Access Control Model Based on Trust and Risk Evaluation in IDMaaS

被引:1
作者
Liu, Fei [1 ]
Wang, Jing [1 ]
Bai, Hongtao [1 ]
Sun, Huiping [2 ]
机构
[1] China Mobile Res Inst, 53 A Xibianmen St, Beijing, Peoples R China
[2] PKU, Sch Software & Microelect, Beijing, Peoples R China
来源
2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS | 2015年
关键词
IDMaaS; access control; trust evaluation; risk evluation; format-preserving encryption;
D O I
10.1109/ITNG.2015.34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud computing technology develops rapidly, more convenience has been brought to users by various cloud providers with various cloud services. However, difficulty of management, especially when different access control protocols and personal information involved, has become one of barriers that inhibit the development process of cloud technology. In this paper, a user-centered IDMaaS (Identity Management as a Service) is proposed combined with a novel access control model based on trust and risk evaluation. Besides, a format-preserving encryption (FPE) method is proposed as an auxiliary scheme guaranteeing the effectiveness of access control. IDMaaS offers a solution that effectively alleviates the difficulty of realizing unified management of users' identity and information among diverse cloud service providers.
引用
收藏
页码:179 / 184
页数:6
相关论文
共 17 条
  • [1] Anh D.T. T., 2014, Proceedings of the 4th ACM conference on Data and application security and privacy, P13, DOI DOI 10.1145/2557547.2557556
  • [2] [Anonymous], 2000, Proceedings of the 33rd Hawaii International Conference on System Sciences, DOI DOI 10.1109/HICCS.2000.926814
  • [3] Attribute Based Access Control for APIs in Spring Security
    Armando, Alessandro
    Carbone, Roberto
    Chekole, Eyasu Getahun
    Ranise, Silvio
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 85 - 88
  • [4] Bellarc M, 2009, LECT NOTES COMPUT SC, V5867, P295, DOI 10.1007/978-3-642-05445-7_19
  • [5] Chen JW, 2014, IEEE ICC, P3782, DOI 10.1109/ICC.2014.6883910
  • [6] CORAS, 2000, IST200025031 CORAS
  • [7] Hajny J, 2014, LECT NOTES COMPUTER, V8639, P1
  • [8] Friendships and adaptation in the life course
    Hartup, WW
    Stevens, N
    [J]. PSYCHOLOGICAL BULLETIN, 1997, 121 (03) : 355 - 370
  • [9] Khan A. N., 2014, J SUPERCOMPUTING
  • [10] Kirkham Tom, PERSONAL DATA STORE