The Dynamic Access Control Model for Cloud Web Based on Repeated-game Theory

被引:0
|
作者
Zhang, Yixuan [1 ]
He, Jingsha [1 ]
Zhao, Bin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
Access Control; Repeated-game Theory; Cloud Web; Prisoner's Dilemma; Nash Equilibrium;
D O I
10.14257/ijgdc.2015.8.4.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Access control, what is a core technology in information security, has been widely used cloud web. It is used to distribute objects' resources to subjects according to some principles. But until now, most traditional access control models are focused on the distributional principles; the security of systems is always ignored. Protecting data and resources in computers from threats and attacks is also an important aspect in access control, especially in cloud web where there are a great deal of threats and attacks. In this paper, we introduce the present situation and related work of access control. Then we analyze the security problems in computer systems with traditional access control model, and get the prisoner's dilemma in it through Nash equilibrium. To solve this dilemma, we applied repeated-game theory to access control and build a new model RTAC. The ultimate goal of RTAC is to encourage subjects' honest accesses and discourage subjects' malicious accesses through Nash equilibrium. At last, we perform some experiments and show the advantages of RTAC over the traditional access control model.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [21] Dynamic Allocation Algorithm of WiFi Access Resources Based on the Game Theory
    Ye X.-T.
    Liu Z.-B.
    Shao S.-J.
    Qi F.
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2020, 43 (02): : 10 - 15and58
  • [22] An access control model for mobile networks based on the non-zero-sum game theory
    School of Software Engineering, Beijing University of Technology, Beijing, China
    不详
    Int. J. u e Serv. Sci. Technol., 4 (1-8):
  • [23] Dynamic Access Control in Cloud Services
    Zaborovsky, Vladimir
    Lukashin, Alexey
    Kupreenko, Sergey
    Mulukha, Vladimir
    2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 1400 - 1404
  • [24] An Access Control Model Based on System Security Risk for Dynamic Sensitive Data Storage in the Cloud
    Alharbe, Nawaf
    Aljohani, Abeer
    Rakrouki, Mohamed Ali
    Khayyat, Mashael
    APPLIED SCIENCES-BASEL, 2023, 13 (05):
  • [25] CLOUD COMPUTING MODEL BASED ON MULTISERVICE ACCESS DYNAMIC DETECTION
    Zhu, Zhenyu
    Chen, Hui
    Wu, Lianguo
    2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS), 2014, : 461 - 464
  • [26] A Cloud Service Broker Based on Dynamic Game Theory for Bilateral SLA Negotiation in Cloud Environment
    Chen, Hongwei
    Liu, Xiaojuan
    Xu, Hui
    Wang, Chunzhi
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (09): : 251 - 268
  • [27] Access control model based on dynamic rules
    Huang, He
    Yao, Shu-Zhen
    Tongxin Xuebao/Journal on Communications, 2007, 28 (SUPPL.): : 14 - 17
  • [28] Dynamic cloud model based on decision field theory
    Anjali, Anjali
    Gupta, Anjana
    JOURNAL OF SUPERCOMPUTING, 2025, 81 (04):
  • [29] A Dynamic Multi-domain Access Control Model in Cloud Computing
    Xiong, Dapeng
    Zou, Peng
    Cai, Jun
    He, Jun
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 3 - 12
  • [30] Game Theoretic Dynamic Spectrum Access in Cloud-based Cognitive Radio Networks
    Rawat, Danda B.
    Shetty, Sachin
    Raza, Khurram
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 586 - 591