Research of Fine Grit Access Control Based on Time in Cloud Computing

被引:0
|
作者
Shen Bin [1 ]
Yang Haopu [1 ]
机构
[1] Unit 92493 PLA, Huludao, Liaoning, Peoples R China
来源
PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019) | 2019年
关键词
cloud computing; cloud security; access control;
D O I
10.1109/itnec.2019.8729464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the wildly application and rapidly development of cloud computing, the security of cloud technology has been raising more and more attention. The technology of access control in cloud plays the key role in the whole application system. This paper introduces the traditional theory and models of access control. Then, the unique challenges in cloud access control and the corresponding solutions are analyzed. On the basis of these researches, the Time-restrained Fine-grit Access Control Model in Cloud is proposed. The features of this model are analyzed in the following. In the final of this paper is the summary of the whole research and the expectation in future research direction.
引用
收藏
页码:1897 / 1902
页数:6
相关论文
共 50 条
  • [1] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [2] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [3] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [4] Research on Access Control Techniques in SaaS of Cloud Computing
    Rehman, Shabana
    Gautam, Rahul
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 92 - 100
  • [5] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [6] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [7] Research on cloud computing service based on trust access control
    Sun, Panjun
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12
  • [8] Research on Access Control Based on CP-ABE Algorithm and Cloud Computing
    Zhang Shaomin
    Ran Jun
    Wang Baoyi
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2273 - 2276
  • [9] Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing
    Ning, Jianting
    Cao, Zhenfu
    Dong, Xiaolei
    Liang, Kaitai
    Ma, Hui
    Wei, Lifei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (01) : 94 - 105
  • [10] Fine-Grained Access Control in the Era of Cloud Computing: An Analytical Review
    Albulayhi, Khalid
    Abuhussein, Abdullah
    Alsubaei, Faisal
    Sheldon, Frederick T.
    2020 10TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2020, : 748 - 755