An assurance model for access control on cloud computing systems

被引:0
|
作者
Li Y. [1 ,2 ,3 ]
Zhao Y. [2 ,3 ]
Guo X. [1 ]
Liu G. [1 ]
机构
[1] National Secrecy Science and Technology Evaluation Center, Beijing
[2] College of Computer Science, Beijing University of Technology, Beijing
[3] Beijing Key Laboratory of Trusted Computing, Beijing
来源
| 1600年 / Tsinghua University卷 / 57期
关键词
Access control; Access control linkage; Assurance model; Cloud computing security;
D O I
10.16511/j.cnki.qhdxxb.2017.25.017
中图分类号
学科分类号
摘要
An access control points in cloud computing are difficult to link. An assurance model for access control on the whole system was developed based on formal definitions of the access request equivalence relation and the support relation, the analysis formally proves that the assurance algorithm can ensure the credibility of access requests. The implementation methods are given for the network layer, application layer and operating system kernel layer in cloud computing. An access semantic encapsulation shows that the algorithm meets the access control linkage requirements and can ensure the credibility of access requests. © 2017, Tsinghua University Press. All right reserved.
引用
收藏
页码:432 / 436
页数:4
相关论文
共 35 条
  • [1] Yu N., Hao Z., Xu J., Et al., Review of cloud computing security, Acta Electronica Sinica, 41, 2, pp. 371-381, (2013)
  • [2] Gentry C., Fully homomorphic encryption using ideal lattices, Symposium on Theory of Computing, STOC 2009, pp. 169-178, (2009)
  • [3] Dijk M.V., Gentry C., Halevi S., Et al., Fully homomorphic encryption over the integers, Advances in Cryptology-EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 24-43, (2010)
  • [4] Gentry C., A Fully Homomorphic Encryption Scheme, (2009)
  • [5] Amazon simple storage service
  • [6] Amazon elastic block storage
  • [7] Hao F., Lakshman T.V., Mukherjee S., Et al., Secure cloud computing with a virtualized network infrastructure, Usenix Conference on Hot Topics in Cloud Computing, pp. 57-61, (2010)
  • [8] Oberheide J., Cooke E., Jahanian F., Cloud AV: N-version antivirus in the network cloud, Proceedings of the 17th Conference on Security Symposium, pp. 91-106, (2008)
  • [9] Yu S., Wang C., Ren K., Et al., Achieving secure, scalable, and fine-grained data access control in cloud computing, Proceedings of the IEEE INFOCOM 2010, pp. 1-9, (2010)
  • [10] Wang G., Liu Q., Wu J., Hierarchical attribute-based encryption for fine-grained access control in cloud storage services, Proceedings of the 2010 ACM Conference on Computer & Communications Security, pp. 735-737, (2010)