System security model based on trusted access control under cloud computing environment

被引:0
|
作者
Wang F. [1 ]
机构
[1] Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot
来源
Wang, Fengqi (fengqiwang@21cn.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 10期
关键词
Access control; Context; RBAC; Security; Trust degree;
D O I
10.1504/IJIPT.2017.088930
中图分类号
学科分类号
摘要
It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user’s trust value, so it can detect the user’s abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:236 / 242
页数:6
相关论文
共 50 条
  • [31] Agent-based access control security in grid computing environment
    Lin, J
    Wang, C
    Guo, YH
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 159 - 162
  • [32] A Model of Illegal Access Detection System Under Cloud Environment
    Zheng, Lei
    MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1761 - 1766
  • [33] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [34] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [35] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [36] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Xin Jin
    Qixu Wang
    Xiang Li
    Xingshu Chen
    Wei Wang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 520 - 534
  • [37] Cloud Virtual Machine Lifecycle Security Framework Based on Trusted Computing
    Jin, Xin
    Wang, Qixu
    Li, Xiang
    Chen, Xingshu
    Wang, Wei
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 520 - 534
  • [38] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [39] Location and Time Based Access Security Control Scheme for Mobile Cloud Computing
    Merdassi, Imen
    Ghazel, Cherif
    Saidane, Leila
    2023 12TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN, 2023,
  • [40] A cloud computing-based ERP system under the cloud manufacturing environment
    Yang, Nan
    Li, Dongbo
    Tong, Yifei
    International Journal of Digital Content Technology and its Applications, 2012, 6 (23) : 126 - 134