An access model under cloud computing environment

被引:4
|
作者
Gu, Wen [1 ]
Yang, Cao [1 ]
Yi, Ying [1 ]
机构
[1] SanJiang Univ, Coll Comp Sci & Engn, Nanjing 210012, Peoples R China
关键词
cloud computing; SaaS; multi-tenant; access control; SCHEME; SECURITY;
D O I
10.1504/IJCSE.2020.107355
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Concepts such as virtualisation, elasticity, and multi-tenancy have been embedded in cloud computing environments. Thus, the traditional access control model is no longer applicable to cloud computing environments, and designing a new access control model specific to the features of cloud computing environments is necessary. The software as a service (SaaS) pattern has gradually emerged as a type of cloud computing model that can address the information management requirements of small- and medium-sized enterprises. Given the features of SaaS application platforms, this study proposes a multi-tenant access control model called ST-RBAC under the SaaS pattern on the basis of a discussion of the current situation of access control models. The proposed model successfully deals with relationships among elements such as tenants, users, roles, and permissions. Hence, it can effectively guarantee user data safety and user permission management.
引用
收藏
页码:328 / 334
页数:7
相关论文
共 50 条
  • [1] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [2] System security model based on trusted access control under cloud computing environment
    Wang F.
    [J]. Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [3] Profile Based Access Control Model in Cloud Computing Environment
    Namasudra, Suyel
    Nath, Samir
    Majumder, Abhishek
    [J]. 2014 INTERNATIONAL CONFERENCE ON GREEN COMPUTING COMMUNICATION AND ELECTRICAL ENGINEERING (ICGCCEE), 2014,
  • [4] Research on the resource monitoring model under cloud computing environment
    College of Software, Chongqing University of Posts and Telecommunications, Chongqing 400065, China
    不详
    [J]. Lect. Notes Comput. Sci., M4D (111-118):
  • [5] Research on the Resource Monitoring Model Under Cloud Computing Environment
    Ge, Junwei
    Zhang, Bo
    Fang, Yiqiu
    [J]. WEB INFORMATION SYSTEMS AND MINING, 2010, 6318 : 111 - +
  • [6] A Model of Illegal Access Detection System Under Cloud Environment
    Zheng, Lei
    [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1761 - 1766
  • [7] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [8] Electronic Commerce Personalized Recommendation Model under Cloud Computing Environment
    Gong, Songjie
    Xu, Jiongbo
    [J]. APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 639 - 642
  • [9] Data Model for Cloud Computing Environment
    Akintoye, Samson B.
    Bagula, Antoine B.
    Isafiade, Omowumi E.
    Djemaiel, Yacine
    Boudriga, Noureddine
    [J]. E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES, AFRICOMM 2018, 2019, 275 : 199 - 215
  • [10] A Trust Model for Cloud Computing environment
    Branco, Teofilo Teixeira
    Santos, Henrique
    [J]. PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON CLOUD SECURITY AND MANAGEMENT (ICCSM-2015), 2015, : 1 - 15