An Access Control Method of Cloud Computing Resources Based on Quantified-Role

被引:0
|
作者
Wu, Chunlei [1 ]
Li, Zhongwei [1 ]
Cui, Xuerong [1 ]
机构
[1] China Univ Petr East China, Coll Comp & Commun Engn, Qingdao 266580, Peoples R China
关键词
cloud computing; information security; quantified role; behavior value; permissions adjustment;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A quantified-role based access control model for cloud computing is proposed to provide fine-grained authorization and dynamic adjustment of permissions. With quantified value assigned to permissions tuples, any part privileges of a role can be accurately described and managed. Behavior value is proposed to reflect a cloud user's operations security, and a mapping function from behavior value to quantified role is established. Theoretical analysis and application results show the presented model can significantly reduce number of roles in cloud computing systems, improve efficiency of authorization, and implement dynamic adjustment of cloud users' permissions.
引用
收藏
页码:919 / 923
页数:5
相关论文
共 50 条
  • [1] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    [J]. 2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [2] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    [J]. 2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [3] Design of Cloud Computing Resources based on Web Access Model
    Wu Jing
    Zhao Fengzhi
    Dong Yudan
    [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING II, PTS 1-3, 2013, 433-435 : 1756 - 1759
  • [4] Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing
    Yoon, Jong P.
    Chen, Z.
    [J]. NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 358 - 368
  • [5] QPBFT: Practical Byzantine Fault Tolerance Consensus Algorithm Based on Quantified-role
    Zhang, Zhujun
    Zhu, Dali
    Fan, Wei
    [J]. 2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 992 - 998
  • [6] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [7] Resources allocation method on cloud computing
    Wei Ming
    Zhang Chunyan
    Qiu Feng
    Cui Yu
    Sui Qiangqiang
    Ding Wanbing
    [J]. PROCEEDINGS 2014 INTERNATIONAL CONFERENCE ON SERVICE SCIENCES (ICSS 2014), 2014, : 199 - 201
  • [8] ACCESS CONTROL MECHANISM FOR COMPUTING RESOURCES
    GLADNEY, HM
    WORLEY, EL
    MYERS, JJ
    [J]. IBM SYSTEMS JOURNAL, 1975, 14 (03) : 212 - 228
  • [9] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [10] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,