Access control security model based on dual identity authentication in cloud computing environment

被引:0
|
作者
Ning, Yumei [1 ]
Ding, Zhenguo [1 ]
Zeng, Ping [1 ,2 ]
Wang, Chen [1 ]
机构
[1] School of Computer Science and Technology, Xidian University, Xi'an 710071, China
[2] Department of Computer Science and Technology, Xi'an Shiyou University, Xi'an 710065, China
关键词
Hash functions - Authentication;
D O I
暂无
中图分类号
学科分类号
摘要
An access control security model based on twofold user authentication was put forward for user's access security issues in cloud computing environment. Based on the characteristics of one-way hash function, using the uniqueness of the user's fingerprint and the host MAC, an access control policy was established according to the type of user authentication. And a mutual authentication relationship between users and cloud servers was established to ensure the both legal status and to guarantee the cloud computing environment information privacy and integrity.
引用
收藏
页码:288 / 292
相关论文
共 50 条
  • [31] Agent-based access control security in grid computing environment
    Lin, J
    Wang, C
    Guo, YH
    2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 159 - 162
  • [32] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [33] Attribute-based access control model for cloud computing
    Wang, Jingyu
    Feng, Lixiao
    Zheng, Xuefeng
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2090 - 2097
  • [34] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [35] Hierarchical Attribute-based Access Control with Authentication for Outsourced Data in Cloud Computing
    Liu, Xuejiao
    Xia, Yingjie
    Jiang, Shasha
    Xia, Fubiao
    Wang, Yanbo
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 477 - 484
  • [36] Authentication-based access control approach for enhancing security in pervasive computing environments
    Gnaneshwari, G. R.
    Hema, M. S.
    Lingareddy, S. C.
    INTERNATIONAL JOURNAL OF PERVASIVE COMPUTING AND COMMUNICATIONS, 2023, 19 (02) : 211 - 232
  • [37] A Semantic-Based Access Control for Ensuring Data Security in Cloud Computing
    Auxilia, M.
    Raja, K.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 171 - 175
  • [38] Location and Time Based Access Security Control Scheme for Mobile Cloud Computing
    Merdassi, Imen
    Ghazel, Cherif
    Saidane, Leila
    2023 12TH IFIP/IEEE INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS, PEMWN, 2023,
  • [39] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    HighTechnologyLetters, 2015, 21 (02) : 200 - 204
  • [40] Efficient Identity Management and Access Control in Cloud Environment
    Gloster, Jonathan
    CYBER SENSING 2013, 2013, 8757