Trusted Access Control Model Based on Role and Task in Cloud Computing

被引:0
|
作者
Fan Yue-qin [1 ,2 ]
Zhang Yong-sheng [1 ,2 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Peoples R China
[2] Shandong Prov Key Lab Novel Distributed Comp Soft, Shandong, Peoples R China
关键词
access control; reputation value; cloud computing;
D O I
10.1109/ITME.2015.115
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to prevent illegal users access the cloud data frequently, this paper puts forward trusted access control model based on role-task in cloud computing. It can prevent the illegal users accessing cloud data more effectively. Combining the advantages of the role access control model and the task access control model, the concept of reputation value will be introduced, and a certain threshold will be given. It can control the user's interview times by judging the number of reputation value. What's more, it can make the users access cloud data based on historical records, and reduce the times of users of the frequent malignant access to data in the cloud effectively. Finally the experiment result shows that this access control is much more suitable for the dynamic access.
引用
收藏
页码:710 / 713
页数:4
相关论文
共 50 条
  • [1] Defending of Trusted Access Control in Cloud Computing
    Mandhala, Venkata Naresh
    Chinnam, Siva Koteswara Rao
    Kim, Tai-hoon
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 163 - 166
  • [2] System security model based on trusted access control under cloud computing environment
    [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10):
  • [3] An Enhanced Access Control Model Based on Trusted Computing
    Hu, Kuanmin
    Cai, Guoyang
    Shen, Chengsheng
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 920 - 928
  • [4] Study on Access Control Based on Trusted Computing
    Ma, Xinqiang
    Huang, Yi
    Bo Lv
    [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 980 - +
  • [5] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [6] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [7] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31
  • [8] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [9] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    [J]. INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [10] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    [J]. PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242