Research of Fine Grit Access Control Based on Time in Cloud Computing

被引:0
作者
Shen Bin [1 ]
Yang Haopu [1 ]
机构
[1] Unit 92493 PLA, Huludao, Liaoning, Peoples R China
来源
PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019) | 2019年
关键词
cloud computing; cloud security; access control;
D O I
10.1109/itnec.2019.8729464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the wildly application and rapidly development of cloud computing, the security of cloud technology has been raising more and more attention. The technology of access control in cloud plays the key role in the whole application system. This paper introduces the traditional theory and models of access control. Then, the unique challenges in cloud access control and the corresponding solutions are analyzed. On the basis of these researches, the Time-restrained Fine-grit Access Control Model in Cloud is proposed. The features of this model are analyzed in the following. In the final of this paper is the summary of the whole research and the expectation in future research direction.
引用
收藏
页码:1897 / 1902
页数:6
相关论文
共 50 条
  • [21] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [22] An Access Control Scheme For Limiting The Number Of Users Based on Cloud Computing
    Shi Guozhen
    Ye Sishui
    Zhu Yafei
    Zhang Meng
    Wang Shuaibing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 472 - 476
  • [23] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498
  • [24] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [25] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [26] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [27] Research into Synthesizing Access Control Strategies in Cloud Computing Environment
    Ni, Ping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 : 440 - 445
  • [28] Fine-grained Access Control Scheme Based on Cloud Storage
    Niu, Xiaojie
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 512 - 515
  • [29] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [30] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80