Research of Fine Grit Access Control Based on Time in Cloud Computing

被引:0
作者
Shen Bin [1 ]
Yang Haopu [1 ]
机构
[1] Unit 92493 PLA, Huludao, Liaoning, Peoples R China
来源
PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019) | 2019年
关键词
cloud computing; cloud security; access control;
D O I
10.1109/itnec.2019.8729464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the wildly application and rapidly development of cloud computing, the security of cloud technology has been raising more and more attention. The technology of access control in cloud plays the key role in the whole application system. This paper introduces the traditional theory and models of access control. Then, the unique challenges in cloud access control and the corresponding solutions are analyzed. On the basis of these researches, the Time-restrained Fine-grit Access Control Model in Cloud is proposed. The features of this model are analyzed in the following. In the final of this paper is the summary of the whole research and the expectation in future research direction.
引用
收藏
页码:1897 / 1902
页数:6
相关论文
共 50 条
  • [41] Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing
    Zhihua Xia
    Liangao Zhang
    Dandan Liu
    [J]. 中国通信, 2016, 13 (07) : 92 - 99
  • [42] FINE-GRAINED ACCESS CONTROL SYSTEMS SUITABLE FOR RESOURCE-CONSTRAINED USERS IN CLOUD COMPUTING
    Zhang, Yinghui
    Zheng, Dong
    Guo, Rui
    Zhao, Qinglan
    [J]. COMPUTING AND INFORMATICS, 2018, 37 (02) : 327 - 348
  • [43] DACPCC: A Data Access Control Scheme with Access Permission for Cloud Computing
    Wang Y.-D.
    Yang J.-H.
    [J]. Yang, Jia-Hai (yang@cernet.edu.cn), 2018, Chinese Institute of Electronics (46): : 236 - 244
  • [44] Survey of access control models and technologies for cloud computing
    Cai, Fangbo
    Zhu, Nafei
    He, Jingsha
    Mu, Pengyu
    Li, Wenxin
    Yu, Yi
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 3): : S6111 - S6122
  • [45] An efficient signcryption for data access control in cloud computing
    Fagen Li
    Bo Liu
    Jiaojiao Hong
    [J]. Computing, 2017, 99 : 465 - 479
  • [46] Privacy-Preserved Access Control for Cloud Computing
    Zhou, Miao
    Mu, Yi
    Susilo, Willy
    Au, Man Ho
    Yan, Jun
    [J]. TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11, 2011, : 83 - 90
  • [47] Survey of access control models and technologies for cloud computing
    Fangbo Cai
    Nafei Zhu
    Jingsha He
    Pengyu Mu
    Wenxin Li
    Yi Yu
    [J]. Cluster Computing, 2019, 22 : 6111 - 6122
  • [48] Towards an Approach of Semantic Access Control for Cloud Computing
    Hu, Luokai
    Ying, Shi
    Jia, Xiangyang
    Zhao, Kai
    [J]. CLOUD COMPUTING, PROCEEDINGS, 2009, 5931 : 145 - 156
  • [49] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [50] An efficient signcryption for data access control in cloud computing
    Li, Fagen
    Liu, Bo
    Hong, Jiaojiao
    [J]. COMPUTING, 2017, 99 (05) : 465 - 479