Workflow and Role Based Access Control Model for Cloud Manufacturing

被引:4
|
作者
Lin, Xianhui [1 ,2 ]
Zhang, Xiaomei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Key Lab Broadband Wireless Networks, Wuhan 430070, Hubei, Peoples R China
关键词
cloud manufacturing; access control; RBAC; cloud security; TBAC;
D O I
10.1109/DASC.2013.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the "Software as a Service" concept to "Manufacture as a Service", sharing the "manufacturing resources and manufacturing capability". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [31] Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
    Jian Xu
    Yanbo Yu
    Qingyu Meng
    Qiyu Wu
    Fucai Zhou
    Mobile Networks and Applications, 2021, 26 : 1475 - 1492
  • [32] Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
    Xu, Jian
    Yu, Yanbo
    Meng, Qingyu
    Wu, Qiyu
    Zhou, Fucai
    MOBILE NETWORKS & APPLICATIONS, 2021, 26 (04): : 1475 - 1492
  • [33] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [34] An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    Liu, Qiang
    Zhang, Hao
    Wan, Jiafu
    Chen, Xin
    IEEE ACCESS, 2017, 5 : 7001 - 7011
  • [35] Access control for workflow environment: The RTFW model
    Jiang, Hao
    Lu, Shengye
    COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN III, 2007, 4402 : 619 - +
  • [36] RTFW: An access control model for workflow environment
    Lu, Shengye
    Jiang, Hao
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 1005 - 1009
  • [37] TrustRBAC: Trust Role Based Access Control Model in Multi-Domain Cloud Environments
    Uikey, Chaitali
    Bhilare, D. S.
    2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION, INSTRUMENTATION AND CONTROL (ICICIC), 2017,
  • [38] The research on role-based access control mechanism for workflow management system
    Wang, BY
    Zhang, SM
    GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 729 - 736
  • [39] Decentralized access control with policy updating in cloud manufacturing
    Li L.
    Gu T.
    Chang L.
    Li J.
    Qian J.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2280 - 2290
  • [40] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242