to perform the specified access operation, in one embodiment,ACS 150 may consult the access policy for the particular resource 140.In some embodiments, a resource's access policy may be stored as a tableor other collection of records that may explicitly indicate the accessoperations and access types that are defined for a resource 140 and therelationship between the two (e.g., denoting the access types that arenecessary, sufficient, or both for a given operation). In variousembodiments, the access policy records may be stored within ACS 150 ordata store 160 as distinct tables associated with their respectiveresource 140. Alternatively, in one embodiment each resource 140 may beconfigured to store its own access policy records, for example within ametadata field associated with the resource 140. For example, inaddition to its content (e.g., the data or code corresponding to theresource), a resource 140 may include metadata that may identify variouscharacteristics of the resource, such as its date of creation, size,access policy, or other aspects.

It is contemplated that in some embodiments, ACS 150 may not directlyevaluate the access policy for the particular resource 140. Instead,another entity (e.g., interface 130) may evaluate the access policy andmay convey an indication of the required access type for the requestedoperation to ACS 150, to be compared against the access type(s)indicated by any ACEs 310 corresponding to the particular resource 140and principal 100.

In response to determining that there exists at least one ACE 310corresponding to the particular resource 140 and principal 100 andindicating one or more access types sufficient to perform the requestedoperation, ACS 150 may be configured to allow the request to proceed(block 506). In one embodiment, ACS 150 may be configured to forward therequest to the particular resource 140 for processing contingent uponthe particular principal 100 having sufficient privileges to perform therequested operation. In other embodiments, resource 140 may beginprocessing the requested operation before ACS 150 completes itsdetermination, in which case the requested operation may be aborted ifACS 150 subsequently determines the operation should be disallowed.(This approach may not be employed for operations that could cause achange in state of the particular resource 140.)

In response to determining that there does not exist any ACE 310corresponding to the particular resource 140 and principal 100 andindicating one or more access types sufficient to perform the requestedoperation, ACS 150 may be configured to deny the request to perform theaccess operation (block 508). For example, the particular principal 100may have certain associated access types for the particular resource140, but not those necessary for the requested operation. In othercases, the particular principal 100 may lack any privileges with respectto the particular resource 140, or either the particular principal 100or resource 140 may not exist with respect to the access controlinformation managed by ACS 150.

It is noted that in some embodiments, if the particular principal 100fails to be authenticated by interface 130, the above determinationregarding ACEs 310 may be performed by ACS 150 as though the particularprincipal 100 were anonymous, regardless of the access identifier of theparticular principal 100. That is, even if an ACE 310 existedcorresponding to the particular principal 100 and resource 140 andindicating a sufficient access type for the requested operation, thisACE 310 may be ignored if the particular principal 100 is notauthenticated. Instead, the requested operation may be allowed only ifthere exists an ACE 310 corresponding to the anonymous principal and theparticular resource 140 and indicating a sufficient access type for therequested operation. In such embodiments, a particular access identifierunique to the anonymous principal may be defined (e.g., by ACS 150), andthe anonymous principal may have access types granted or revoked forvarious resources 140 just as any other principal 100 may.

In some embodiments, ACS 150 may be configured to concurrently performthe above-described operations on multiple different requests for accessoperations to multiple distinct, unrelated resources 140. That is, ACS150 may be configured to implement a general model for access control toweb services resources, regardless of the nature of those resources. Itis not necessary that the resources 140 for which ACS 150 manages accesscontrol information be hosted or implemented by the enterprise orsystem(s) that implement ACS 150. As described in greater detail below,in some embodiments ACS 150 may be configured to implement and processaccess control information for web services resources 140 as a webservice itself.

ACS 150 may also be configured to implement other functions oroperations to aid resource owners and other clients of ACS 150 in themanagement of access control information for resources 140. In oneembodiment, ACS 150 may be configured to implement one or more of thefollowing operations, which may be presented through its API asavailable web services calls or other types of function calls:GetResourceOwner, ListResourceAccess, GetUserRightsForResource, andGetAccessibleResources.

Generally speaking, the GetResourceOwner operation may allow the entityinvoking the operation to determine which principal(s) 100 haveownership of a resource 140. One embodiment of the GetResourceOwneroperation may take a resource identifier (e.g., URI) of a particularresource 140 as a parameter. In one embodiment, to implement theGetResourceOwner operation, ACS 150 may be configured to examine theaccess control information associated with the identified resource 140to determine the owner(s) of that resource. For example, ACS 150 may beconfigured to search ACEs 310 corresponding to the particular resource140 to identify an entry that indicates an access type of FullControl,or another access type or property indicative of resource ownership asdefined for the particular resource 140. ACS 150 may then return theaccess identifier of the principal 100 indicated within the entry as aresult of the operation. In some embodiments, if a resource 140 may havemultiple ACEs 310 indicating multiple different principals 100 as havingownership privileges, ACS 150 may be configured to return the accessidentifiers of each such principal 100.

The ListResourceAccess operation may generally function to allow theentity invoking the operation to determine what principals 100 have anysort of access rights to a resource 140. One embodiment of theListResourceAccess operation may take a resource identifier of aparticular resource 140 as a parameter. In one embodiment, to implementthe ListResourceAccess operation, ACS 150 may be configured to examinethe access control information associated with the identified resource140 to identify all of the ACEs 310 associated with that resource. Forexample, ACS 150 may be configured to perform a similar search of ACEs310 as for the GetResourceOwner operation, but without restrictions onthe access type of records satisfying the search. ACS 150 may thenreturn each ACE 310 corresponding to the identified resource 140 as aresult of the operation.

The GetUserRightsForResource operation may generally function to allowthe entity invoking the operation to identify those access rights, ifany, that a principal 100 has with respect to a resource 140. Oneembodiment of the GetUserRightsForResource operation may take a resourceidentifier of a particular resource 140 and an access identifier of aparticular principal 100 as parameters. In one embodiment, to implementthe ListResourceAccess operation, ACS 150 may be configured to identifythose ACEs 310 that correspond to the particular resource 140 andprincipal 100. If any such ACEs 310 exist, ACS 150 may be configured toreturn as a result of the operation those access types indicated withinthe matching ACEs 310, for example as a list of access types.

The GetAccessibleResources operation may generally function to allow theentity invoking the operation to identify those resources 140, if any,for which a principal 100 has any associated access rights. Oneembodiment of the GetAccessibleResources operation may take an accessidentifier of a particular principal 100 as a parameters. In oneembodiment, to implement the GetAccessibleResources operation, ACS 150may be configured to identify those ACEs 310 that correspond to theparticular principal 100 and to return indications of those resources140 identified in such ACEs 310.

It is contemplated that in some embodiments, ACS 150 may be configuredto implement operations on access control information in addition to orinstead of those operations described above. In one embodiment, ACS 150may be configured to implement operations to support the generation andmanagement of groups of principals 100. Generally speaking, a group mayfunction as a principal 100 with respect to access control informationof resource 140, in that it may have a unique access identifier that maybe specified in an ACE 310. Thus, a group may be granted an access typewith respect to a resource 140, for example using the GrantAccessoperation described above. However, a group may designate a number ofprincipals 100 as members of the group. In one embodiment, eachprincipal 100 that is a member of a given group may inherit all of theaccess privileges explicitly associated with the given group. That is,if a given group identified as G has an associated access type A withrespect to a particular resource R, as indicated by a particular ACE310, then a principal P that is a member of group G may implicitly haveaccess type A with respect to resource R, even though there may exist noACE 310 directly associating principal P with resource R. Thus, groupsmay allow the indirect association of access types between principals100 and resources 140.

In one embodiment, a group may correspond to a resource 140. Forexample, a group may be implemented as a list of access identifiersdenoting the principals 100 that are members of the group. The list maybe stored as a data object corresponding to a particular URI. In someembodiments, ACS 150 may be configured to maintain group identityinformation within one or more tables, such as table 600 shown in FIG.6. In the illustrated embodiment, table 600 may be configured toassociate the access identifier (e.g., subject pool and principal ID) ofa group with the resource identifier (e.g., the URI) of the group.Specifically, table 600 may include multiple entries 610, each of whichmay include several fields or columns. In the illustrated embodiment,each entry 610 includes a subject pool field 620, a principal ID field630, and a resource ID field 640. For a given group corresponding to agiven entry 610, these fields may respectively be configured to storeindications of the subject pool, principal ID and URI of the givengroup.

In some embodiments, ACS 150 may also be configured to store additionaltables, e.g., within data store 160, that reflect the association of agiven group to its member principals 100, as well as the association ofa given principal 100 to the groups of which it is a member. Such tablesmay expedite queries associated with determining whether a principal 100is a member of a particular group or vice versa, as may occur duringprocessing of access control information to determine a givenprincipal's access privileges. In some embodiments, ACS 150 and/or datastore 160 may be configured to derive such tables from the resources 140corresponding to the various defined groups, and may further beconfigured to update such derivative tables when the primary datacorresponding to resources 140 changes, for example as a result of theoperations described below.

In some embodiments that support groups of principals 100, ACS 150 maybe configured to implement operations to manage the creation andmaintenance of groups. In one embodiment, ACS 150 may be configured toimplement one or more of the following operations: CreateGroup,AddUserToGroup, and RemoveUserFromGroup.

The CreateGroup operation may generally function to allow the entityinvoking the operation to establish a new group as a resource 140. Oneembodiment of the CreateGroup operation may take an access identifier ofthe principal 100 on behalf of which the group is being created as wellas a group name as parameters. In one embodiment, to implement theCreateGroup operation, ACS 150 may be configured to generate a URI as afunction of the provided access identifier and group name, and to storethe generated URI within a new entry 610 of table 600. In oneembodiment, ACS 150 may be configured to generate the URI of a group byapplying a hash function (e.g., a version of the Message Digest 5 (MD5)algorithm, the Secure Hash Algorithm SHA-1, or another suitable hashfunction) to the provided access identifier and group name, andappending the resulting hash value to a base URI path designated forgroup resources 140. In some embodiments, ACS 150 may also be configuredto generate the group access identifier (e.g., subject pool andprincipal ID) to be stored within the newly generated entry 610. Forexample, the subject pool of the requesting principal 100 may be used asthe subject pool of the generated group, and the generated hash value orsome other value unique within the subject pool may be used as theprincipal ID of the generated group. It is noted that groups, asresources 140, may have corresponding access control information asdescribed above, like any other resource. In some embodiments, theprincipal 100 on behalf of which the group is created may be denoted asthe owner of the group, with full privileges to access and modify thestate of the group.

The AddUserToGroup and RemoveUserFromGroup operations may generallyfunction to add and remove principals 100 from a previously-definedgroup, respectively. In one embodiment, both operations may take anaccess identifier or resource identifier of a group to be modified, aswell as an access identifier of a principal 100 to be added to orremoved from the identified group. In one embodiment, to implement theseoperations, ACS 150 may be configured to access the identified groupresource 140. In some embodiments, if an access identifier for the grouphas been provided as a parameter, ACS 150 may be configured to firstconsult table 600 to identify the resource identifier (e.g., the URI)corresponding to the provided access identifier. ACS 150 may then beconfigured to modify the resource 140 corresponding to the group toeither add or remove the identified principal 100 to or from the group,for example by adding or removing the principal's access identifier toor from the list object corresponding to the group resource 140.

In embodiments that support groups of principals 100, verifying theaccess privileges of a given principal 100 with respect to a particularresource 140 (e.g., as described above with respect to FIG. 5) may beaugmented to include determining the access privileges with respect tothe particular resource 140 of any group of which the given principal100 is a member. For example, as described above, when a given principal100 requests to perform an access operation on a particular resource140, ACS 150 may be configured to retrieve and evaluate those ACEs 310corresponding to the given principal 100 and the particular resource 140to determine whether the given principal 100 is associated with asufficient access type to perform the requested operation. Inembodiments supporting groups, ACS 150 may also be configured to consultgroup resources 140, or tables derived from such resources, to determinewhether the given principal 100 is a member of any groups. If so, ACS150 may additionally retrieve those ACEs 310 corresponding to theidentified group(s) to determine whether any group having the givenprincipal 100 as a member is associated with a sufficient access type toperform the requested operation on the particular resource 140. If suchan ACE 310 exists for a group including the given principal 100, ACS 150may be configured to allow the requested operation to proceed, eventhough no sufficient ACE 310 corresponding directly to the givenprincipal 100 may exist.

In some embodiments, ACS 150 may be configured to generate and maintaina predefined group that includes as members all principals 100 that havebeen authenticated by interface 130. For example, ACS 150 may coordinatewith interface 130 to add and remove principals 100 from theauthenticated principals group as their authentication status changes(e.g., principals 100 may be removed from the group if theirauthentication status expires). As with any other group, any accessprivileges associated with the authenticated principals group may extendto all principals 100 that are members of the group. That is, if an ACE310 exists that grants a particular access type to the authenticatedprincipals group for a particular resource 140, all principals 100 thatare members of the group may be associated with the particular accesstype for the particular resource 140, by extension.

In the foregoing discussion, determining whether a principal 100 hasnecessary access rights to perform a particular operation on a resource140 has been described as a function of the relationship between theprincipal 100 and the resource 140, either directly or, in someembodiments, as mediated by the principal's group membership. In eithercase, only the resource itself may be considered in making thedetermination. However, in some embodiments, a resource 140 may supportthe hierarchical inheritance of access control information from parentor container resources. For example, the URL or URI identifying aparticular resource 140 may be interpreted as a set of nested containersor levels distinguished by occurrences of the single ‘/’ delimiter. Inone embodiment, the highest level resource within a URI (e.g., theleftmost portion of the URL up to the first occurrence of the ‘/’delimiter) may be denoted as level 0, the next resource as level 1, andso forth. For example, for the resource URI

http://store.host.com/users/smith/folders/work/file.txt

the following levels of containment may be defined, where L denotes thelevel of the corresponding container resource:

L Container

0: http://store.host.com/

1: http://store.host.com/users/

2: http://store.host.com/users/smith/

3: http://store.host.com/users/smith/folders/

4: http://store.host.com/users/smith/folders/work/

5: http://store.host.com/users/smith/folders/work/file.txt

For such an embodiment, a container at level N may be considered animmediate parent of a container at level N+1. Conversely, a container atlevel N+1 may be considered an immediate child of a container at levelN. More generally, for any two containers at levels M and N, where M>N,the container at level N may be referred to as a parent of the containerat level M, and the container at level M may be referred to as a childof the container at level N. In some embodiments, an access controlpolicy for a resource 140 may specify that all access control typesassociated with a principal 100 for a level N container of a resource140 also apply to a certain number of levels greater than N (e.g., alllevels greater than N, only level N+1, etc.). That is, access types thatapply at one level of hierarchy may be inherited by lower levels ofhierarchy. For example, a principal 100 that has a Delete access typewith respect to the level 2 resource shown above (as reflected by acorresponding ACE 310) may also have the Delete access type with respectto the resources at levels 3-5, even if no ACE 310 exists thatexplicitly associates the principal 100 with any of the latterresources.

The degree to which access types for a particular resource 140 may beinherited from higher levels of containment may be specified in theaccess policy associated with the particular resource 140 in a number ofdifferent ways. For example, the access policy may explicitly specify aset of URIs that should be considered by ACS 150 in addition to the URIof the particular resource 140 when determining a principal's accesstypes for the particular resource 140. Alternatively, the access policymay specify the numeric level corresponding to the highest level ofcontainment that should be evaluated by ACS 150 for the particularresource 140. For example, if the particular resource 140 has a URIcorresponding to a level N and the access policy for the particularresource 140 specifies the highest level of containment to be consideredas the level 3, then each of the URIs corresponding to levels 3 throughN may be examined by ACS 150 for ACEs 310 corresponding to a principal100. In one embodiment, if the highest level of containment specified inthe access policy is a negative number, only the URI of the particularresource 140 itself may be examined. That is, access type inheritancemay be effectively disabled in this case. Also, in one embodiment, ifthe highest level of containment specified in the access policy exceedsthe level N of the URI of the particular resource 140, no resource URIsmay be examined at all. That is, in this case, the principal 100 may beassumed to have no access types with respect to the particular resource140.

In embodiments supporting access type inheritance as described above,various operations supported by ACS 150 may be augmented to receiveinheritance information as a parameter. For example, in one embodimentthe HasAccess operation may be configured to receive a list of URIs tobe considered in addition to the URI of a particular resource 140 whendetermining whether a principal 100 has a particular access type withrespect to the particular resource 140. In another embodiment, theHasAccess operation may be configured to receive the numericalindication of the highest level of containment to be considered for theparticular resource 140, as described in the previous paragraph. In suchan embodiment, ACS 150 may be configured to determine which URIs, ifany, should be considered, dependent on the numerical indication and theURI of the particular resource 140.

As described above and shown in the system architecture illustrated inFIG. 2A, in one embodiment ACS 150 may be configured to evaluate theaccess control information for a particular resource 140 and aparticular principal 100 in response to a request received from webservices interface 130. For example, ACS 150 may receive such a requestvia the invocation of an operation that ACS 150 exposes through a webservices API or another type of API (e.g., the HasAccess operationdescribed above). In the illustrated embodiment, if ACS 150 determinesthat the particular principal 100 has a sufficient access type toperform the requested access operation on the particular resource 140,it may forward the access operation request to the particular principal140 for processing.

However, alternative architectures are possible and contemplated. Forexample, in the architecture illustrated in FIG. 2B, ACS 150 may notdirectly convey an access operation request to resource 140. Instead,interface 130 may coordinate the evaluation of the request by ACS 150.In some embodiments, interface 130 may submit the request to resource140 contingent upon a response from ACS 150 that the particularprincipal 150 has sufficient privileges to perform the request. In otherembodiments, interface 130 may submit certain types of requests (e.g.,those requests that do not result in modification of resource state) toresource 140 before a response has been received from ACS 150, andinhibiting or aborting the request if a negative response issubsequently received from ACS 150. This approach may improve theoverall response time of resource 140, since the work required by ACS150 to check a principal's privileges may be performed partially orcompletely in parallel with the work required by resource 140 to respondto the request. However, in some circumstances the architecture of FIG.2B may increase the workload of interface 130, which may limit thedegree to which this architecture may scale.

In the architecture illustrated in FIG. 2C, requests to perform accessoperations are delegated to resources 140, which are each responsiblefor coordinating with ACS 150 to evaluate the access privileges ofprincipals 100. For example, upon receiving a request to perform anaccess operation, a resource 140 may submit a corresponding request toACS 150 for evaluation. Thus, the coordination workload of interface 130may be reduced at the possible expense of implementing each resource 140to be aware of the access control API exposed by ACS 150 and toappropriately invoke that API when necessary. It is noted that in thevarious embodiments shown in FIGS. 2A-C or variants thereof, the requestthat is received by ACS 150 for evaluation with respect to a givenprincipal 100 and a given resource 140 may be distinct from the requestoriginally submitted on behalf of the given principal 100. For example,interface 130 or resource 140 may transform or modify the originalrequest to generate a distinct request directed to ACS 150 for accesscontrol evaluation. In other embodiments, ACS 150 may be configured toprocess a copy or version of the request originally submitted on behalfof the given principal 100.

It is contemplated that in some embodiments, ACS 150 may be implementedas a standalone web service, independent of the resources 140 for whichit maintains access control information. One such embodiment isillustrated in FIG. 7. In the illustrated embodiment, web servicesinterface 130, ACS 150 and data store 160 are shown to be configured asa standalone access control web service system 170. In the illustratedembodiment, a resource owner may be configured to register a givenresource 140 with system 170, for example by generating web servicescalls to system 170 corresponding to the above-described CreateResourceand GrantAccess operations. However, system 170 need not have any directcommunication or interaction with the resources 140 for which it managesaccess control information. For example, as shown in FIG. 7, client 110may be configured to communicate with resource 140 either directly orvia network 120, without intervention on the part of system 170.

In such an architecture, system 170 may generally be configured as anaccess policy storage and evaluation service that may provide anassessment of whether a principal 100 is sufficiently privileged toaccess a given resource 140, while leaving actual enforcement based onthat assessment to another entity such as client 110. One embodiment ofa method of operation of system 170 is illustrated in FIG. 8. Referringcollectively to FIGS. 7 and 8, operation begins in block 800 where webservices interface 130 receives a web services request from a client110. The request may specify a principal 100 (e.g., by accessidentifier), a web services resource 140 (e.g., by URI), and an accessoperation requested to be performed with respect to the specifiedresource 140 on behalf of the specified principal 100.

It is noted that in this architecture, the request received by interface130 may or may not be the same request as the one directed to resource140. For example, the request received by interface 130 may be directedspecifically to system 170, specifying a particular operation to beperformed by ACS 150 with particular parameters. By contrast, the actualaccess operation to resource 140 that is the subject of the evaluationrequest to system 170 may be transmitted from client 110 to resource 140using a differently-formatted request specifying different parameters.In some embodiments, the web services request to system 170 may beconsidered a meta-request or meta-operation with respect to acorresponding request to resource 140 that is to be evaluated for accessprivileges. In some such embodiments, the principal 100 (and possiblythe client 110) that submits a meta-request to system 170 may bedifferent from the principal 100 on behalf of which the access operationdirected to resource 140 is requested.

ACS 150 may then receive the web services request from interface 130(block 802). In some embodiments, as described previously, interface 130may be configured to forward a request to ACS 150 contingent uponsuccessfully authenticating the credentials of the requestor. Inresponse to receiving the request, ACS 150 may determine whether thespecified principal 100 has sufficient access privileges to perform theaccess operation with respect to the specified resource 140 (block 804).For example, ACS 150 may attempt to determine whether there exists anACE 310 that corresponds to the specified principal 100 and resource 140and indicates one or more access types sufficient to perform thespecified access operation, as described above with respect to FIG. 5.

ACS 150 may then return an indication to the requesting client 110indicative of the results of its determination (block 806). For example,if ACS 150 determines that the specified principal 100 does not havesufficient privileges to perform the requested operation (e.g., based onfailing to find a satisfactory ACE 310), it may return an indication tothe client 110 that the principal 100 lacks sufficient privileges toperform the requested operation. If ACS 150 confirms that the principaldoes have sufficient privileges (e.g., based on identifying acorresponding, sufficient ACE 310), it may return a positive indicationthat the principal 100 is sufficiently privileged to perform therequested operation.

As mentioned previously with respect to client 110, interface 130 andresource 140, it is noted that in some embodiments, ACS 150 may denoteany suitable configuration of computer system(s) or portions of computersystems configured to implement the respective functionality of thesecomponents. An exemplary embodiment of such a computer system isdiscussed below in conjunction with the description of FIG. 18. However,in such embodiments, it is noted that the illustrated partitioning offunctionality need not map directly to a corresponding partitioning ofcomputer systems. For example, various combinations of interface 130,ACS 150 and/or resource 140 may be implemented by the same system.Alternatively, any of these components may be distributed forimplementation across several distinct systems.

Distributed Data Store System

In some embodiments, any of the web services architectures of FIGS.2A-C, or suitable variants thereof, may be extended to encompass largenumbers of principals 100 and resources 140. Additionally, componentssuch as interface 130 and ACS 150 may be duplicated at a number ofdifferent sites in order to provide accessibility and reliability ofservice to a widely distributed set of clients 110 and principals 100.As implementations of the architecture scale to meet the demand for webservices resources, a large amount of structured access controlinformation may be generated (e.g., in the form of ACEs 310 and othertypes of structured data, as described above). Moreover, a considerablevolume of processing requests to such data may be generated, as ACS 150works to verify the privileges of the many principals 100 on behalf ofwhich access requests to resources 140 may be submitted.

Moreover, the access control information managed by ACS 150 may becritical to the integrity and performance of the web servicesarchitecture as a whole. Should access control information be lost orcorrupted, for example due to device or communications failures, theservices provided by resources 140 could be disrupted on a massivescale, as it may become difficult or impossible to verify the accessprivileges of a given principal 100. Even transient, recoverablefailures in the availability of access control information may havenegative impacts on the performance of the architecture, for example ifa backlog of access requests accumulates pending verification by ACS150. Thus, the availability of a reliable and scalable data store 160for storing the large amounts of structured data managed by ACS 150 maybe critical to the successful deployment of the access control modeldescribed hereinabove, for at least some large-scale implementations.

In one embodiment, data store 160 may be configured to store structureddata records, such as ACEs 310 and the various other types of recordsand tables described above, in a distributed, replicated fashion among aplurality of independent storage hosts. One such embodiment of datastore 160 is illustrated in FIG. 9. In the illustrated embodiment, datastore 160 includes a number of instances of a data store manager 161 a-mand a number of storage hosts 163 a-n. Each of the data store managers161 is configured to communicate with any of the storage hosts 163.Additionally, each of the storage hosts 163 is configured to communicatewith a respective instance of a discovery and failure detection daemon(DFDD) 165. In various embodiments, different numbers of data storemanagers 161 and storage hosts 163 (or simply, managers 161 and hosts163) may be included within data store 160, and the number of managers161 may differ from the number of hosts 163.

Generally speaking, each of managers 161 may be configured to present astorage interface API. In some embodiments, this API may be configuredas a web services API accessible via a respective web services endpointcorresponding to each manager instance, while in other embodiments itmay be configured as a Java/HTTP interface, or may present multipledifferent types of interfaces for different types of clients. Clients ofdata store 160, such as ACS 150, may utilize the storage interface APIto provide structured data records to be stored and to supply requestsor queries through which such records may be selectively retrieved.Managers 161 may also be configured to coordinate features such as thepartitioning and replication of data records among hosts 163, asdescribed in detail below.

In some embodiments, each of managers 161 may correspond to any suitableconfiguration of one or more computer systems or portions of computersystems configured to implement the data store manager functionalitydescribed below. In some such embodiments, the computer system orsystems configured to implement a given instance of managers 161 mayalso be configured to implement other functionality, such as operatingsystem functionality or application functionality. In some embodiments,it is contemplated that multiple distinct instance of managers 161 maybe implemented by a single instance of a computer system.

Although data store 160 is shown as a single logical entity, in someembodiments, its components may be physically distributed acrossmultiple physical sites. For example, managers 161 and hosts 163 may bedistributed across a number of different data centers or computingfacilities located in different geographical areas. In some cases,certain instances of managers 161 and hosts 163 may be located withinthe same facilities as or may share hardware with other elements of theweb services architecture illustrated in FIGS. 2A-C. For example,systems configured to implement certain instances of managers 161 orhosts 163 may reside within the same facility as, and may sharecommunication resources with, systems configured to implement ACS 150,web services interface 130, or resources 140. In certain cases, the samesystem may be configured to implement all or portions of thefunctionality of any of these components in combination. In someembodiments, at least one instance of manager 161 and possibly some ofhosts 163 may be deployed within each installation where an instance ofACS 150 is deployed, or as close as is necessary to ensure theavailability of high-bandwidth communication paths between instances ofACS 150 and manager 161. For example, an instance of manager 161 may belocated within the same data center as an instance of ACS 150 in orderto improve the latency and throughput of communication between the two.

Generally speaking, data store 160 may be configured to store structureddata. In one embodiment, such data may include individual records thatmay include one or more fields, as well as tables that may include oneor more records. For example, an ACE 310 as described above maycorrespond to a structured data record that may be stored by data store160. Similarly, tables 300 and 600 described above may be examples oftables that may be stored by data store 160, as may any derivatives ofsuch tables that may be used by ACS 150. As previously described,structured data tables may be implemented in a relational fashion inwhich the interpretation of data fields is a function of position withinthe table, in a self-describing fashion in which a markup language orother technique may be employed to tag or annotate the meaning of datafields, or using any other suitable implementation. While previousexamples have discussed two-dimensional tables having any number of rowsand columns, it is noted that in some embodiments, tables stored by datastore 160 may have any number of dimensions. Also it is noted that whiledata store 160 may be configured to store tables relating to accesscontrol information on behalf of ACS 150, in some embodiments data store160 may be deployed independently of ACS 150 and configured to store anytype of structured data, regardless of whether such data is related toaccess control information of web services resources.

In some embodiments, each table stored by data store 160 may have aparticular field designated as the partition key. For example, when atable such as table 300 is created within data store 160, the entity onbehalf of which the table is created (e.g., ACS 150, a principal 100, orsome other entity) may specify a particular field, such as the resourceURI field 320, that is to be used as the partition key. The partitionkey may subsequently be used as the basis for partitioning the tableinto logical blocks, replicas of which may then be distributed amonghosts 163 for storage.

One embodiment of a method of partitioning a table for storage that maybe employed by data store 160 is illustrated in FIG. 10. Referringcollectively to FIGS. 9 and 10, operation begins in block 1000 where aninstance of manager 161 receives a request from a client to store astructured data record within a table. For example, such a request mayinclude receiving a request from a client, such as ACS 150, to store anACE 310 within an existing table 300, or another type of record withinanother existing table. In another case, such a request may includereceiving a request to generate a new table along with multiple recordsto be stored within the new table.

In some embodiments, each table stored by data store 160 may beassociated with a common name (e.g., “ResourceUsersTable”) that may bespecified by the principal 100 on behalf of which the table was created,as well as an access identifier associated with that principal 100(e.g., subject pool and principal ID). In some such embodiments, eachtable may correspond to a particular URL or URI that reflects accessidentifier and table common name information. For example, such a URLmay be formatted as follows:

http://tablestore.host.com/<accessID>/<tablename>

In some embodiments, the principal 100 associated with a table maycorrespond to an owner of a resource 140 with which the table isassociated.

In response to receiving the request, manager 161 may map the structureddata record to a block according to a partition key value of the recordand an identifier of the table (block 1002). In one embodiment, todetermine such a mapping, manager 161 may be configured to apply a hashfunction to the value of the partition key field of the record todetermine a hash value H. The hash function employed may be any suitablefunction configured to map an arbitrary-length data value to a fixedlength data value, such as a version of the Secure Hash Algorithm (e.g.,any member of the SHA family of hash functions, such as SHA-1, SHA-256,etc.), the MD5 algorithm, a cyclic redundancy check (CRC) algorithm, oranother suitable algorithm. For example, in the case where the record tobe stored is an instance of ACE 310 to be stored in table 300 having theresource URI field as its partition key field, the value of the resourceURI specified by the instance of ACE 310 may be hashed to determine thehash value H. In some embodiments, data store 160 may be configured tosupport a fixed maximum number of blocks N over which partitioning mayoccur. In such embodiments, the hash value may be determined modulo N.

The resulting hash value, modulo any applicable maximum number ofblocks, may be referred to as the partition number corresponding to therecord. In one embodiment, an identifier of the corresponding block maybe determined by combining the partition number with the identifier ofthe table. For example, if the table identifier corresponds to a URL orURI as described above, the block corresponding to a record may beidentified by appending the partition number to the table URI, using anyappropriate delimiters. In other embodiments, the block identifier maynot include the entire table URI, but may instead include the accessidentifier of the table owner and/or the common name of the table.

After the structure data record has been mapped to a block, manager 161may map the block to a subset of storage hosts 163 that includes atleast two hosts 163 (block 1004). In some embodiments, this mapping maybe performed with respect to a replication factor R that specifies thenumber of replicas of a block to be stored among hosts 163. As notedpreviously, hosts 163 may sometimes be distributed among a number ofdiscrete, geographically distributed data centers. In one embodiment, tomap the block to a subset of storage hosts 163, manager 161 may beconfigured to first map the block to a set of data centers, and then mapthe block to specific hosts 163 within the identified data centers. Forexample, for a block having a given identifier BID and a set of k datacenters having respective identifiers D1, . . . , Dk, manager 161 may beconfigured to determine a set of k hash values resulting from appendingor otherwise combining each data center identifier with the blockidentifier BID in turn, and computing the hash value for eachcombination. Manager 161 may then apply a selection criterion to the setof k hash values to select P data centers, where P corresponds to adesired level of replication among data centers. In various embodiments,the selection criterion may include selecting the P largest or smallesthash values, or selecting P hash values according to some otherattribute. (The parameters P and R may be default parameters specifiedby manager 161 for all tables managed by data store 160, or they may beparameters specified by an owner of a particular table for use with thattable.)

After selecting the data centers to which replicas of the block will bestored, manager 161 may be configured to map the block to specific hostswithin each data center. Such a mapping may be performed in a mannersimilar to data center selection described above. Specifically, in oneembodiment, for a given data center including i hosts 163 havingrespective identifiers H1, . . . , Hi, manager 161 may be configured todetermine a set of i hash values resulting from appending or otherwisecombining each host identifier with the block identifier BID in turn,and computing the hash value for each combination. Manager 161 may thenapply a selection criterion to the set of i hash values to select Qhosts 163. In some embodiments, if the total number of replicas R is tobe distributed evenly across the P data centers, Q may be determined asR/P, rounded to the nearest or next-highest integer. It is noted that insome embodiments, manager 161 may be configured to map the blockdirectly to R hosts 163 without regard for the distribution of theselected hosts 163 among data centers.

Once the block has been mapped to a subset of hosts 163, manager 163 mayattempt to store the structured data record to each host 163 within thesubset (block 1006). For example, manager 163 may invoke an APIpresented by each of hosts 163 to convey the record for storage. Upondetermining that the block has been successfully stored to at least twohosts 163 within the subset, manager 163 may return to the requestingclient an indication that the storage request is complete (block 1008).In some embodiments, manager 163 may be configured to wait indefinitelyfor writes to complete to a minimum number of hosts 163 (which may beother than two). In other embodiments, manager 163 may time out if theminimum number of block writes has not occurred after a particularlength of time.

It is noted that in some embodiments, the same mapping process asdescribed above with respect to blocks 1002-1004 for storing records toa table may be employed for table reads. That is, given a request toread records corresponding to some partition key value from a table, asimilar mapping process may be used to determine the blocks and hosts163 where the records may be found, if they exist.

As described in greater detail below with respect to the configurationand operation of hosts 163, mapping of tables to blocks may facilitatethe replication of blocks across hosts 163, thereby decreasing thelikelihood that the failure of certain ones of hosts 163 will result indata loss. Partitioning of a table into multiple blocks prior to mappingthe blocks to hosts 163 may also more evenly distribute the workloadassociated with maintaining the contents of the table. If a number oftables were to be stored in their entirety on respective hosts 163without block-level partitioning, certain hosts 163 may become saturatedwith access requests while others may remain relatively idle, dependingon how frequently their respective tables are accessed. By contrast, ifmore-frequently and less-frequently-accessed tables are distributedacross a set of hosts 163, there may be less variation in resourceutilization among those hosts 163, which may result in improved overallperformance of data store 160.

As described above, data store 160 may generally support the creationand storage of tables that include structured data records, the additionand removal of records to and from existing tables, and the retrieval ofrecords from tables. For example, in one embodiment the API of datastore 160 exposed via managers 161 may support the operationsCreateTable, DeleteTable, InsertRecord, DeleteRecord, ReadRecords, andListTables, or a similar set of operations.

In one embodiment, the CreateTable may take as parameters the name ofthe table to be created (e.g., the common name of the table and theaccess identifier of the corresponding principal 100), a schema definingthe structure of the table (e.g., describing the fields comprising arecord of the table) and an identifier of the particular record field tobe used as the partition key for the table. To implement the CreateTableoperation, a manager 161 may be configured to validate the providedschema, for example by parsing the schema to ensure that it issyntactically correct and verifying that the specified partition key isincluded in the schema.

In some embodiments, data store 160 may maintain an internal tableconfigured to store information about all of the tables stored by datastore 160 on behalf of clients. Each record of this User TableInformation table may correspond to a client-provided table and mayinclude such information as, for example, the identifier of the table,the table schema, the access identifier of the principal 100corresponding to the table. In some embodiments, the record may alsoinclude fields indicating whether the table is a dataview (describedbelow), the name of the dataview (if applicable), and/or whether thetable is flagged as having been deleted. As described below inconjunction with the description of hosts 163, the User TableInformation table may be several types of metadata managed by data store160. In some embodiments, a copy of each metadata table such as the UserTable Information table may be stored without partitioning to every host163. That is, each host 163 may store a complete copy of metadatatables, unlike client tables which may be partitioned as describedabove. In other embodiments, certain metadata tables may be partitionedwhile other may not.

In embodiments where a User Table Information table is implemented, inprocessing the CreateTable operation a manager 161 may be furtherconfigured to generate an appropriate record for the new table withinthe User Table Information table. Upon successful completion of theCreateTable operation, the manager 161 may be configured to return tothe requesting client a URI or another type of identifier uniquelycorresponding to the created table.

The DeleteTable operation, in one embodiment, may be configured to takeas a parameter the identifier of the table to be deleted. The identifiermay be specified as a URI or in any other suitable format thatunambiguously identifies the table. To implement the DeleteTableoperation, a manager 161 may be configured to identify those hosts 163to which the table is mapped (e.g., according to the block mappingprocedure described above) and to instruct those hosts 163 to deleterecords associated with the table. In some embodiments, the manager 161may also be configured to mark the specified table as deleted within acorresponding entry within the User Table Information table, or todelete the corresponding entry entirely.

The InsertRecord operation, in one embodiment, may be configured to takeas parameters the identifier of the table into which a record is to beinserted as well as the record data to insert. To implement theInsertRecord operation, a manager 161 may be configured to map therecord to a block and a set of hosts 163 according to the partition keyvalue of the record, for example as described above with respect to FIG.10.

In one embodiment, the DeleteRecord and ReadRecords operations may eachbe configured to take as parameters the identifier of a table, a valueof the primary key for the table, and a matching expression. Toimplement these operations, a manager 161 may be configured to map theprimary key value to a corresponding block and set of hosts 163, forexample according to the partitioning algorithm described above. For theDeleteRecord operation, manager 161 may then supply the matchingexpression to the each of the identified hosts 163, In some embodiments,to process the ReadRecords operation, manager 161 may arbitrarily orrandomly select one of the identified hosts 163 for reading, while inother embodiments manager 161 may convey the ReadRecords operation toseveral or all of the identified hosts 163 and accept the results fromthe first host 163 to respond.

For a given one of the identified hosts 163 that receives eitheroperation, if the given host 163 stores any records corresponding to theprimary key value that also satisfy the matching expression, it maydelete those records (in the case of the DeleteRecord operation) orreturn them to manager 161 to be returned to the requesting client (inthe case of the ReadRecords operation). Generally speaking, the matchingexpression may correspond to a search pattern or query formulated in anysuitable query language supported by hosts 163. For example, thematching expression may simply include a list of keywords to be matchedwithin a record. Alternatively, the matching expression may include acomplex query including operators, regular expressions, wildcardpatterns or other syntactic elements supported by a query language suchas, e.g., MySQL query language, XQuery language, or another suitablequery language. In some embodiments, if a ReadRecords operation fails tocomplete on the selected host 163, manager 161 may be configured toselect a different one of the hosts 163 corresponding to the mappedblock.

The ListTables operation, in one embodiment, may take as a parameter anaccess identifier corresponding to a principal 100. To implement theListTables operation, in one embodiment a manager 161 may be configuredto identify those tables stored within data store 160 for which theidentified principal 100 is the indicated creator or owner. For example,manager 161 may be configured to search the User Table Information tableusing the provided access identifier to identify any correspondingentries. If any matching entries are found, manager 161 may return theURIs of corresponding tables as indicated within the entries to therequesting entity as a result of the ListTables operation.

In some embodiments of data store 160 in which tables are partitionedaccording to the value of a partition key field, as described above, anoperation to query for and retrieve records that satisfy a matchingexpression (e.g., the ReadRecords operation) may require that a valuefor the partition key be specified as part of the query. That is,because the partition key field may be a primary determinant of how atable is distributed among hosts 163 and indexed within a host 163,retrieval of records may be dependent upon specifying a partition keyvalue. For example, if the resource URI field 320 is designated as thepartition key field of table 300, it may be possible to query for aparticular value of resource URI, or any combination of the resource URIfield and one or more of principal ID field 330, subject pool 340 and/oraccess type 350. However, with resource URI as the partition key, it maynot be possible to query table 300 for entries 310 for which principalID alone matches some value (i.e., in which the resource URI is notspecified).

In order to support queries on fields of a table other than thedesignated partition key, in one embodiment data store 160 may supportthe generation and maintenance of dataviews. Generally speaking, adataview of a table is itself a table that may store the same dataaccording to the same general schema as the table. However, the dataviewmay be partitioned according to a different field than the table fromwhich it is derived.

One example of a table and a corresponding dataview is illustrated inFIG. 11. In the illustrated embodiment, resource table 300 is shown tohave four records as entries, indexed in order according to the resourceURI field, which corresponds to the partition key for table 300. Asshown, dataview 300 a has the same data content as table 300. However,the records of dataview 300 a are indexed in order according to theprincipal ID field, which corresponds to the partition key for dataview300 a. Thus, while table 300 may be organized specifically for queriesinvolving the resource URI field, dataview 300 a may allow queriesinvolving the principal ID field, thus enabling a different perspectiveor view into the same data.

Generally speaking, for a table including structured data records havingN distinct fields, as many as N−1 dataviews may be defined correspondingto the table. In one embodiment, the data store API supported bymanagers 161 may include CreateDataview and DeleteDataview operations inaddition to the above-described operations for managing tables. In oneembodiment, the CreateDataview operation may take as parameters theidentifier of a table from which the dataview is to be derived, the nameto be associated with the generated dataview, and the partition key tobe used in generating the dataview. To implement the CreateDataviewoperation, a manager 161 may be configured to coordinate with hosts 163to retrieve the records corresponding to the specified table, topartition the records according to the specified partition key, and tostore the partitioned records to hosts 163 (e.g., as described abovewith respect to the InsertRecord operation). Manager 161 may also returnto the requesting client a unique identifier, such as a URI,corresponding to the generated dataview. In some embodiments, manager161 may also be configured to add an entry corresponding to the newdataview to the User Table Information table, indicating within theentry the identifier of the table from which the dataview is derived.

In one embodiment, the DeleteDataview operation may take as a parameterthe identifier of a dataview to be deleted. The DeleteDataview operationmay be implemented by managers 161 in a manner similar to theDeleteTable operation described above. In some embodiments, if a tablehas corresponding dataviews, performing the DeleteTable operation on thetable may result in deletion of all corresponding dataviews.

Generally speaking, dataviews of a table may be partitioned and storedamong hosts 163 in the same manner as any other table. However, in someembodiments the contents of dataviews may not be updated directly bymanagers 161. Instead, as described in greater detail below, hosts 163may be configured to coordinate among themselves to update dataviews ofa given table in response to a manager 161 updating the state of thegiven table.

Although one embodiment of data store 160 and its constituent componentshas been described as a repository for web services resource accesscontrol information, data store 160 is not limited to use in suchcontexts. It is contemplated that in some embodiments, data store 160may itself be configured as a web services resource configured to storestructured data records in a distributed, replicated fashion and toretrieve such records in response to queries. For example, in oneembodiment the above-described storage API exposed by managers 161 maybe configured as a web services API, and managers 161 may correspond toaddressable web services endpoints with which clients (e.g., clients110) may interact to store and retrieve structured data records.

Storage Host Configuration

In some embodiments, each storage host 163 may be implemented as adistinct system configured to perform a variety of tasks related tostorage and retrieval of structured data records, as well as replicasynchronization and failure recovery. One embodiment illustrating aparticular configuration of a storage host 163 is shown in FIG. 12. Inthe illustrated embodiment, storage host 163 includes a storage hostcontroller 510, configured to implement various aspects of hostmanagement and operation, and a database 590 configured to storestructured data records (e.g., as blocks of table data) as well asrelevant metadata.

It is noted that in some embodiments, storage host 163 may denote one ormore computer systems configured to implement the various illustratedfunctional components of host 163, such as the computer systemillustrated in FIG. 18. For example, any of the illustrated componentsmay be implemented directly or indirectly via instructions stored on acomputer-accessible medium and executable by a processor to perform thetasks of the component. In some embodiments, the various elements ofstorage host 163 may be partitioned in any suitable way across multipledistinct computer systems. It is also contemplated that in someembodiments, the system(s) configured to implement the illustratedcomponents of host 163 may also implement other components not shown.Additionally, in some embodiments, the illustrated components may beimplemented as corresponding software modules, such as modules coded inJava or another suitable language. However, in other embodiments it iscontemplated that the illustrated components may be partitioned into adifferent arrangement of software modules. For example, illustratedcomponents may be partially or completely combined or divided in waysother than those illustrated.

Storage host controller 510 (or simply, controller 510) may implement avariety of distinct functions or modules variously configured tocommunicate with one another. In the illustrated embodiment, controller510 includes a node communication manager 515, which may be configuredto receive information from a heartbeat manager 520 and to communicatewith a replica state monitor 530, which in turn may communicate with are-replication engine 540. Both re-replication engine 540 and a writequeue processor 560 may be configured to communicate with a task threadpool 550. Write queue processor 560 may be configured to communicatewith a dataview updater 570 and a replica synchronization manager 580 aswell as with database 590.

Node communication manager 515 may generally be configured to managevarious types of data communications between storage host 163 and otherentities, such as data store managers 161, DFDD 165, and other hosts163. In various embodiments, node communication manager 515 may exposeaspects of the storage host 163 API via suitable synchronous orasynchronous protocols. For example, manager 515 may implementHTTP-based messaging protocols for communication of host statusinformation with other nodes and/or DFDD 165. In some embodiments, nodecommunication manager 515 may implement a JDBC endpoint configured forreceiving and processing data operations received from managers 161,such as data queries and requests to store data, for example. In otherembodiments, node communication manager 515 may implement one or moreweb services endpoints through which the various functions supported byhost 163 may be invoked. Manager 515 may implement any suitablecombination of these or other types of communication techniques orprotocols.

Generally speaking, heartbeat manager 520 may be configured to monitorand report the overall operational health of host 163. In theillustrated embodiment, heartbeat manager 520 may be configured toperiodically attempt to perform a data query on test table 593 storedwithin database 590. If the query succeeds, heartbeat manager 520 maygenerate a heartbeat message to be conveyed to the DFDD instance 165associated with host 163 (e.g., via node communication manager 515). Asdescribed below, DFDD 165 may be configured to determine whether a givenhost 163 has become inoperative dependent upon whether heartbeatmessages expected from the given host 163 have actually been received.

In the illustrated embodiment, replica state monitor 530 may beconfigured to listen for operational state change messages of otherhosts 163 that may be collectively detected and communicated throughoutdata store 160 by instances of DFDD 165. For example, if another host163 transitions to a failed state, the state change may be published byDFDD 165 and detected by replica state monitor 530. In response, replicastate monitor 530 may be configured to work in concert withre-replication engine 540 to generate additional replicas as needed onone or more other hosts 163 of blocks of structured data records storedby database 590, in order to ensure that a minimum level of replicationof blocks is preserved despite the host failure. Failure detection andre-replication are discussed in greater detail in a subsequent section.

Host 163 may receive many different types of data processing requestsfrom different sources for concurrent processing. For example, host 163may receive numerous requests to read and write records from managers161 on behalf of clients of data store 160. Additionally, host 163 mayreceive requests to read or write records from other hosts 163 in orderto synchronize tables, update dataviews, or re-replicate blocks. In oneembodiment, each such request to access data stored in database 590 orthat requires the action of another component of host 163 may beassigned to a thread for processing, and task thread pool 550 may beconfigured to coordinate and manage the processing of outstandingthreads. For example, task thread pool 550 may be configured toprioritize and schedule thread execution, to perform resource levelingto ensure that more resource-intensive threads do not starve otherthreads, and/or to perform any other tasks necessary or useful formanaging the workflow of host 163.

As described in greater detail below in conjunction with the generaldescription of storage host write operation, when requests to storerecord data are received by host 163, in the illustrated embodiment therequests may be written into write queue 599 for eventual commitment toan appropriate table within database 590. In one embodiment, write queueprocessor 560 may be configured to actively manage the process ofcompleting write activity. For example, write queue processor 560 may beconfigured to monitor write queue 599 and to attempt to drive pendingwrite operations to completion (e.g., to drain the queue). If a tablethat is the object of a record write or delete operation hascorresponding dataviews, write queue processor 560 may coordinate withdataview updater 570 to generate the appropriate write operations neededto update the dataviews and to communicate those operations to the hosts163 to which the dataviews are mapped. Additionally, when a writeoperation to a block of a table stored by host 163 is processed, writequeue processor 560 may coordinate with replica sync manager 580 togenerate appropriate write operations to ensure that replicas of themodified block mapped to other hosts 163 are also updated, so that thereplicas may be synchronized with respect to the write activity. It isnoted that although write queue 599 may be implemented as a datastructure within database 590 as shown in FIG. 12, in other embodimentswrite queue 599 may be implemented separately from database 590 within ahost 163. For example, write queue 599 may be implemented within aregion of a system memory, where the region is managed by write queueprocessor 560.

Database 590 may correspond to any suitable type of database configuredto store tables including structured data records. In one embodiment,database 590 may be implemented as a MySQL database, although any otheropen-source or commercial database product may be employed. In variousembodiments, database 590 may be configured to store structured data asrelational tables, as self-describing data records (e.g., XML records),or in any other appropriate format. In some instances, when storing arecord having a particular structure or schema, database 590 mayinternally transform or remap the record into a differentrepresentation, while preserving the integrity of the data relationshipsdefined by the schema. For example, to optimize query performance,database 590 may be configured to construct indexes of stored records bysorting, hashing, or recoding various records or fields of records.

In addition to the write queue table 599 mentioned above, in theillustrated embodiment database 590 may be configured to store localmetadata tables 591, a test table 593, a block host table 595, and usertables 597. In the illustrated embodiment, user tables 597 may beconfigured to store the structured data records of the tables defined byclients of data store 160, as mapped to blocks and hosts 163 by managers161. As described above, test table 593 may include one or more recordsstoring test data that may be periodically queried by heartbeat manager520 to assess the operational status of database 590 and host 163. Insome embodiments, test table 593 may not be visible to entities externalto host 163.

In one embodiment, local metadata tables 591 may be configured to storeone or more tables including various types of metadata about the usertables 597 stored on host 163, as well as other information about host163. For example, in embodiments where the User Table Information tabledescribed above is not partitioned among multiple hosts 163, localmetadata tables 591 may store a copy of this table. Local metadatatables 591 may also include one or more of a Local Blocks table and aLocal Host Information table. In one embodiment, the Local Blocks tablemay include records identifying all of the blocks stored by host 163.These records may identify blocks by their global identifiers, asdetermined by a partitioning and mapping process such as described abovewith respect to managers 161. In some embodiments, host 163 mayadditionally identify locally stored blocks using a locally-definedidentifier, such as a running index incremented each time a new block isstored. If a local block identifier is supported, the associationbetween local identifiers and corresponding global identifiers may bereflected in the records stored by the Local Blocks table.

The Local Host Information table may, in one embodiment, be configuredto store identifying and/or configuration data about host 163. Forexample, the Local Host Information table may be configured to store aglobally unique identifier corresponding to host 163, such as a URI orstring. Configuration information that may be stored by the Local HostInformation table may include information about versions of softwareand/or hardware comprising host 163, host resource capacity information(e.g., total storage, memory and/or processing capacity implemented byhost 163), host resource utilization information (e.g., resourceutilization statistics over time), or any other suitable configurationinformation.

In one embodiment, block host table 595 may be configured to storerecords identifying, for a given block of records stored by host 163,the other hosts 163 within data store 160 that store replicas of thegiven block. For example, block host table 595 may store recordsincluding a local or global identifier of a block as well as the globalidentifiers of each host 163 to which the block has been mapped forstorage. In some embodiments, when storing a record to a blockreplicated by several hosts 163, manager 161 may be configured to conveyto each of the several hosts 163 a list including identifyinginformation of each host 163.

As described above with respect to FIG. 10, to implement an operation tostore a structured data record within data store 160, in one embodimenta manager 161 may be configured to map the record to a block and map theresulting block to a group of hosts 163. Manager 161 may then beconfigured to issue a request to write the record to each of the groupof hosts 163. One embodiment of a method of operation of a host 163 tostore a structured data record is illustrated in FIG. 13.

Referring collectively to FIGS. 12 and 13, operation begins in block1300 where a host 163 receives a write request from a manager 161, forexample via a web services or other type of communication API presentedby node communication manager 515. In one embodiment, the received writerequest may include a number of fields or parameters, including a recordidentifier, a timestamp value, a table identifier, a block identifier, alist of hosts to which the write request has been conveyed, and theactual record data to be stored, although it is contemplated that inother embodiments, the write request may include more, fewer ordifferent parameters.

The record identifier may correspond to a unique or probabilisticallyunique identifier of the record to be written, such as a hash value ofsome or all of the fields of the record, which may be determined bymanager 161 according to a suitable hash algorithm. The timestamp valuemay be assigned to the write request by manager 161 and may reflect thetime at which the corresponding write operation was received by manager161, or any other point in time during the processing of the writeoperation. In one embodiment, for a given operation to store astructured data record to multiple hosts 163, the same timestamp valuemay be consistently assigned to each write request conveyed to themultiple hosts 163. Such consistency may enable the hosts 163 toproperly coordinate and synchronize their record updates.

The table identifier included in the write request may correspond to theidentifier originally provided to manager 161 to identify the table inwhich the structured data record should be stored. As described above,the table identifier may include a URI or other data sufficient touniquely identify the table to be written, such as an access identifierof the table owner, for example. The block identifier and list of hosts163 may correspond to the results of the block and host mapping processdescribed above with respect to FIG. 10. For example, block and hostidentifiers may be formatted as URIs or as other types of unambiguousidentifiers.

Once host 163 receives a write request, the request may be stored withinwrite queue 599 (block 1302). For example, after being received via nodecommunication manager 515, a thread may be assigned to the write requestand the request may be inserted within write queue 599. In someembodiments, once the write request is stored within write queue 599,the write request may be reported to the requesting manager 161 ascomplete, even though the request may not have been fully committed to(e.g., persistently stored within) the corresponding user tables 597. Insuch embodiments, reporting completion of write requests prior to fullcommitment of those writes may improve the processing latency of writerequests. For example, if a client requests a write of a structured datarecord blocks or stalls until the write is complete, earlier completionmay result in earlier resumption of the client's activity. In some suchembodiments, however, write requests may not be immediately visible tosubsequent read requests.

Subsequently, the storage host controller 510 may examine write queue599 and store the pending write request to the appropriate one(s) ofuser tables 597 (block 1304). For example, write queue processor 560 maybe configured to periodically poll write queue 599 and transfer pendingwrite requests to their targeted tables. Additionally, the storage hostcontroller 510 may attempt to update any dataviews affected by the writerequest (block 1306). For example, write queue processor 560 maycoordinate with dataview updater 570 to determine whether the tabletargeted by the write request has any dataviews, and if so, to generateadditional write requests to update those dataviews. The additionalwrite requests may then be conveyed to the hosts 163 associated with thedataview block to be updated, for example as indicated by block hosttable 595.

The storage host controller 510 may monitor any pending dataview updatesto determine whether all dataview updates have successfully completed(block 1308). For example, write queue processor 560 may be configuredto wait for an indication of success from each of the hosts 163 to whichadditional write requests to update dataviews were conveyed. If anypending dataview update is not yet completed, the original write requestis left within write queue 599 and the pending dataview update isretried at a later time (block 1310). If all pending dataview updateshave completed, the storage host controller 510 may remove the writerequest from write queue 599 and report successful completion of therequest to the requestor (block 1312).

In some embodiments, host 163 may limit the number of attempts made toupdate a dataview, for example by timing out after a certain number ofattempts have been made or a certain period of time has elapsed sincethe first attempt. If the limit is exceeded, in one embodiment host 163may report a failure of the original write request and, in some cases,may attempt to reverse the status of any completed writes to user tables597 that resulted from the original write request. In anotherembodiment, host 163 may be configured to initiate re-replication of thedataview to one or more other hosts 163, as described in greater detailbelow.

When writing a structured data record within database 590, in someembodiments host 163 may be configured to augment the data record withadditional fields configured to store metadata associated with the datarecord. In one embodiment, each record stored by a host 163 may beaugmented with a record identifier, a delete flag, and a timestampvalue. For example, as illustrated in FIG. 14, records of table 300 ofFIG. 11 may be augmented with fields including a record identifier field360, a delete flag field 370, and a timestamp field 380. In oneembodiment, when storing a record in response to a write request from amanager 161, host 163 may be configured to insert a record identifiersupplied by the manager 161 (e.g., a hash value of the record or aparticular field of the record) within the record identifier field. Insome embodiments, host 163 may be configured to use the recordidentifier field to sort, organize or access records within database590. Like the record identifier, in one embodiment the timestamp fieldstored within a record may be derived from a timestamp value provided bymanager 161 within the record write request.

In some embodiments, when an existing structured data record stored byhost 163 is updated (e.g., as a result of a write request) or deleted,the existing record may not be updated or deleted. Instead, in the caseof an update, host 163 may generate and store a new copy of the recordreflecting the update. In cases where the record identifier of theexisting record is the same as that of the updated record, the timestampvalue may be used to distinguish the copies. For example, host 163 maybe configured to select the record having the most recent timestamp whenperforming a query operation that matches multiple versions of a record.In the case of a delete operation performed on a record, host 163 may beconfigured to assert the delete flag field of the record, otherwiseleaving the record intact. In such an embodiment, host 163 may beconfigured to ignore records with asserted delete flag fields whenperforming queries or other operations on records.

Retaining old records following update or delete operations may simplifysynchronization operations when hosts 163 become divergent in the stateof their stored records. For example, it may be possible for hosts 163to collectively reverse the effects of a series of update or deleteoperations on a record in order to restore that record to a consistentstate. In some embodiments, hosts 163 may be configured to permanentlyremove old versions of records and/or deleted records and reclaimassociated storage at various intervals. For example, hosts 163 maypurge old or deleted records after a certain period of time elapsessince the timestamp of the record, or in the case of updated recordsafter a certain number of subsequent updates have occurred.

One example of a table stored by a host 163 that includes previousversions of records and deleted records is illustrated in FIG. 15. Inthe illustrated embodiment of table 300, three records are showncorresponding to the resource ID “URI C.” Collectively, these threerecords illustrate an original version of the record as well as theeffects of two update operations to that record. At timestamp 265983,the original version of the record reflected a principal ID of “James,”a subject pool of “Customer” and an access type of “Read.” At timestamp329649, the record was updated to reflect a change in the principal IDto “John.” At timestamp 610273, the record was updated to reflect achange in the access type to “Write.” This record denotes the mostcurrent version of the record. Also in the illustrated embodiment, tworecords are shown corresponding to the resource ID “URI E.” At timestamp3920, the record reflected a principal ID of “Frank,” a subject pool of“Customer,” an access type of “Read” and a deasserted delete flag field.At timestamp 11520, the record was deleted, and its delete flag fieldwas asserted.

Data Replication, Synchronization and Fault Recovery

As described above, in one embodiment of data store 160, the structureddata records included in tables may be partitioned among blocks that mayin turn be replicated across hosts 163 in a distributed fashion. Storingmultiple replicas of the structured data records may generally increasedata reliability and availability, as the likelihood of concurrentfailure of all replicas may be relatively small. In some circumstances,distributing replicated table data may also increase the performance ofclients that store and retrieve that data. For example, if replicas aredistributed among hosts 163 in different data centers or geographiclocations, the distance between a given client and the closest replicaof desired data may be less than if the replicas were not distributed.In some circumstances, decreased distance may result in a higherbandwidth or lower latency communication path between the client and ahost 163, which may result in faster access to structured data records.

In a distributed, replicated system such as data store 160, variouscircumstances may cause replicas of data to have divergent orinconsistent values. A manager 161 may initiate write requests to updatea block stored on a number of different hosts 163, but some of the writerequests may fail to complete, for example, because of transient orpermanent failures in communication between the manager 161 and one ormore hosts 163, or failure on the part of a host 163 itself. Independentof write request activity, one or more hosts 163 may failcatastrophically, due to hardware or infrastructure failure, forexample. Any of these or other scenarios may result in inconsistenciesamong data replicas.

In one embodiment, hosts 163 may be configured to exchangesynchronization information with one another to synchronize the state ofblocks replicated among the hosts. One embodiment of a method ofoperation of such a synchronization procedure is illustrated in FIGS.16A-B. Referring first to FIG. 16A, operation begins in block 1600 whena given host 163 initiates the synchronization process. For example,hosts 163 may be configured to execute the process at periodicintervals, in response to receiving write request activity, or inresponse to other triggers.

Once the process is initiated, host 163 may determine a reference time Tfor performing synchronization (block 1602). For example, replica syncmanager 580 may be configured to determine the current time as of theinitiation of synchronization. The reference time may be formatted inthe same manner as the timestamps reflected in the structured datarecords stored by database 590.

Host 163 may then identify all of the blocks stored on the host as ofthe reference time T (block 1604). For example, replica sync manager 580may be configured to query the Local Blocks table stored within localmetadata tables 591 to identify the blocks stored by host 163.

For each identified block, host 163 may calculate a respectivecheckpoint of the block as of reference time T (block 1606). Forexample, replica sync manager 580 may be configured to compute a hashvalue for each block, taking into account each of the structured datarecords stored within the block (e.g., by concatenating the records andcomputing a hash value of the concatenation). Any suitable hashalgorithm may be employed, such as any suitable length version of theSecure Hash Algorithm, for example. The checkpoint of a block mayinclude the hash value of the block taken together with the referencetime T. In some embodiments, the checkpoint may also include anindication of the number of records included in the block and a globalidentifier corresponding to the block. For example, the checkpoint maybe implemented as a structured data record having various fields thatcorrespond to the different information components of the checkpoint.

For each identified block, host 163 may determine the set of other hosts163 that store a replica of the block (block 1608). For example, replicasync manager 580 may be configured to query block host table 595 using alocal identifier of a given block to identify other hosts 163corresponding to the block. Host 163 may then convey the checkpoint foreach block to each host 163 that stores a replica of the block (block1610). For example, replica sync manager 580 may coordinate with nodecommunication manager 515 to convey messages including the checkpoint toother hosts 163.

One embodiment of a method of processing a received checkpoint isillustrated in FIG. 16B. In the illustrated embodiment, operation beginsin block 1620 where a checkpoint is received by a host 163 from anotherhost. The receiving host 163 may then compute its own local checkpointfor its replica of the identified block (block 1622). In one embodiment,replica sync manager 580 may be configured to compute a hash value ofthe identified block in the same manner as described above with respectto FIG. 16A. However, in one embodiment, the hash value may take intoaccount only those records having a corresponding timestamp that is notlater than the reference timestamp T, as indicated in the receivedcheckpoint. For example, replica sync manager 580 may be configured todisregard those records with timestamps greater than T. In someembodiments, restricting synchronization relative to a referencetimestamp may decrease pathological execution behavior such as thrashingor oscillating among hosts 163, particularly in dynamic contexts whererecord data changes frequently.

If the hash value determined by the receiving host 163 matches the hashvalue in the received checkpoint, no action may be taken (blocks1624-1626). In this instance, the block in question may already besynchronized with respect to both hosts as of the reference timestamp T.If the hash values differ, the receiving host 163 may determine whetherit has a greater number of records for the block than the host 163 thatsent the checkpoint, as indicated in the received checkpoint (block1628). If so, the receiving host 163 may send the entire contents of itsreplica of the identified block to the host 163 that sent the checkpoint(block 1630). In this instance, the replicas may be out ofsynchronization and the receiving host 163 may have a more currentversion of the block, as indicated by the record count. Thus, thereceiving host 163 may send its version of the block to the initiatinghost 163, which may replace its version with the more current version.

If the receiving host 163 does not have a greater number of records forthe block than the initiating host 163, the receiving host may conveyits checkpoint, reflecting its number of records for the block, back tothe initiating host 163 (block 1632). In one embodiment, this may resultin the initiating host 163 and the receiving host 163 swapping roleswith respect to execution of the illustrated method. It is noted that insome embodiments, a host 163 may perform the methods of FIGS. 16A-Bconcurrently, for example with respect to different blocks of records.

The synchronization process just described, or a suitable variant, mayin many cases be sufficient to reconcile the variations in block statethat may arise due to varying latency in communication of write requestsamong hosts 163, transient failures resulting in missed or dropped writerequests, or similar issues. However, in some circumstances a host 163may become completely unresponsive for a significant length of time, andit may be necessary to generate additional replicas of the record datastored by the failed host.

In one embodiment, instances of DFDD 165 may collectively operate totrack the operating state information of each of the hosts 163 withindata store 160. As shown in FIG. 9, an instance of DFDD 165 may beprovisioned for each host 163, although in other embodiments a singleDFDD 165 instance may be configured to monitor the state of more thanone host 163.

In some embodiments, DFDD 165 may maintain global state information forindividual hosts 163 that may indicate in general terms whether a givenhost 163 is operating normally or is in an abnormal state. As describedabove, the heartbeat manager 520 of a given host 163 may be configuredto report the operational status of the host to DFDD 165 by conveying aheartbeat message, or simply “heartbeat.” Such reports may often (butnot necessarily) be generated at regular intervals such as some numberof seconds or minutes. Heartbeat reports may be communicated accordingto any suitable protocol (e.g., as TCP/IP messages, as web servicescalls, or according to other standard or proprietary messagingprotocols) and may vary in information content. In one embodiment, theheartbeat may simply include an indication of the unique identifiercorresponding to the given host 163 and possibly a timestamp, while inother embodiments the heartbeat message may include more comprehensivestatus information, such as performance or resource utilizationstatistics, for example.

Generally speaking, if a host 163 is sending heartbeats to DFDD 165 asexpected, there is a reasonable expectation that the host is operatingnormally. If heartbeats should be interrupted for some length of time,there is a reasonable expectation that something is wrong with the host.FIG. 17 illustrates one embodiment of a global state machine that may bemaintained by DFDD 165 for each host 163 as a function of heartbeatactivity and/or other parameters. In the illustrated embodiment, a host163 from which heartbeats are being received regularly is designated asbeing in the ACTIVE state. A host 163 may remain in the ACTIVE state aslong as the time elapsed since the instance's last heartbeat to DFDD 165is less than a failure threshold T_(fail). For example, DFDD 165 maymaintain a counter for each host 163 that it monitors, and may incrementa particular counter upon each heartbeat received from the correspondinghost 163. DFDD 165 may monitor each counter (e.g., with countdowntimers) to ascertain whether its value changes before T_(fail) elapses.

If time T_(fail) has elapsed since the last heartbeat for a host 163,its global state may transition to INCOMMUNICADO. In the illustratedembodiment, INCOMMUNICADO may function as a transient state indicativethat something may be wrong with the host, but it has not beendefinitively determined to have permanently failed. For example, thehost 163 may have temporarily stalled or hung, the heartbeat message toDFDD 165 may have gotten delayed or lost, or one instance of DFDD 165may be out of synchronization with another instance of DFDD 165 withrespect to the current state of the host. If a heartbeat is receivedfrom a host 163 in the INCOMMUNICADO state, the host may transition backto the ACTIVE state.

If a host 163 does not spontaneously recover from the INCOMMUNICADOstate, there may be a more serious problem affecting the instance. Inthe illustrated embodiment, a host 163 that is determined to havepermanently failed may transition to the DEAD state. In someembodiments, this transition may be initiated upon the intervention ofan administrator or other agent, for example based on the outcome of aneffort to diagnose the problem with the host. In other embodiments, DFDD165 may be configured to perform this transition automatically, forexample based on heuristics or other decision criteria such as thelength of time the host 163 has been in the INCOMMUNICADO state, effortsto contact other nearby hosts, or other suitable criteria. In theillustrated embodiment, once a host 163 enters the DEAD state, it cannotrecover. If the host 163 is to be redeployed after being diagnosed andrepaired, it may be initialized and introduced to data store 160 as anew host that contains no data.

When an instance of DFDD 165 detects a change in state associated with ahost 163, it may operate to propagate the state change to otherinstances of DFDD 165. In one embodiment, DFDD 165 may employ abroadcast protocol to broadcast host state changes to all other DFDDinstances. For example, each instance of DFDD 165 may correspond to awell-known HTTP port at a network address of a corresponding host 163,such that a DFDD instance 165 may simply broadcast host state changes toall known hosts at the well-known port. In other embodiments, differentprotocols may be employed to propagate and reconcile host stateinformation among instances of DFDD 165. For example, gossip-basedprotocols may be employed, in which one DFDD instance selects one ormore other instances at random with which to exchange host stateinformation. Provided DFDD instances perform the gossip-based protocolrelatively frequently, the overall host state reflected by all of theDFDD instances may remain highly consistent without the communicationoverhead associated with a broadcast protocol.

An instance of DFDD 165 that detects a state change may also operate tocommunicate the state change to one or more hosts 163, such as the hoststhat instance is configured to monitor. In some embodiments, a host 163may receive notification of any state change that occurs with respect toany other host 163, while in other embodiments DFDD 165 may support apublish/subscribe or other selective notification model through which ahost 163 may request to receive state change notifications only for aspecified set of other hosts 163.

The replica state monitor 530 of each host 163 may generally beconfigured to monitor for host state changes received from DFDD 165. Inone embodiment, if replica state monitor 530 of a given host 163 detectsthat another, recovered host 163 has transitioned from INCOMMUNICADO toACTIVE, re-replication engine 540 may responsively be configured toconvey to the recovered host 163 copies of those blocks of records thatare replicated by both hosts 163. For example, re-replication engine 540may be configured to query block host table 595 to determine which, ifany blocks stored by the given host 163 are also stored by the recoveredhost 163. Since the recovered host 163 may not reflect any changes tothese blocks made while the recovered host 163 was in the INCOMMUNICADOstate, the given host's version of these blocks may be more current thanthe recovered host's, and may therefore be suitable for resynchronizingthe recovered host.

Similar re-replication may occur in the event a host 163 permanentlyfails. In one embodiment, if replica state monitor 530 of a given host163 detects that another, failed host 163 has transitioned fromINCOMMUNICADO to DEAD, re-replication engine 540 may responsively beconfigured to identify those blocks of the given host 163 that had beenreplicated by the failed host 163. Re-replication engine 163 may then beconfigured to select a new host 163 to store the replicas previouslystored by the failed host 163. For example, re-replication engine 163may be configured to perform a version of the block-to-host mappingalgorithm described above with respect to FIG. 10, with the modificationthat the failed host 163 may be excluded from the set of hosts 163 towhich blocks may be mapped. Once a new host 163 has been selected,re-replication engine 163 may be configured to generate replicas of theidentified blocks to the new host 163.

As noted above, when a given host 163 transitions from a temporarilyfailed operating state to a normal operating state or a permanentlyfailed operating state, blocks stored by the given host 163 may besynchronized with respect to other hosts 163 or re-replicated on otherhosts 163, as appropriate. Such re-replication may happenunconditionally in response to a state transition, where replicas aredirectly conveyed to the given host 163 or a different host 163.However, in other embodiments re-replication may occur as a special caseof a synchronization process employed among hosts 163, such as theprocess described above with respect to FIGS. 16A-B. For example, inresponse to detecting that a given host 163 has recovered to a normaloperating state, other hosts 163 may initiate synchronization with thegiven host 163 by conveying checkpoints to the given host 163 for thoseblocks replicated by the given host 163. Through the operation of thesynchronization protocol, differences between the given host 163 andother hosts 163 may be reconciled.

Similarly, if a given host 163 permanently fails, blocks that werereplicated by the given host 163 may be remapped to other hosts 163, forexample through hosts 163 or manager 161 executing the block mappingprocedure described above with respect to FIG. 10. When one or more newhosts 163 have been identified, other hosts 163 may initiatesynchronization with the new host(s) 163 with respect to the blocks tobe replicated, for example by conveying block checkpoints in a mannersimilar to that described above. Generally speaking, synchronizingblocks among hosts may encompass execution of a checkpoint-basedsynchronization procedure as described above, unconditional forwardingof a replica from one host to another host, or any other suitablesynchronization procedure.

As described above with respect to FIG. 10, in one embodiment themapping of blocks to hosts 163 may depend on the available set of hosts163 across which blocks may be mapped. For example, depending on thebehavior of the hash function that may be used to map blocks to hosts163, adding or deleting hosts 163 from the set of hosts 163 used in themapping process may result in a given block being mapped to asubstantially different subset of hosts 163 than prior to the adding ordeleting. In some embodiments, hosts 163 and/or managers 161 may beconfigured to remap some or all blocks to hosts 163 subsequent to a host163 being added to or deleted from data store 160. For example, amanager 161 may be configured to read existing blocks and then storethem again, applying the method of FIG. 10 with respect to the newlyconfigured set of hosts 163. Such remapping may result in redistributionof blocks among hosts 163. In some embodiments, such remapping may occurin response to a change in composition of hosts 163 (e.g., in responseto a state change of a host 163), while in other embodiments, suchremapping may occur at intervals of time or in response to some otherevent.

It is noted that in some embodiments, the illustrated instances of DFDD165 may correspond to one or more systems configured to implement theabove-described functionality. In other embodiments, DFDD 165 may beimplemented as a software module or process executable on a system thatimplements other functionality. DFDD instances may typically be deployedon systems that are independent of the hosts 163 the instances areconfigured to monitor. However, in some embodiments it is contemplatedthat an instance of DFDD 165 may be implemented by a host 163 other thanthe host(s) the instance is configured to monitor. Additionally, in someembodiments more sophisticated instances of DFDD 165 may be configuredto perform monitoring and state notification within complex distributedsystems that may include the functionality of data store 160 as well asother functionality. Examples of such embodiments are described in U.S.Provisional Patent Application No. 60/754,726, entitled “DistributedStorage System With Web Services Client Interface” and filed on Dec. 29,2005, which is hereby incorporated by reference in its entirety. It isnoted that in some embodiments, the methods and techniques for managingaccess control information and storing structured data records asdescribed herein may be used in conjunction with the methods andtechniques described in the incorporated reference.

Exemplary Computer System Embodiment

It is contemplated that in some embodiments, any of the methods ortechniques described above may be implemented as program instructionsand data capable of being stored or conveyed via a computer-accessiblemedium. Such methods or techniques may include, for example and withoutlimitation, the functions of web services client 110, web servicesinterface 130, web services resources 140, access control service 150,data store manager 161, DFDD 165, and any of the elements of storagehost 163, as well as the methods illustrated in FIGS. 4, 5, 8, 10, 13,16A, 16B or any suitable variations or portions thereof. Such programinstructions may also be executed to perform computational functions insupport of the methods and techniques described above, for example toinstantiate operating system functionality, application functionality,and/or any other suitable functions.

One exemplary embodiment of a computer system includingcomputer-accessible media is illustrated in FIG. 18. In the illustratedembodiment, computer system 1800 includes one or more processors 1810coupled to a system memory 1820 via an input/output (I/O) interface1830. Computer system 1800 further includes a network interface 1840coupled to I/O interface 1830. In some embodiments, it is contemplatedthat inventory management system 50 may be implemented using a singleinstance of computer system 1800, while in other embodiments multiplesuch systems may be configured to host different portions or instancesof inventory management system 50. For example, in one embodiment somedata sources or services (e.g., purchasing management services) may beimplemented via instances of computer system 1800 that are distinct fromthose instances implementing other data sources or services (e.g., orderentry/fulfillment services). It is noted that in some embodiments, thefunctions of inventory management system 50 as variously describedhereinabove may be partitioned in any suitable fashion into a number ofdistinct modules, procedures or other functional portions. The resultingportions of inventory management system 50 may then be implemented as aunified or distributed system among one or several instances of computersystem 1800, for example as instructions executable by one or more ofprocessors 1810.

In various embodiments computer system 1800 may be a uniprocessor systemincluding one processor 1810, or a multiprocessor system includingseveral processors 1810 (e.g., two, four, eight, or another suitablenumber). Processors 1810 may be any suitable processor capable ofexecuting instructions. For example, in various embodiments processors1810 may be a general-purpose or embedded processor implementing any ofa variety of instruction set architectures (ISAs), such as the x86,PowerPC, SPARC, or MIPS ISAs, or any other suitable ISA. Inmultiprocessor systems, each of processors 1810 may commonly, but notnecessarily, implement the same ISA.

System memory 1820 may be configured to store instructions and dataaccessible by process 1810. In various embodiments, system memory 1820may be implemented using any suitable memory technology, such as staticrandom access memory (SRAM), synchronous dynamic RAM (SDRAM),nonvolatile/Flash-type memory, or any other type of memory. In theillustrated embodiment, program instructions and data implementingdesired functions, such as those described above, are shown storedwithin system memory 1820 as code 1825.

In one embodiment, I/O interface 1830 may be configured to coordinateI/O traffic between processor 1810, system memory 1820, and anyperipheral devices in the device, including network interface 1840 orother peripheral interfaces. In some embodiments, I/O interface 1830 mayperform any necessary protocol, timing or other data transformations toconvert data signals from one component (e.g., system memory 1820) intoa format suitable for use by another component (e.g., processor 1810).In some embodiments, I/O interface 1830 may include support for devicesattached through various types of peripheral buses, such as a variant ofthe Peripheral Component Interconnect (PCI) bus standard or theUniversal Serial Bus (USB) standard, for example. In some embodiments,the function of I/O interface 1830 may be split into two or moreseparate components, such as a north bridge and a south bridge, forexample. Also, in some embodiments some or all of the functionality ofI/O interface 1830, such as an interface to system memory 1820, may beincorporated directly into processor 1810.

Network interface 1840 may be configured to allow data to be exchangedbetween computer system 1800 and other devices attached to a network,such as other computer systems, for example. In various embodiments,network interface 1840 may support communication via wired or wirelessgeneral data networks, such as any suitable type of Ethernet network,for example; via telecommunications/telephony networks such as analogvoice networks or digital fiber communications networks; via storagearea networks such as Fibre Channel SANs, or via any other suitable typeof network and/or protocol.

In some embodiments, system memory 1820 may be one embodiment of acomputer-accessible medium configured to store program instructions anddata as described above. However, in other embodiments, programinstructions and/or data may be received, sent or stored upon differenttypes of computer-accessible media. Generally speaking, acomputer-accessible medium or storage medium may include mass storagemedia or memory media such as magnetic or optical media, e.g., disk orCD/DVD-ROM coupled to computer system 1800 via I/O interface 1830. Acomputer-accessible medium or storage medium may also include anyvolatile or nonvolatile media such as RAM (e.g. SDRAM, DDR SDRAM, RDRAM,SRAM, etc.), ROM, etc, that may be included in some embodiments ofcomputer system 1800 as system memory 1820 or another type of memory.Program instructions and data stored via a computer-accessible mediummay be transmitted by transmission media or signals such as electrical,electromagnetic, or digital signals, which may be conveyed via acommunication medium such as a network and/or a wireless link, such asmay be implemented via network interface 1840.

Although the embodiments above have been described in considerabledetail, numerous variations and modifications will become apparent tothose skilled in the art once the above disclosure is fully appreciated.It is intended that the following claims be interpreted to embrace allsuch variations and modifications.

What is claimed is:
 1. A system, comprising; one or more processors; anda memory storing program instructions executable by at least one of theone or more processors to implement an access control service configuredto: manage access control information for a plurality of resources on anetwork, wherein the access control information comprises a tableincluding one or more access control entries uniquely associated withone or more of the plurality of resources, wherein at least one of theaccess control entries includes a resource identifier, a principalidentifier, and an access type allowed for the principal identifier onthe resource identified by the resource identifier; receive, via thenetwork, access requests from clients of the access control service; forat least one received access request: determine whether the accesscontrol information includes an access control entry corresponding to aresource specified by the request; determine, from the access controlinformation, at least one access type for the resource specified by therequest that allows an operation specified by the request to beperformed on the resource, wherein the allowance of the operation by theaccess type determined from the access control information is particularto the resource; responsive to determining that the access controlinformation includes an access control entry corresponding to thespecified resource, determine, from the determined access control entry,whether a principal associated with the request has the at least oneaccess type that allows the operation to be performed on the resource;and allow or not allow the principal to perform the specified operationon the specified resource according to results of said determiningwhether the principal has the at least one access type for the resourcethat allows the operation to be performed.
 2. The system as recited inclaim 1, wherein, to allow or not allow the principal to perform thespecified operation on the specified resource according to results ofsaid determining, the access control service is configured to notify aclient corresponding to the request that the principal associated withthe request is allowed or not allowed to perform the specified operationon the specified resource.
 3. The system as recited in claim 1, whereinthe access control information includes an access policy for theresource that indicates one or more operations that can be performed onthe resource, one or more access types for the resource, and, for atleast one operation, at least one access type that can be assigned to aprincipal to allow the respective operation to be performed on theresource by the respective principal.
 4. The system as recited in claim3, wherein, to determine the at least one access type that allows theoperation to be performed on the resource, the access control service isconfigured to determine the at least one access type for the operationas indicated by the access policy for the resource.
 5. The system asrecited in claim 3, wherein the access control information furtherincludes at least one entry indicating a principal, a resource, and oneor more access types of the indicated resource that are assigned to theindicated principal.
 6. The system as recited in claim 5, wherein, todetermine whether a principal associated with the request has the atleast one access type that allows the operation to be performed on theresource, the access control service is configured to determine if theaccess control information includes an entry for the principalassociated with the request that indicates the resource specified by therequest and the at least one access type that allows the operationspecified by the request to be performed on the resource.
 7. A method,comprising; storing access control information for a plurality ofresources on a network, wherein the access control information comprisesa table including one or more access control entries uniquely associatedwith one or more of the plurality of resources, wherein at least one ofthe access control entries includes a resource identifier, a principalidentifier, and an access type allowed for the principal identifier onthe resource identified by the resource identifier; receiving, by anaccess control service implemented on one or more computing devices,access requests from one or more clients; for one or more of thereceived access requests: determining whether the access controlinformation includes an access control entry corresponding to a resourcespecified by the request; determining, from the access controlinformation, an access type for the resource specified by the requestthat allows an operation specified by the request to be performed on theresource, wherein the allowance of the operation by the access typedetermined from the access control information is particular to theresource; responsive to determining that the access control informationincludes an access control entry corresponding to the specifiedresource, determining, from the determined access control entry, whethera principal associated with the request has the at least one access typethat allows the operation to be performed on the resource; and providingresults of said determining whether the principal has access type forthe resource that allows the operation to be performed to a clientcorresponding to the access request.
 8. The method as recited in claim7, wherein the resource specified by at least one access request is adata object accessible via a web service on the network, wherein theoperation specified by the request is an operation performed by the webservice to store, retrieve, or modify a specified data object.
 9. Themethod as recited in claim 7, wherein the resource specified by at leastone access request is a service on the network, wherein the operationspecified by the request is a particular function performed by theservice.
 10. The method as recited in claim 7, wherein said determining,from the access control information, whether a principal associated withthe request has the access type that allows the operation to beperformed on the resource comprises: locating, in the access controlinformation, an access policy for the specified resource, wherein theaccess policy associates particular operations for the resource withparticular access types for the resource; and determining, from theaccess policy for the resource, the access type associated with thespecified operation.
 11. The method as recited in claim 7, wherein saiddetermining, from the access control information, whether a principalassociated with the request has the access type that allows theoperation to be performed on the resource comprises searching the accesscontrol information for an access control entry that assigns the accesstype required for performing the operation on the resource to theprincipal.
 12. The method as recited in claim 7, wherein the accesscontrol information includes: at least one access policy that indicatesone or more operations that can be performed on at least one of theplurality of resources, one or more access types for the at least oneresource, and, for at least one operation, at least one access type thatcan be assigned to a principal to allow the respective operation to beperformed on the at least one resource by the respective principal; andat least one entry indicating at least one principal, at least oneresource, and one or more access types of the indicated at least oneresource that are assigned to the indicated at least one principal. 13.The method as recited in claim 7, wherein said determining, from theaccess control information, whether a principal associated with therequest has the access type that allows the operation to be performed onthe resource comprises: determining, from the access controlinformation, whether the principal is a member of a group of principals;and in response to said determining that the principal is a member of agroup of principals, searching the access control information for anaccess control entry that assigns the access type required forperforming the operation on the resource to the members of the group ofprincipals.
 14. A network, comprising; one or more devices implementinga plurality of resources on the network; and one or more computingdevices implementing an access control service on the network configuredto: store and retrieve access control information for the plurality ofresources on the network, wherein the access control informationcomprises a table including one or more access control entries uniquelyassociated with one or more of the plurality of resources, wherein atleast one of the access control entries includes a resource identifier,a principal identifier, and an access type allowed for the principalidentifier on the resource identified by the resource identifier;receive and process requests from a plurality of clients of the accesscontrol service; for at least one received request: determine whetherthe access control information includes an access control entrycorresponding to a resource specified by the request; determine, fromthe access control information, an access type required for performingan operation specified by the request on the resource specified by therequest, wherein the required access type determined from the accesscontrol information is particular to the resource; responsive todetermining that the access control information includes an accesscontrol entry corresponding to the specified resource, determine, fromthe determined access control entry, that a principal associated withthe request has the determined access type required for performing thespecified operation on the specified resource; and notify a clientcorresponding to the request that the principal associated with therequest is allowed to perform the specified operation on the specifiedresource.
 15. The network as recited in claim 14, wherein the accesscontrol service is further configured to, for at least one otherrequest: determine, from the access control information, that aprincipal associated with the other request does not have the determinedaccess type required for performing an operation specified by the otherrequest on a resource specified by the other request; and notify aclient corresponding to the other request that the principal associatedwith the other request is not allowed to perform the operation specifiedby the other request on the resource specified by the other request. 16.The network as recited in claim 14, wherein the resource specified bythe request is a data object accessible via a web service on thenetwork, wherein the operation specified by the request is an operationperformed by the web service to store, retrieve, or modify a specifieddata object.
 17. The network as recited in claim 14, wherein theresource specified by the request is a service on the network, whereinthe operation specified by the request is a particular functionperformed by the service.
 18. The network as recited in claim 14,wherein, to determine, from the access control information, an accesstype required for performing an operation specified by the request on aresource specified by the request, the access control service isconfigured to: locate, in the access control information, an accesspolicy for the specified resource, wherein the access policy associatesparticular operations for the resource with particular access types forthe resource; and determine, from the access policy for the resource,the access type associated with the specified operation.
 19. The networkas recited in claim 14, wherein, to determine, from the access controlinformation, that a principal specified by the request has thedetermined access type required for performing the specified operationon the specified resource, the access control service is configured tolocate, in the access control information, an access control entry thatindicates the entity specified by the request, the resource specified bythe request, and the determined access type required for performing thespecified operation on the specified resource.
 20. The network asrecited in claim 14, wherein the access control information includes: atleast one access policy that indicates one or more operations that canbe performed on at least one of the plurality of resources, one or moreaccess types for the at least one resource, and, for at least oneoperation, at least one access type that can be assigned to a principalto allow the respective operation to be performed on the at least oneresource by the respective principal; and at least one entry indicatingat least one principal, at least one resource, and one or more accesstypes of the indicated at least one resource that are assigned to theindicated at least one principal.