Method of Access Control Model Establishment for Marine Information Cloud Platforms Based on Docker Virtualization Technology

被引:0
|
作者
Shu, Jianwen [1 ]
Wu, Yulan [2 ]
机构
[1] Nanchang Hong Kong Univ, Sch Informat Engn, Nanchang 330063, Jiangxi, Peoples R China
[2] Nanchang Univ, Sch Sci & Technol, Nanchang 330029, Jiangxi, Peoples R China
关键词
Entropy theory; violation operation; security theorem; quantitative analysis;
D O I
10.2112/SI82-013.1
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Aiming at the problem that the current access control model is inefficient and computationally intensive for marine information access control in cloud platforms, a method of access control model establishment of marine information cloud platforms based on Docker is proposed. Information entropy theory is used to implement the violation operation, and the security theorem of the access control model is given in the form of security entropy. Docker container virtualization technology and an attribute-based ciphertext access control scheme are used to jointly control the user cross-domain and cross-level access, and ensure consistency in the control of illegal access to realize establishment of the marine information cloud platform access control model. The experimental results showed that the proposed method can improve the control efficiency while ensuring the security of access.
引用
收藏
页码:99 / 105
页数:7
相关论文
共 50 条
  • [31] Access Control for Multi-tenancy in Cloud-based Health Information Systems
    Anwar, Mohd
    Imran, Ashiq
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 104 - 110
  • [32] Cloud Data Access Prevention Method in Face Recognition Technology Based on Computer Vision
    Qian, Mingzhu
    Wang, Xiaobao
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [33] An information flow control model for C applications based on access control lists
    Chou, SC
    Chang, CY
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 78 (01) : 84 - 100
  • [34] Blockchain Privacy Data Access Control Method Based on Cloud Platform Data
    Sun, Biying
    Dang, Qian
    Qiu, Yu
    Yan, Lei
    Du, Chunhui
    Liu, Xiaoqin
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (06) : 10 - 17
  • [35] An Access Control Method of Cloud Computing Resources Based on Quantified-Role
    Wu, Chunlei
    Li, Zhongwei
    Cui, Xuerong
    [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 919 - 923
  • [36] Cloud Model Based Intelligent Control for Marine Hydraulic Steering Gear System
    Huang, Yongfeng
    Guo, Chen
    Sun, Jianbo
    Huo, Yutong
    [J]. PROCEEDINGS OF 2017 CHINESE INTELLIGENT AUTOMATION CONFERENCE, 2018, 458 : 647 - 654
  • [37] The Recognition Method of Radiation Source Based on Information Entropy and Cloud Model
    Lin, Yun
    Wang, Can
    Ma, Chunguang
    Dou, Zheng
    Wu, Zhiqiang
    Zhang, Zhiping
    [J]. INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2016, 9 (02): : 33 - 42
  • [38] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    [J]. High Technology Letters, 2015, 21 (02) : 200 - 204
  • [39] A Provenance-Based Access Control Model for Securely Storing Data in Cloud
    Mirajkar, Shweta Balasaheb
    Khatawkar, S. D.
    [J]. 2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 906 - 909
  • [40] Cloud Multidomain Access Control Model Based on Role and Trust-Degree
    Xie, Lixia
    Wang, Chong
    [J]. JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016