Attribute-based access control model for cloud computing

被引:0
|
作者
Wang, Jingyu [1 ,2 ]
Feng, Lixiao [2 ]
Zheng, Xuefeng [1 ]
机构
[1] School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing,100083, China
[2] School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou,014010, China
关键词
Access control models - Decision making;
D O I
10.11817/j.issn.1672-7207.2015.06.016
中图分类号
学科分类号
摘要
A cloud computing attributes-based access control(CC-ABAC) model was proposed to solve the multi-domains access control problem in cloud computing. An attribute-based access control method was utilized to realize the local-domain and cross-domain access decisions in this model. The formal description of model and core decision algorithm were given. A semaphore and P/V operation mechanism was designed to solve the incompatible problem of call and update the attribute list in the inter-domains properties synchronization. The simulation results show that the model not only realizes fine-grained access control, but also reduces the access control decision time and improves decision-making efficiency. ©, 2015, Central South University of Technology. All right reserved.
引用
收藏
页码:2090 / 2097
相关论文
共 50 条
  • [31] A Model Checking Based Approach for Verification of Attribute-Based Access Control Policies in Cloud Infrastructures
    Kotenko, Igor
    Saenko, Igor
    Levshun, Dmitry
    PROCEEDINGS OF THE FOURTH INTERNATIONAL SCIENTIFIC CONFERENCE INTELLIGENT INFORMATION TECHNOLOGIES FOR INDUSTRY (IITI'19), 2020, 1156 : 165 - 175
  • [32] Efficient Anonymous Attribute-Based Encryption with Access Policy Hidden for Cloud Computing
    Huang, Chanying
    Yan, Kedong
    Wei, Songjie
    Zhang, Gongxuan
    Lee, Dong Hoon
    PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON PROGRESS IN INFORMATICS AND COMPUTING (PIC 2017), 2017, : 266 - 270
  • [33] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [34] Survey on attribute-based encryption in cloud computing
    Ancy, P.R.
    Krishna, Addapalli V.N.
    Balachandran, K.
    Balamurugan, M.
    Prakasi, O.S. Gnana
    Ancy, P.R. (ancy.prasadam@res.christuniversity.in), 1600, Femto Technique Co., Ltd. (22): : 863 - 868
  • [35] Attribute-based Encryption in Cloud Computing Environment
    Yan, Yuping
    Kamel, Mohammed B. M.
    Ligeti, Peter
    2020 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE, 2020, : 63 - 68
  • [36] A Time and Mutable Attribute-Based Access Control Model
    Yang, Ran
    Lin, Chuang
    Feng, Fujun
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 510 - 518
  • [37] OUTSOURCED ATTRIBUTE-BASED SIGNCRYPTION IN THE CLOUD COMPUTING
    Negalign, Hundera W.
    Xiong, Hu
    Addis, Assefa A.
    Ashenafi, Gemechu Y.
    Dagmawit, Geresu M.
    2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 40 - 44
  • [38] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    SOFSEM 2015: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2015, 8939 : 566 - 577
  • [39] Attribute-Based Encryption Optimized for Cloud Computing
    Horvath, Mate
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (02): : 1 - 9
  • [40] New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing
    Zhang, Leyou
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (05): : 1343 - 1356