System security model based on trusted access control under cloud computing environment

被引:0
|
作者
Wang F. [1 ]
机构
[1] Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot
来源
Wang, Fengqi (fengqiwang@21cn.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 10期
关键词
Access control; Context; RBAC; Security; Trust degree;
D O I
10.1504/IJIPT.2017.088930
中图分类号
学科分类号
摘要
It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user’s trust value, so it can detect the user’s abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:236 / 242
页数:6
相关论文
共 50 条
  • [1] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [2] Access control security model based on dual identity authentication in cloud computing environment
    Ning, Yumei
    Ding, Zhenguo
    Zeng, Ping
    Wang, Chen
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 288 - 292
  • [3] A Security Protocol for Trusted Access to Cloud Environment
    Chang, Yanan
    Zhang, Zhiyong
    Wang, Jian
    RECENT ADVANCES IN ELECTRICAL & ELECTRONIC ENGINEERING, 2015, 8 (02) : 135 - 144
  • [4] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [5] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [6] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [7] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [8] An Enhanced Access Control Model Based on Trusted Computing
    Hu, Kuanmin
    Cai, Guoyang
    Shen, Chengsheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 920 - 928
  • [9] A Cloud Computing Security Framework Based on Cloud Security Trusted Authority
    Dawoud, Mohammed M.
    Ebrahim, Gamal A.
    Youssef, Sameh A.
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 133 - 138
  • [10] Research on ATN-based trusted cloud computing security model
    Yang, Shaoyu
    Wang, Shiqing
    Journal of Information and Computational Science, 2012, 9 (18): : 5945 - 5952