Workflow and Role Based Access Control Model for Cloud Manufacturing

被引:4
|
作者
Lin, Xianhui [1 ,2 ]
Zhang, Xiaomei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Key Lab Broadband Wireless Networks, Wuhan 430070, Hubei, Peoples R China
关键词
cloud manufacturing; access control; RBAC; cloud security; TBAC;
D O I
10.1109/DASC.2013.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the "Software as a Service" concept to "Manufacture as a Service", sharing the "manufacturing resources and manufacturing capability". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.
引用
收藏
页码:65 / 71
页数:7
相关论文
共 50 条
  • [41] Resource and Role Based Access Control Model
    Li, Xingdong
    Jin, Zhengping
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
  • [42] A Dynamic Access Control Model Based on Game Theory for the Cloud
    Shao, Pengfei
    Jin, Shuyuan
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [43] Attributed Role Based Access Control Model
    Aftab, Muhammad Umar
    Habib, Muhammad Asif
    Mehmood, Nasir
    Aslam, Mubeen
    Irfan, Muhammad
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 83 - 89
  • [44] Semantic Role Based Access Control Model
    Semenova, N. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 16 (02): : 50 - 64
  • [45] Study on the hybrid-cloud-based access control model
    Cai, Ting (ct_dolphin@163.com), 1600, Universidad Central de Venezuela (55):
  • [46] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [47] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [48] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [49] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [50] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203