The Dynamic Access Control Model for Cloud Web Based on Repeated-game Theory

被引:0
|
作者
Zhang, Yixuan [1 ]
He, Jingsha [1 ]
Zhao, Bin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
Access Control; Repeated-game Theory; Cloud Web; Prisoner's Dilemma; Nash Equilibrium;
D O I
10.14257/ijgdc.2015.8.4.03
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Access control, what is a core technology in information security, has been widely used cloud web. It is used to distribute objects' resources to subjects according to some principles. But until now, most traditional access control models are focused on the distributional principles; the security of systems is always ignored. Protecting data and resources in computers from threats and attacks is also an important aspect in access control, especially in cloud web where there are a great deal of threats and attacks. In this paper, we introduce the present situation and related work of access control. Then we analyze the security problems in computer systems with traditional access control model, and get the prisoner's dilemma in it through Nash equilibrium. To solve this dilemma, we applied repeated-game theory to access control and build a new model RTAC. The ultimate goal of RTAC is to encourage subjects' honest accesses and discourage subjects' malicious accesses through Nash equilibrium. At last, we perform some experiments and show the advantages of RTAC over the traditional access control model.
引用
收藏
页码:27 / 35
页数:9
相关论文
共 50 条
  • [41] Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks
    Liu, Xiaozhu
    Zhu, Rongbo
    Jalaian, Brian
    Sun, Yongli
    MOBILE NETWORKS & APPLICATIONS, 2015, 20 (06): : 817 - 827
  • [42] Dynamic Spectrum Access Algorithm Based on Game Theory in Cognitive Radio Networks
    Xiaozhu Liu
    Rongbo Zhu
    Brian Jalaian
    Yongli Sun
    Mobile Networks and Applications, 2015, 20 : 817 - 827
  • [43] Workflow and Role Based Access Control Model for Cloud Manufacturing
    Lin, Xianhui
    Zhang, Xiaomei
    2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 65 - 71
  • [44] Study on the hybrid-cloud-based access control model
    Cai, Ting (ct_dolphin@163.com), 1600, Universidad Central de Venezuela (55):
  • [45] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [46] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [47] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [48] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [49] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [50] A dynamic evaluation model of data price based on game theory
    Zhao Bin
    Zhang Jiqun
    Cao Wei
    Li Bin
    Zhang Wenyin
    Gao Yilong
    Peer-to-Peer Networking and Applications, 2023, 16 : 2073 - 2088