The Dynamic Access Control Model for Cloud Web Based on Repeated-game Theory

被引:0
|
作者
Zhang, Yixuan [1 ]
He, Jingsha [1 ]
Zhao, Bin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
Access Control; Repeated-game Theory; Cloud Web; Prisoner's Dilemma; Nash Equilibrium;
D O I
10.14257/ijgdc.2015.8.4.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Access control, what is a core technology in information security, has been widely used cloud web. It is used to distribute objects' resources to subjects according to some principles. But until now, most traditional access control models are focused on the distributional principles; the security of systems is always ignored. Protecting data and resources in computers from threats and attacks is also an important aspect in access control, especially in cloud web where there are a great deal of threats and attacks. In this paper, we introduce the present situation and related work of access control. Then we analyze the security problems in computer systems with traditional access control model, and get the prisoner's dilemma in it through Nash equilibrium. To solve this dilemma, we applied repeated-game theory to access control and build a new model RTAC. The ultimate goal of RTAC is to encourage subjects' honest accesses and discourage subjects' malicious accesses through Nash equilibrium. At last, we perform some experiments and show the advantages of RTAC over the traditional access control model.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [31] A New Dynamic Game-Based Pricing Model for Cloud Environment
    Saadatfar, Hamid
    Gholampour Ahangar, Hamid
    Hassannataj Joloudari, Javad
    FUTURE INTERNET, 2024, 16 (02)
  • [32] Blockchain-based dynamic trust access control game mechanism
    Deng, Xianhui
    Li, Binyong
    Zhang, Shaowei
    Deng, Liangming
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (02) : 702 - 725
  • [33] A Hybrid Approach for RRH Clustering in Cloud Radio Access Networks based on Game Theory
    Boulos, Karen
    Khawam, Kinda
    El Helou, Melhem
    Ibrahim, Marc
    Martin, Steven
    Sawaya, Hadi
    PROCEEDINGS OF THE 16TH ACM INTERNATIONAL SYMPOSIUM ON MOBILITY MANAGEMENT AND WIRELESS ACCESS (MOBIWAC'18), 2018, : 128 - 132
  • [34] Game theory-based resource pricing model in cloud platforms
    Xiao, Peng
    Tang, Zhihang
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2015, 14 (03) : 256 - 271
  • [35] Analysis of trust-based access control using game theory
    He, J. (jhe@bjut.edu.cn), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (08):
  • [36] A Dynamic Risk-based Access Control Architecture for Cloud Computing
    dos Santos, Daniel Ricardo
    Westphall, Carla Merkle
    Westphall, Carlos Becker
    2014 IEEE NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (NOMS), 2014,
  • [37] Dynamic Attribute-Based Access Control in Cloud Storage Systems
    Liu, Zechao
    Jiang, Zoe L.
    Wang, Xuan
    Yiu, S. M.
    Zhang, Chunkai
    Zhao, Xiaomeng
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 129 - 137
  • [38] The construction and verification of the dynamic repeated game model based on tax of “Net Goods”
    De-Fa, Cai, 1600, Science and Engineering Research Support Society (07):
  • [39] The Cloud Access Control Based on Dynamic Feedback and Merkle Hash Tree
    Yi, Xiushuang
    Wang, Weiqiang
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 217 - 221
  • [40] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):