A Trust-aware Access Control Policy for Cloud Data Protection

被引:0
|
作者
Tang, Xiaoyong [1 ]
Li, Jinwei [1 ]
Liao, Guiping [1 ]
机构
[1] Hunan Agr Univ, Informat Sci & Technol Coll, Changsha, Hunan, Peoples R China
关键词
Access control; trust; encryption; reputation;
D O I
10.4028/www.scientific.net/AMM.411-414.40
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [31] Joint trust: an approach for trust-aware routing in WSN
    Rodrigues, Paul
    John, Jacob
    WIRELESS NETWORKS, 2020, 26 (05) : 3553 - 3568
  • [32] Trust-Aware Data Uploading Based on Device-to-Device Communications
    Liu, Xiaolan
    Yang, Bin
    Jiang, Xiaohong
    2017 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS (NANA), 2017, : 309 - 313
  • [33] An Efficient Trust-Aware Task Scheduling Algorithm in Cloud Computing Using Firefly Optimization
    Mangalampalli, Sudheer
    Karri, Ganesh Reddy
    Elngar, Ahmed A. A.
    SENSORS, 2023, 23 (03)
  • [34] A green, energy, and trust-aware multi-objective cloud coalition formation approach
    Hadjres, Souad
    Belqasmi, Fatna
    El Barachi, May
    Kara, Nadjia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 52 - 67
  • [35] Statistical privacy protection for secure data access control in cloud ☆
    Baseri, Yaser
    Hafid, Abdelhakim
    Firoozjaei, Mahdi Daghmehchi
    Cherkaoui, Soumaya
    Ray, Indrakshi
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 84
  • [36] Risk-Aware Lightweight Data Access Control for Cloud-Assisted IIoT: A Zero-Trust Approach
    Routray, Kasturi
    Bera, Padmalochan
    PROCEEDINGS OF THE2024 SIGCOMM WORKSHOP ON ZERO TRUST ARCHITECTURE FOR NEXT GENERATION COMMUNICATIONS, ZTA-NEXTGEN 2024, 2024, : 40 - 42
  • [37] Trust Based Access Control Policy in Multi-domain of Cloud Computing
    Lin, Guoyuan
    Bie, Yuyu
    Lei, Min
    JOURNAL OF COMPUTERS, 2013, 8 (05) : 1357 - 1365
  • [38] TIDES: A Trust-Aware IoT Data Economic System With Blockchain-Enabled Multi-Access Edge Computing
    Chuang, I-Hsun
    Huang, Shih-Hao
    Chao, Wei-Chu
    Tsai, Jen-Sheng
    Kuo, Yau-Hwang
    IEEE ACCESS, 2020, 8 : 85839 - 85855
  • [39] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498
  • [40] Recommendation with diversity: An adaptive trust-aware model
    Yu, Ting
    Guo, Junpeng
    Li, Wenhua
    Wang, Harry Jiannan
    Fan, Ling
    DECISION SUPPORT SYSTEMS, 2019, 123