System security model based on trusted access control under cloud computing environment

被引:0
|
作者
Wang F. [1 ]
机构
[1] Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot
来源
Wang, Fengqi (fengqiwang@21cn.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 10期
关键词
Access control; Context; RBAC; Security; Trust degree;
D O I
10.1504/IJIPT.2017.088930
中图分类号
学科分类号
摘要
It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user’s trust value, so it can detect the user’s abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:236 / 242
页数:6
相关论文
共 50 条
  • [21] Research on Data Access Security Control Mechanism under Cloud Environment
    Jian, Li
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 633 - 636
  • [22] The Trusted Computing exemplary with Astonishing Security for Cloud Computing
    Devi, Ramya M.
    Balamurugan, P. S.
    Thanushkodi, K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (01): : 206 - 209
  • [23] TTS: A Study of Trusted Tenant System in Cloud Computing Environment
    Kunal, Kundan
    Malik, L. G.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [24] A trusted computing framework for cloud data security using role-based access and pattern recognition
    Pradhan, Gyanapriya
    Priyadarsini, Madhukrishna
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (05): : 6609 - 6622
  • [25] IoT Access Control Model Based on Blockchain and Trusted Execution Environment
    Jiang, Weijin
    Li, En
    Zhou, Wenying
    Yang, Ying
    Luo, Tiantian
    PROCESSES, 2023, 11 (03)
  • [26] An information flow security model to trusted computing system
    Hu Jun
    Shen Changxiang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 310 - +
  • [27] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [28] Security Access Model in Pervasive Computing Environment
    Zhou Y.-W.
    Yang B.
    Zhang W.-Z.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2017, 45 (04): : 959 - 965
  • [29] Access Control Research on Data Security in Cloud Computing
    Zhang, Pin
    Xu, Jing
    Muazu, Halilu
    Mao, Wenmin
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2015, : 873 - 877
  • [30] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212