Research on access control model based on user action in cloud computing

被引:0
|
作者
Wang, Huan-Bin [1 ]
Tao, Ma [1 ]
Hui, Xiao-Bin [1 ]
机构
[1] Airforce Engn Univ, Coll Management & Safety Engn Equipment, Xian 710051, Shanxi, Peoples R China
来源
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS | 2016年 / 97卷
关键词
Access control; Cloud computing; Action model; trust level;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper firstly analyzes the current situation of the security of cloud computing, and analyzes several problems about the security of the cloud, and studies the existing access control model. Combining the characteristics of cloud computing security and the development trend of access control, the action based access control model is introduced into the security management of cloud computing. In cloud computing, the user's rights are dynamically and flexibly managed, so as to provide a feasible and efficient access control model for the cloud computing environment.
引用
收藏
页码:157 / 160
页数:4
相关论文
共 50 条
  • [41] Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud Computing
    Bouchaala, Mariem
    Ghazel, Cherif
    Saidane, Leila Azouz
    RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2019), 2020, 12026 : 193 - 207
  • [42] Research on Data Security Access Model of Cloud Computing Platform
    Zhu, Yangqing
    Zuo, Jun
    2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING ICISCE 2015, 2015, : 424 - 428
  • [43] Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing
    Luo, Wei
    Ma, Wenping
    IEEE ACCESS, 2018, 6 : 40420 - 40428
  • [44] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [45] An Improved Distributed Access Control Model in Cloud Computing by Blockchain
    Sabzmakan, Akram
    Mirtaheri, Seyedeh Leili
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
  • [46] Time efficient secure DNA based access control model for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    Vijayakumar, Pandi
    Audithan, Sivaraman
    Balusamy, Balamurugan
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 73 : 90 - 105
  • [47] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [48] Multi-Organizational Access Control Model Based on Mobile Agents for Cloud Computing
    Ben Yahya, Zeineb
    Barika Ktata, Farah
    Ghedira, Khaled
    2016 IEEE/WIC/ACM INTERNATIONAL CONFERENCE ON WEB INTELLIGENCE (WI 2016), 2016, : 656 - 659
  • [49] A trustworthy access control model for mobile cloud computing based on reputation and mechanism design
    Lin, Hui
    Xu, Li
    Huang, Xinyi
    Wu, Wei
    Huang, Yijie
    AD HOC NETWORKS, 2015, 35 : 51 - 64
  • [50] Ontology-based access control model for security policy reasoning in cloud computing
    Chang Choi
    Junho Choi
    Pankoo Kim
    The Journal of Supercomputing, 2014, 67 : 711 - 722