Method of Access Control Model Establishment for Marine Information Cloud Platforms Based on Docker Virtualization Technology

被引:0
|
作者
Shu, Jianwen [1 ]
Wu, Yulan [2 ]
机构
[1] Nanchang Hong Kong Univ, Sch Informat Engn, Nanchang 330063, Jiangxi, Peoples R China
[2] Nanchang Univ, Sch Sci & Technol, Nanchang 330029, Jiangxi, Peoples R China
关键词
Entropy theory; violation operation; security theorem; quantitative analysis;
D O I
10.2112/SI82-013.1
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Aiming at the problem that the current access control model is inefficient and computationally intensive for marine information access control in cloud platforms, a method of access control model establishment of marine information cloud platforms based on Docker is proposed. Information entropy theory is used to implement the violation operation, and the security theorem of the access control model is given in the form of security entropy. Docker container virtualization technology and an attribute-based ciphertext access control scheme are used to jointly control the user cross-domain and cross-level access, and ensure consistency in the control of illegal access to realize establishment of the marine information cloud platform access control model. The experimental results showed that the proposed method can improve the control efficiency while ensuring the security of access.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 50 条
  • [1] Virtualization Technology in Cloud Computing Based Radio Access Networks:A Primer
    ZHANG Xian
    PENG Mugen
    [J]. ZTE Communications, 2017, 15 (04) : 47 - 66
  • [2] Access control method of laboratory cloud data based on internet of things technology
    Wang, Liuyang
    Yu, Yangxin
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (01) : 31 - 47
  • [3] GSLAC: GPU Software Level Access Control for Information Isolation on Cloud Platforms
    Chia-Chang Li
    Po-Cheng Wu
    Che-Rung Lee
    [J]. 2023 IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE, CLOUDCOM 2023, 2023, : 34 - 41
  • [4] Privacy Aware Access Control for Cloud-Based Data Platforms
    McCarthy, Donal
    Malone, Paul
    Hange, Johannes
    Doyle, Kenny
    Robson, Eric
    Conway, Dylan
    Ivanov, Stepan
    Radziwonowicz, Lukasz
    Kleinfeld, Robert
    Michalareas, Theodoros
    Kastrinogiannis, Timotheos
    Stasinos, Nikos
    Lampathaki, Fenareti
    [J]. CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 26 - 37
  • [5] Naming Convention Scheme for Role Based Access Control in Cloud Based ERP Platforms
    Alshreef, Abed
    Li, Lin
    Rajeh, Wahid
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 84 - 93
  • [6] Securing Complex IoT Platforms with Token Based Access Control and Authenticated Key Establishment
    Claeys, Timothy
    Rousseau, Franck
    Tourancheau, Bernard
    [J]. 2017 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2017), 2017, : 1 - 9
  • [7] Automatic Control Model of Power Information System Access Based on Artificial Intelligence Technology
    Jiang, De Yong
    Zhang, Hong
    Kumar, Harish
    Naveed, Quadri Noorulhasan
    Takhi, Chandan
    Jagota, Vishal
    Jain, Rituraj
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2022, 2022
  • [8] Workflow and Role Based Access Control Model for Cloud Manufacturing
    Lin, Xianhui
    Zhang, Xiaomei
    [J]. 2013 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC), 2013, : 65 - 71
  • [9] A Dynamic Access Control Model Based on Game Theory for the Cloud
    Shao, Pengfei
    Jin, Shuyuan
    [J]. 2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [10] Study on the hybrid-cloud-based access control model
    [J]. Cai, Ting (ct_dolphin@163.com), 1600, Universidad Central de Venezuela (55):