A Trust-aware Access Control Policy for Cloud Data Protection

被引:0
|
作者
Tang, Xiaoyong [1 ]
Li, Jinwei [1 ]
Liao, Guiping [1 ]
机构
[1] Hunan Agr Univ, Informat Sci & Technol Coll, Changsha, Hunan, Peoples R China
关键词
Access control; trust; encryption; reputation;
D O I
10.4028/www.scientific.net/AMM.411-414.40
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [41] Adversarial dual autoencoders for trust-aware recommendation
    Manqing Dong
    Lina Yao
    Xianzhi Wang
    Xiwei Xu
    Liming Zhu
    Neural Computing and Applications, 2023, 35 : 13065 - 13075
  • [42] Community and trust-aware fake media detection
    Rashed, Khaled Ahmed Nagi
    Renzel, Dominik
    Klamma, Ralf
    Jarke, Matthias
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (02) : 1069 - 1098
  • [43] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [44] Privacy Aware Access Control for Cloud-Based Data Platforms
    McCarthy, Donal
    Malone, Paul
    Hange, Johannes
    Doyle, Kenny
    Robson, Eric
    Conway, Dylan
    Ivanov, Stepan
    Radziwonowicz, Lukasz
    Kleinfeld, Robert
    Michalareas, Theodoros
    Kastrinogiannis, Timotheos
    Stasinos, Nikos
    Lampathaki, Fenareti
    CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 26 - 37
  • [45] Community and trust-aware fake media detection
    Khaled Ahmed Nagi Rashed
    Dominik Renzel
    Ralf Klamma
    Matthias Jarke
    Multimedia Tools and Applications, 2014, 70 : 1069 - 1098
  • [46] Trust-aware collaborative filtering for recommender systems
    Massa, P
    Avesani, P
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: COOPIS, DOA, AND ODBASE, PT 1, PROCEEDINGS, 2004, 3290 : 492 - 508
  • [47] Trust-aware recommendation for improving aggregate diversity
    Liu, Haifeng
    Bai, Xiaomei
    Yang, Zhuo
    Tolba, Amr
    Xia, Feng
    NEW REVIEW OF HYPERMEDIA AND MULTIMEDIA, 2015, 21 (3-4) : 242 - 258
  • [48] Trust-aware process design: the case of GoFood
    Mahendrawathi, E. R.
    Funke, Carola
    Rosemann, Michael
    Goetz, Franziska
    Wruck, Tabitha Marie
    BUSINESS PROCESS MANAGEMENT JOURNAL, 2022, 28 (02) : 348 - 371
  • [49] UMLtrust: Towards Developing Trust-Aware Software
    Uddin, Mohammad Gias
    Zulkernine, Mohammad
    APPLIED COMPUTING 2008, VOLS 1-3, 2008, : 831 - +
  • [50] Trust-aware Location Recommendation for User Groups
    Teoman, Huseyin Alper
    Karagoz, Pinar
    APPLIED COMPUTING REVIEW, 2022, 22 (03): : 39 - 55