Attribute-based access control model for cloud computing

被引:0
|
作者
Wang, Jingyu [1 ,2 ]
Feng, Lixiao [2 ]
Zheng, Xuefeng [1 ]
机构
[1] School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing
[2] School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou
来源
Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology) | 2015年 / 46卷 / 06期
基金
中国国家自然科学基金;
关键词
Access control; Cloud computing; Cloud security; Multi-domain;
D O I
10.11817/j.issn.1672-7207.2015.06.016
中图分类号
学科分类号
摘要
A cloud computing attributes-based access control(CC-ABAC) model was proposed to solve the multi-domains access control problem in cloud computing. An attribute-based access control method was utilized to realize the local-domain and cross-domain access decisions in this model. The formal description of model and core decision algorithm were given. A semaphore and P/V operation mechanism was designed to solve the incompatible problem of call and update the attribute list in the inter-domains properties synchronization. The simulation results show that the model not only realizes fine-grained access control, but also reduces the access control decision time and improves decision-making efficiency. ©, 2015, Central South University of Technology. All right reserved.
引用
收藏
页码:2090 / 2097
页数:7
相关论文
共 17 条
  • [1] Cloud Computing
  • [2] Li F., Shi G., Ma J., Et al., Research status and development trends of access control model, Acta Electronica Sinica, 40, 4, pp. 805-813, (2012)
  • [3] Han D., Gao J., Zhai H., Et al., Research progress on the access control model, Journal of Computer Science, 37, 11, pp. 29-33, (2010)
  • [4] Ferraiolo D.F., Sandhu R., Gavrila S., Et al., Proposed NIST standard for role-based access control, ACM Trans on Information and System Security, 4, 3, pp. 224-274, (2001)
  • [5] Tan X., Research on access control model in cloud computing environment, pp. 35-41, (2011)
  • [6] Zhao M., Yao Z., Cloud computing access control model based on RBAC, Journal of Computer Applications, 32, S2, pp. 267-270, (2012)
  • [7] Tan Z., Tang Z., Li R., Et al., Research on trust-based access control model in cloud computing, Proceedings of IEEE Joint International Information Technology and Artificial Intelligence Conference, pp. 339-344, (2011)
  • [8] Lin G., He S., Huang H., Et al., The cloud computing access control model based on behavior security model, Journal of Communication, 33, 3, pp. 59-66, (2012)
  • [9] Li J., Huai J., Li X., Research on automated trust negotiation, Journal of Software, 17, 1, pp. 124-133, (2006)
  • [10] Zhang X., Li Y., Nalla D., An attribute-based access matrix model, Proc of 2005 ACM Symposium on Applied Computing, pp. 359-363, (2005)