Research on access control model based on user action in cloud computing

被引:0
|
作者
Wang, Huan-Bin [1 ]
Tao, Ma [1 ]
Hui, Xiao-Bin [1 ]
机构
[1] Airforce Engn Univ, Coll Management & Safety Engn Equipment, Xian 710051, Shanxi, Peoples R China
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS | 2016年 / 97卷
关键词
Access control; Cloud computing; Action model; trust level;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper firstly analyzes the current situation of the security of cloud computing, and analyzes several problems about the security of the cloud, and studies the existing access control model. Combining the characteristics of cloud computing security and the development trend of access control, the action based access control model is introduced into the security management of cloud computing. In cloud computing, the user's rights are dynamically and flexibly managed, so as to provide a feasible and efficient access control model for the cloud computing environment.
引用
收藏
页码:157 / 160
页数:4
相关论文
共 50 条
  • [1] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [2] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [3] Research of Fine Grit Access Control Based on Time in Cloud Computing
    Shen Bin
    Yang Haopu
    PROCEEDINGS OF 2019 IEEE 3RD INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2019), 2019, : 1897 - 1902
  • [4] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [5] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [6] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [7] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [8] Research on Access Control Techniques in SaaS of Cloud Computing
    Rehman, Shabana
    Gautam, Rahul
    SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 92 - 100
  • [9] Research on Resource Allocation Scheme based on Access Control in Cloud Computing Environment
    Wang, Jun-she
    Liu, Jin-liang
    Zhang, Hong-bin
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATIONS (CSA), 2015, : 377 - 380
  • [10] Research on cloud computing service based on trust access control
    Sun, Panjun
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12