Research on access control model based on user action in cloud computing

被引:0
|
作者
Wang, Huan-Bin [1 ]
Tao, Ma [1 ]
Hui, Xiao-Bin [1 ]
机构
[1] Airforce Engn Univ, Coll Management & Safety Engn Equipment, Xian 710051, Shanxi, Peoples R China
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS | 2016年 / 97卷
关键词
Access control; Cloud computing; Action model; trust level;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper firstly analyzes the current situation of the security of cloud computing, and analyzes several problems about the security of the cloud, and studies the existing access control model. Combining the characteristics of cloud computing security and the development trend of access control, the action based access control model is introduced into the security management of cloud computing. In cloud computing, the user's rights are dynamically and flexibly managed, so as to provide a feasible and efficient access control model for the cloud computing environment.
引用
收藏
页码:157 / 160
页数:4
相关论文
共 50 条
  • [31] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [32] Attribute-based Encryption for Cloud Computing Access Control: A Survey
    Zhang, Yinghui
    Deng, Robert H.
    Xu, Shengmin
    Sun, Jianfei
    Li, Qi
    Zheng, Dong
    ACM COMPUTING SURVEYS, 2020, 53 (04)
  • [33] Research into Synthesizing Access Control Strategies in Cloud Computing Environment
    Ni, Ping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 : 440 - 445
  • [34] Verifiable computation with access control in cloud computing
    Lingling Xu
    Shaohua Tang
    The Journal of Supercomputing, 2014, 69 : 528 - 546
  • [35] Discussion on Access Control Technology of Cloud Computing
    Wang, Yibai
    Chen, Shi
    2018 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL & ELECTRONICS ENGINEERING AND COMPUTER SCIENCE (ICEEECS 2018), 2018, : 77 - 80
  • [36] Verifiable computation with access control in cloud computing
    Xu, Lingling
    Tang, Shaohua
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (02) : 528 - 546
  • [37] Key techniques of access control for cloud computing
    Feng, Chao-Sheng
    Qin, Zhi-Guang
    Yuan, Ding
    Qing, Yu
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2015, 43 (02): : 312 - 319
  • [38] Negative Authorization in Access Control for Cloud Computing
    Li Xiaohui
    He Jingsha
    Zhang Ting
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 307 - 312
  • [39] Access control for Hadoop-based cloud computing
    Wang, Zhihua
    Pang, Haibo
    Li, Zhanbo
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59
  • [40] A User-oriented Access Control Model for Medical Association Cloud Platform
    Yang Jiapeng
    Qin Qiuli
    Proceedings of the Second International Symposium - Management, Innovation and Development, 2015, : 289 - 294