Research on access control model based on user action in cloud computing

被引:0
|
作者
Wang, Huan-Bin [1 ]
Tao, Ma [1 ]
Hui, Xiao-Bin [1 ]
机构
[1] Airforce Engn Univ, Coll Management & Safety Engn Equipment, Xian 710051, Shanxi, Peoples R China
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS | 2016年 / 97卷
关键词
Access control; Cloud computing; Action model; trust level;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper firstly analyzes the current situation of the security of cloud computing, and analyzes several problems about the security of the cloud, and studies the existing access control model. Combining the characteristics of cloud computing security and the development trend of access control, the action based access control model is introduced into the security management of cloud computing. In cloud computing, the user's rights are dynamically and flexibly managed, so as to provide a feasible and efficient access control model for the cloud computing environment.
引用
收藏
页码:157 / 160
页数:4
相关论文
共 50 条
  • [21] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [22] Access control based resource allocation in cloud computing environment
    Wang J.
    Liu J.
    Zhang H.
    Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19): : 236 - 243
  • [23] Research on Data Protection Based on Encrypted Attribute Access Control in Cloud Computing
    Zhang, Hua
    Lou, Fang
    Wang, Hao
    Tian, Zhihong
    2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 450 - 453
  • [24] Dynamic User Access Control Model of Private Cloud
    He, Xue-Qian
    Ling, Jie
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 761 - 766
  • [25] A credible usage access control model in cloud computing
    Wang, Fengying
    Li, Caihong
    Zhao, Hui
    Liu, Shushu
    Information Technology Journal, 2013, 12 (20) : 5553 - 5558
  • [26] An assurance model for access control on cloud computing systems
    Li Y.
    Zhao Y.
    Guo X.
    Liu G.
    1600, Tsinghua University (57): : 432 - 436
  • [27] A cloud-user behavior assessment based dynamic access control model
    Jing X.
    Liu Z.
    Li S.
    Qiao B.
    Tan G.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 1966 - 1975
  • [28] A cloud-user access control mechanism based on data masking
    Wu, Ting-Kuang
    Lin, Yung-Wang
    Lin, Iuon-Chang
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 165 - 168
  • [29] An Access Control Scheme For Limiting The Number Of Users Based on Cloud Computing
    Shi Guozhen
    Ye Sishui
    Zhu Yafei
    Zhang Meng
    Wang Shuaibing
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INTELLIGENT COMMUNICATION, 2015, 16 : 472 - 476
  • [30] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498