A cloud-user behavior assessment based dynamic access control model

被引:3
|
作者
Jing X. [1 ]
Liu Z. [1 ]
Li S. [1 ]
Qiao B. [2 ]
Tan G. [1 ]
机构
[1] College of Information Engineering, Northwest A & F University, Shaanxi
[2] Department of Generic Technology Promotion, Coordinating Centre of Scientific and Technological Resources, Shaanxi
基金
国家高技术研究发展计划(863计划);
关键词
Access control; Cloud-user behavior risk; Dynamic authorization; Trust degree;
D O I
10.1007/s13198-015-0411-1
中图分类号
学科分类号
摘要
In traditional role-based access control (RBAC) model, the permission is bound with identity statically, without being dynamically adjusted by user behavior. Cloud users distribute widely and constitute complex and have legitimate identity whose behavior may be incredible, but any attack is achieved through malicious behavior. The cloud-user behavior assessment based dynamic access control model was proposed by introducing user behavior risk value, user trust degree and other factors into RBAC. First, the times of threat behavior was introduced into the information security risk equation to improve the accuracy of user behavior risk value. Then, both the times of threat behavior and the uneven interval of risk threshold were introduced the trust model based on behavior risk evolution to improve the accuracy of user trust degree. Finally, the dynamic authorization was achieved by mapping trust level and permissions. By the simulation experiment in a small campus cloud system, it can be shown that the change of user behavior risk value and user trust degree is more rational under different times and frequencies of threat behavior, and dynamic authorization is flexible by mapping the risk level and the user permissions. © 2015, The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden.
引用
收藏
页码:1966 / 1975
页数:9
相关论文
共 50 条
  • [41] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [42] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [43] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [44] Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud
    Babu, B. Mahesh
    Bhanu, Mary Saira
    ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015, 2015, 54 : 157 - 166
  • [45] Dynamic access control model for privacy preserving personalized healthcare in cloud environment
    Son, Jiseong
    Kim, Jeong-Dong
    Na, Hong-Seok
    Baik, Doo-Kwon
    TECHNOLOGY AND HEALTH CARE, 2016, 24 : S123 - S129
  • [46] A Dynamic Trust Evaluation Model of User Behavior Based on Transformer
    Yu, Xiuwen
    Huang, Rong
    Li, Yuancheng
    Qiu, Rixuan
    Zhou, Xin
    Liang, Liang
    Jing, Sitong
    International Journal of Network Security, 2022, 24 (06) : 975 - 983
  • [47] Efficient Outsourced Data Access Control with User Revocation for Cloud-based IoT
    Hao, Jialu
    Huang, Cheng
    Liu, Jian
    Xian, Ming
    Shen, Xuemin
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [48] Lattice based access control for protecting user data in cloud environments with hybrid security
    Saravanan, N.
    Umamakeswari, A.
    COMPUTERS & SECURITY, 2021, 100
  • [49] A survey of attribute-based access control with user revocation in cloud data storage
    Hwang, Min-Shiang (mshwang@asia.edu.tw), 1600, Femto Technique Co., Ltd. (18):
  • [50] Efficient Decentralized Attribute-based Access Control for Cloud Storage with User Revocation
    Chen, Jianwei
    Ma, Huadong
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 3782 - 3787