The Legitimacy Detection for Multilevel Hybrid Cloud Algorithm Based Data Access

被引:0
|
作者
Li, Na [1 ]
Dong, Yunwei [1 ]
Che Tianwei [2 ]
Wang, Chao [3 ]
Gao, Yang [4 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710072, Peoples R China
[2] Xidian Univ, Sch Comp Sci & Technol, Xian 710071, Peoples R China
[3] PLA Informat Engn Univ, Zhengzhou 450004, Peoples R China
[4] Xian Inst Surveying & Mapping, Xian 710054, Peoples R China
关键词
global flow graph; access violation; unauthorized access; access control; detection algorithm;
D O I
10.1109/QRS-C.2015.44
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper a joint algorithm was designed to detect a variety of unauthorized access risks in multilevel hybrid cloud. Firstly historical visit were recorded among different virtual machines in multilevel hybrid cloud by use of the global flow diagram. Secondly with the global flow graph as auxiliary decision-making basis to design legitimacy detection algorithm based data access and carried on the formal representation, Finally the implement process was specified the algorithm can effectively detect operating against regulations such as simple unauthorized level across and beyond indirect unauthorized and other irregularities.
引用
收藏
页码:169 / 172
页数:4
相关论文
共 50 条
  • [1] Trust based access control with hybrid cryptographic algorithm based data security on cloud for e-learning application
    Dinesh, E.
    Sivakumar, M.
    Rajalakshmi, R.
    Sivakumar, P.
    [J]. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2023, 45 (05) : 7563 - 7573
  • [2] Hybrid Cloud Detection Algorithm Based on Intelligent Scene Recognition
    Li, Fang-Fang
    Zuo, Hui-Min
    Jia, Ying-Hui
    Wang, Qi
    Qiu, Jun
    [J]. JOURNAL OF ATMOSPHERIC AND OCEANIC TECHNOLOGY, 2022, 39 (06) : 837 - 847
  • [3] Massive Data Hybrid Encryption Algorithm Based on Cloud Computing
    Yang, Ersong
    You, Lin
    Wu, Zhendong
    Yu, Wangke
    [J]. MATERIAL SCIENCE, CIVIL ENGINEERING AND ARCHITECTURE SCIENCE, MECHANICAL ENGINEERING AND MANUFACTURING TECHNOLOGY II, 2014, 651-653 : 1864 - 1867
  • [4] A Hybrid Attribute Based Access Control Model Applied to Data in a Hybrid Cloud Environment
    Miller, Grant
    [J]. PROCEEDINGS OF THE 15TH ACM INTERNATIONAL CONFERENCE ON SYSTEMS AND STORAGE, SYSTOR 2022, 2022, : 150 - 150
  • [5] Efficient Data Access in Hybrid Cloud Storage
    Samy, Islam
    Koyluoglu, O. Ozan
    Rawat, Ankit Singh
    [J]. 2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 1 - 8
  • [6] An optimization algorithm of data access storage in cloud computing based on distributed system
    Ye, Lunqiang
    [J]. BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 125 : 27 - 28
  • [7] An Enhanced hybrid Data Security Algorithm for Cloud
    Soman, Vikas K.
    Natarajan, V
    [J]. 2017 INTERNATIONAL CONFERENCE ON NETWORKS & ADVANCES IN COMPUTATIONAL TECHNOLOGIES (NETACT), 2017, : 416 - 419
  • [8] Data Security in Cloud as a Service for Access Control Among Multilevel Users
    Abbasi, Khurrum Mustafa
    ul Haq, Irfan
    Malik, Ahmad Kamran
    Khan, Tamim Ahmed
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 168 - 173
  • [9] Cloud model-based outlier detection algorithm for categorical data
    Lei, Dajiang
    Zhang, Liping
    Zhang, Lisheng
    [J]. Lei, D. (leidj@cqupt.edu.cn), 1600, Science and Engineering Research Support Society, 20 Virginia Court, Sandy Bay, Tasmania, Australia (06): : 199 - 214
  • [10] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283