An access model under cloud computing environment

被引:4
|
作者
Gu, Wen [1 ]
Yang, Cao [1 ]
Yi, Ying [1 ]
机构
[1] SanJiang Univ, Coll Comp Sci & Engn, Nanjing 210012, Peoples R China
关键词
cloud computing; SaaS; multi-tenant; access control; SCHEME; SECURITY;
D O I
10.1504/IJCSE.2020.107355
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Concepts such as virtualisation, elasticity, and multi-tenancy have been embedded in cloud computing environments. Thus, the traditional access control model is no longer applicable to cloud computing environments, and designing a new access control model specific to the features of cloud computing environments is necessary. The software as a service (SaaS) pattern has gradually emerged as a type of cloud computing model that can address the information management requirements of small- and medium-sized enterprises. Given the features of SaaS application platforms, this study proposes a multi-tenant access control model called ST-RBAC under the SaaS pattern on the basis of a discussion of the current situation of access control models. The proposed model successfully deals with relationships among elements such as tenants, users, roles, and permissions. Hence, it can effectively guarantee user data safety and user permission management.
引用
收藏
页码:328 / 334
页数:7
相关论文
共 50 条
  • [21] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [22] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    [J]. INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [23] Research on Business System Health Evaluation Model under the Cloud Computing Environment
    Yuan, Shouzheng
    Xiao, Yanghua
    Pei, Guocai
    [J]. 2013 2ND INTERNATIONAL CONFERENCE ON EDUCATION REFORM AND MANAGEMENT INNOVATION (ERMI 2013) , PT 2, 2013, 45 : 27 - 33
  • [24] Study on dynamic resource allocation optimization model under cloud computing environment
    You, Xiao-Ming
    Liu, Kai
    Liu, Sheng
    Wang, Yu-Ming
    [J]. Xitong Gongcheng Lilun yu Shijian/System Engineering Theory and Practice, 2014, 34 : 234 - 238
  • [25] Dynamic access control of encrypted data in cloud computing environment
    Xiang S.
    Zhu Z.
    [J]. International Journal of Performability Engineering, 2019, 15 (03) : 969 - 976
  • [26] REVERSIBLE HIDDEN DATA ACCESS ALGORITHM IN CLOUD COMPUTING ENVIRONMENT
    Xu, Jinsong
    [J]. DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS-SERIES S, 2019, 12 (4-5): : 1219 - 1232
  • [27] Research into Synthesizing Access Control Strategies in Cloud Computing Environment
    Ni, Ping
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ELECTRONICS, MECHANICS, CULTURE AND MEDICINE, 2016, 45 : 440 - 445
  • [28] Access control based resource allocation in cloud computing environment
    Wang J.
    Liu J.
    Zhang H.
    [J]. Liu, Jinliang (836251714@qq.com), 1600, Femto Technique Co., Ltd. (19): : 236 - 243
  • [29] A Secured Resource Access Management in Educational Cloud Computing Environment
    Idrissa, Saley Mato
    Djibo, Karimou
    Bisso, Saley
    Saliah-Hassane, Hamadou
    [J]. 2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 14 - 19
  • [30] Trust Model Research in Cloud Computing Environment
    Ding, Haiyang
    Li, Xiguang
    Gong, Changqing
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL SYMPOSIUM ON COMPUTERS & INFORMATICS, 2015, 13 : 1089 - 1096