System security model based on trusted access control under cloud computing environment

被引:0
|
作者
Wang F. [1 ]
机构
[1] Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot
来源
Wang, Fengqi (fengqiwang@21cn.com) | 1600年 / Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland卷 / 10期
关键词
Access control; Context; RBAC; Security; Trust degree;
D O I
10.1504/IJIPT.2017.088930
中图分类号
学科分类号
摘要
It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user’s trust value, so it can detect the user’s abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users. Copyright © 2017 Inderscience Enterprises Ltd.
引用
收藏
页码:236 / 242
页数:6
相关论文
共 50 条
  • [41] Performance analysis of trusted security environment in cloud
    Sharma, Satyajeet
    Sharma, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 657 - 666
  • [42] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    HighTechnologyLetters, 2015, 21 (02) : 200 - 204
  • [43] Research on trusted Access in edge computing environment
    Liang, Zheheng
    Zhang, Xiaolu
    Zhang, Jinbo
    Zeng, Jijun
    Long, Zhenyue
    2022 IEEE 6TH ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2022, : 240 - 244
  • [44] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [45] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [46] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [47] Adaptive Security Management Model in the Cloud Computing Environment
    Jung, Youngmin
    Chung, Mokdong
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 1664 - 1669
  • [48] A novel access control model in cloud computing
    Chang, Lingxia
    Wang, Fengying
    ICIC Express Letters, 2014, 8 (08): : 2163 - 2168
  • [49] An Access Control Model for Cloud Computing Environments
    Thomas, Manoj V.
    Sekaran, K. Chandra
    2013 SECOND INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, NETWORKING AND SECURITY (ADCONS 2013), 2013, : 226 - 231
  • [50] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56