Survey on access control model in cloud computing environment

被引:4
作者
Li, Xinlu [1 ]
Zhao, Xiaoxia [2 ]
机构
[1] Kunming Univ Sci & Technol, Fac Informat Engn & Automat, Kunming, Peoples R China
[2] Kunming Univ Sci & Technol, Calculating Ctr, Kunming, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA) | 2013年
关键词
Access control; Cloud computing; Cloud storage; Data security; INFORMATION;
D O I
10.1109/CLOUDCOM-ASIA.2013.103
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper firstly sums up the main security threats to data confidentiality in cloud computing environment, then classifies and introduces the existing access control models according to the core strategy they have adopted. Lastly this paper points out the main challenges facing access control in cloud computing environment and the subsequent research directions.
引用
收藏
页码:340 / 345
页数:6
相关论文
共 52 条
[1]  
[Anonymous], COMPUTER RES DEV
[2]  
[Anonymous], 2009, SEC GUID CRIT AR FOC
[3]  
[Anonymous], J COMMUNICATIONS
[4]  
Armbrust M, 2009, UCBEECS200928
[5]  
Bell D. E., 1973, ESDTR73278 AIR FORC
[6]  
Bell D. E., 1973, ESDTR73278 AIR FORC, VI
[7]  
Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
[8]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[9]  
Bie Y. Y., 2012, INFORM SECURITY TECH, V3, P39
[10]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173