A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment

被引:0
|
作者
Bai, Xin [1 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the development of information security technology and cloud computing, role-based access control (RBAC) technology has become a hot research topic in the field of access control and showed a great advantage in many enterprise cloud environment. But the cloud computing network environment is changing all the time, makes the traditional access control models is difficult to ensure the safety of data resources in process of interaction, with introducing the risk concept set on the basis of RBAC model, this paper puts forward a kind of dynamic role based access control (DRBAC) model, the identity authentication and role decision is divided into two levels of authentication mechanism, it identifies whether to allow the access to the target data according to the comprehensive risk brought by the user's risk level, which changes the static authorization of existing access models and improve the performance at the same time.
引用
收藏
页码:14 / 20
页数:7
相关论文
共 50 条
  • [1] Role-based access control model for ubiquitous computing environment
    Chae, SH
    Kim, W
    Kim, DK
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 3786 : 354 - 363
  • [2] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    [J]. PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [3] A Trusted Role-Based Access Control Model for Dynamic Collaboration in a Federated Environment
    Lianzhong, Liu
    Peng, Liu
    [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 181 - 186
  • [4] A context, rule and role-based access control model in enterprise pervasive computing environment
    Huang, Xianzhi
    Wang, Haiyang
    Chen, Zhenxiang
    Lin, Jinjiao
    [J]. 2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS, 2006, : 497 - +
  • [5] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    [J]. International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [6] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [7] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [8] Garbled role-based access control in the cloud
    Alam, Masoom
    Emmanuel, Naina
    Khan, Tanveer
    Xiang, Yang
    Hassan, Houcine
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1153 - 1166
  • [9] A Context-Sensitive Dynamic Role-Based Access Control Model for Pervasive Computing Environments
    Emami, Sareh Sadat
    Zokaei, Saadan
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 47 - 66
  • [10] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,