The Dynamic Access Control Model for Cloud Web Based on Repeated-game Theory

被引:0
|
作者
Zhang, Yixuan [1 ]
He, Jingsha [1 ]
Zhao, Bin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
Access Control; Repeated-game Theory; Cloud Web; Prisoner's Dilemma; Nash Equilibrium;
D O I
10.14257/ijgdc.2015.8.4.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Access control, what is a core technology in information security, has been widely used cloud web. It is used to distribute objects' resources to subjects according to some principles. But until now, most traditional access control models are focused on the distributional principles; the security of systems is always ignored. Protecting data and resources in computers from threats and attacks is also an important aspect in access control, especially in cloud web where there are a great deal of threats and attacks. In this paper, we introduce the present situation and related work of access control. Then we analyze the security problems in computer systems with traditional access control model, and get the prisoner's dilemma in it through Nash equilibrium. To solve this dilemma, we applied repeated-game theory to access control and build a new model RTAC. The ultimate goal of RTAC is to encourage subjects' honest accesses and discourage subjects' malicious accesses through Nash equilibrium. At last, we perform some experiments and show the advantages of RTAC over the traditional access control model.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [1] A Dynamic Access Control Model Based on Game Theory for the Cloud
    Shao, Pengfei
    Jin, Shuyuan
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [2] A Trust-Game-Based Access Control Model for Cloud Service
    Pan Jun, Sun
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [3] A Context Based Dynamic Access Control Model for Web Service
    Shang, Chaowang
    Yang, Zongkai
    Liu, Qingtang
    Zhao, Chengling
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 339 - 343
  • [4] Study on fuzzy theory based web access control model
    Wang Cui-ru
    Liu Shuang-xi
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 178 - +
  • [5] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [6] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [7] Dynamic Game Access Control based on Trust
    Ma, Shunan
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1369 - 1373
  • [8] Dynamic User Access Control Model of Private Cloud
    He, Xue-Qian
    Ling, Jie
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 761 - 766
  • [9] Dynamic Risk Access Control Model for Cloud Platform
    Xie, Lixia
    Wei, Ruixin
    Ning, Yuguang
    Yang, Hongyu
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 12 - 22
  • [10] A cloud-user behavior assessment based dynamic access control model
    Jing X.
    Liu Z.
    Li S.
    Qiao B.
    Tan G.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 1966 - 1975