A Trust-aware Access Control Policy for Cloud Data Protection

被引:0
|
作者
Tang, Xiaoyong [1 ]
Li, Jinwei [1 ]
Liao, Guiping [1 ]
机构
[1] Hunan Agr Univ, Informat Sci & Technol Coll, Changsha, Hunan, Peoples R China
关键词
Access control; trust; encryption; reputation;
D O I
10.4028/www.scientific.net/AMM.411-414.40
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [21] Trust-Aware Resilient Control and Coordination of Connected and Automated Vehicles
    Ahmad, H. M. Sabbir
    Sabouni, Ehsan
    Xiao, Wei
    Cassandras, Christos G.
    Li, Wenchao
    2023 IEEE 26TH INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION SYSTEMS, ITSC, 2023, : 4309 - 4314
  • [22] A Trust-aware Framework for Evaluating Security Controls of Service Providers in Cloud Marketplaces
    Habib, Sheikh Mahbub
    Varadharajan, Vijay
    Muehlhaeuser, Max
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 459 - 468
  • [23] EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network
    Jin, Xing
    Li, Mingchu
    Wang, Zhen
    Guo, Cheng
    Ding, Hong
    Guan, Yong
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2021, 8 (02) : 522 - 536
  • [24] Trust-aware delivery of composite goods
    Despotovic, Z
    Aberer, K
    AGENTS AND PEER-TO-PEER COMPUTING, 2003, 2530 : 57 - 68
  • [25] Trust-Aware Crowdsourcing With Domain Knowledge
    Liu, Xiangyang
    Baras, John S.
    2015 54TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2015, : 2913 - 2918
  • [26] Trust-Aware Recommendation in Social Networks
    Xiao, Yingyuan
    Bu, Zhongjing
    Hsu, Ching-Hsien
    Zhu, Wenxin
    Shen, Yan
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017): 10TH INTERNATIONAL CONFERENCE, KSEM 2017, MELBOURNE, VIC, AUSTRALIA, AUGUST 19-20, 2017, PROCEEDINGS, 2017, 10412 : 380 - 388
  • [27] Joint trust: an approach for trust-aware routing in WSN
    Paul Rodrigues
    Jacob John
    Wireless Networks, 2020, 26 : 3553 - 3568
  • [28] Trust-Aware Service Chain Embedding
    Torkzaban, Nariman
    Papagianni, Chrysa
    Baras, John S.
    2019 SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE DEFINED SYSTEMS (SDS), 2019, : 242 - 247
  • [29] An Improved Trust Metric for Trust-aware Recommender Systems
    Wu, Zhili
    Yu, Xueli
    Sun, Jingyu
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 947 - 951
  • [30] Trust-Aware Review Spam Detection
    Xue, Hao
    Li, Fengjun
    Seo, Hyunjin
    Pluretti, Roseann
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 726 - 733