A Dynamic Access Control Model Based on Game Theory for the Cloud

被引:0
作者
Shao, Pengfei
Jin, Shuyuan [1 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
来源
2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2021年
关键词
access control; cloud computing; dynamic; game theory; trust; Nash equilibrium; SYSTEMS; TRUST;
D O I
10.1109/GLOBECOM46510.2021.9685619
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The user's access history can be used as an important reference factor in determining whether to allow the current access request or not. And it is often ignored by the existing access control models. To make up for this defect, a Dynamic Trust game theoretic Access Control model is proposed based on the previous work. This paper proposes a method to quantify the user's trust in the cloud environment, which uses identity trust, behavior trust, and reputation trust as metrics. By modeling the access process as a game and introducing the user's trust value into the pay-off matrix, the mixed strategy Nash equilibrium of cloud user and service provider is calculated respectively. Further, a calculation method for the threshold predefined by the service provider is proposed. Authorization of the access request depends on the comparison of the calculated probability of the user's adopting a malicious access policy with the threshold. Finally, we summarize this paper and make a prospect for future work.
引用
收藏
页数:6
相关论文
共 29 条
  • [1] The economics of information security
    Anderson, Ross
    Moore, Tyler
    [J]. SCIENCE, 2006, 314 (5799) : 610 - 613
  • [2] [Anonymous], 1973, TECH REP
  • [3] [Anonymous], 2017, SECURITY GUIDANCE CR
  • [4] [Anonymous], 2014, ADV WEB SERVICES
  • [5] Banayal R. K., 2014, P 2014 INT C INF COM, P1
  • [6] Deshpande S., 2018, INT J NETW SECUR, V20, P291
  • [7] A Risk Assessment Framework for Cloud Computing
    Djemame, Karim
    Armstrong, Django
    Guitart, Jordi
    Macias, Mario
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2016, 4 (03) : 265 - 278
  • [8] Game Theory for Cyber Security and Privacy
    Do, Cuong T.
    Tran, Nguyen H.
    Hong, Choongseon
    Kamhoua, Charles A.
    Kwiat, Kevin A.
    Blasch, Erik
    Ren, Shaolei
    Pissinou, Niki
    Iyengar, Sundaraja Sitharama
    [J]. ACM COMPUTING SURVEYS, 2017, 50 (02) : 30 - 37
  • [9] Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
  • [10] Gao L., 2016, IEEE T CLOUD COMPUTI