A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment

被引:0
|
作者
Bai, Xin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of information security technology and cloud computing, role-based access control (RBAC) technology has become a hot research topic in the field of access control and showed a great advantage in many enterprise cloud environment. But the cloud computing network environment is changing all the time, makes the traditional access control models is difficult to ensure the safety of data resources in process of interaction, with introducing the risk concept set on the basis of RBAC model, this paper puts forward a kind of dynamic role based access control (DRBAC) model, the identity authentication and role decision is divided into two levels of authentication mechanism, it identifies whether to allow the access to the target data according to the comprehensive risk brought by the user's risk level, which changes the static authorization of existing access models and improve the performance at the same time.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [21] Modelling and Verification of Dynamic Role-Based Access Control
    Vistbakka, Inna
    Troubitsyna, Elena
    VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 48 - 63
  • [22] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [23] Dynamic access control of encrypted data in cloud computing environment
    Xiang S.
    Zhu Z.
    International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [24] A logical approach to dynamic role-based access control
    Balbiani, Philippe
    Chevalier, Yannick
    El Houri, Marwa
    ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
  • [25] Role-based Access Control Using Ontology in Cloud Storage
    Sun, Hong
    Zhang, Xueqin
    Gu, Chunhua
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 1 - 12
  • [26] A Role-Based Access Control Model that Supports Authorization with The Combination of Static and Dynamic
    Li, Liangyu
    Liu, Yuanning
    Zhu, Xiaodong
    Huang, Biao
    Wang, Youwei
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 979 - 982
  • [27] Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem
    Jian Xu
    Yanbo Yu
    Qingyu Meng
    Qiyu Wu
    Fucai Zhou
    Mobile Networks and Applications, 2021, 26 : 1475 - 1492
  • [28] A Semantic-Aware Role-Based Access Control Model for Pervasive Computing Environments
    Javadi, Seyyed Ahmad
    Amini, Morteza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (02): : 119 - 140
  • [29] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [30] Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Hundera, Negalign Wake
    Ariyo, Oluwasanmi
    Zakria
    Ngo Tung Son
    Dinh, Tran Van
    SYMMETRY-BASEL, 2019, 11 (05):