System security model based on trusted access control under cloud computing environment

被引:0
|
作者
Wang F. [1 ]
机构
[1] Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot
来源
Wang, Fengqi (fengqiwang@21cn.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 10期
关键词
Access control; Context; RBAC; Security; Trust degree;
D O I
10.1504/IJIPT.2017.088930
中图分类号
学科分类号
摘要
It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user’s trust value, so it can detect the user’s abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:236 / 242
页数:6
相关论文
共 50 条
  • [1] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [2] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [3] An Enhanced Access Control Model Based on Trusted Computing
    Hu, Kuanmin
    Cai, Guoyang
    Shen, Chengsheng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 920 - 928
  • [4] Adaptive Security Management Model in the Cloud Computing Environment
    Jung, Youngmin
    Chung, Mokdong
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1664 - 1669
  • [5] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [6] Service Security Architecture and Access Control Model for Cloud Computing
    Yan Danfeng
    Yang Fangchun
    Yeap, Tet
    CHINA COMMUNICATIONS, 2011, 8 (06) : 44 - 50
  • [7] Agent-based access control security in grid computing environment
    Lin, J
    Wang, C
    Guo, YH
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 159 - 162
  • [8] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [9] Access control based resource allocation in cloud computing environment
    Wang J.
    Liu J.
    Zhang H.
    Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19): : 236 - 243
  • [10] Study on Access Control Based on Trusted Computing
    Ma, Xinqiang
    Huang, Yi
    Bo Lv
    MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +