A Trust-aware Access Control Policy for Cloud Data Protection

被引:0
|
作者
Tang, Xiaoyong [1 ]
Li, Jinwei [1 ]
Liao, Guiping [1 ]
机构
[1] Hunan Agr Univ, Informat Sci & Technol Coll, Changsha, Hunan, Peoples R China
关键词
Access control; trust; encryption; reputation;
D O I
10.4028/www.scientific.net/AMM.411-414.40
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
The use of Cloud computing systems to run large-scale scientific, business and consumer based IT applications has increased rapidly in recent years. More and more Cloud users concern the data privacy protection and security in such systems. A natural way to tackle this problem is to adopt data encryption and access control policy. However, this solution is inevitably introduced a heavy computation overhead. In this paper, we first establish a trust model between Cloud servers and Cloud users. Then, we build the trust-aware attribute-based access control policies according to Cloud user trust level and Cloud request attributes. This technique can give different encryption and decryption data to Cloud user and substantive reduce the computation overhead of Cloud computing.
引用
收藏
页码:40 / 44
页数:5
相关论文
共 50 条
  • [41] Adversarial dual autoencoders for trust-aware recommendation
    Manqing Dong
    Lina Yao
    Xianzhi Wang
    Xiwei Xu
    Liming Zhu
    Neural Computing and Applications, 2023, 35 : 13065 - 13075
  • [42] Community and trust-aware fake media detection
    Rashed, Khaled Ahmed Nagi
    Renzel, Dominik
    Klamma, Ralf
    Jarke, Matthias
    MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (02) : 1069 - 1098
  • [43] Community and trust-aware fake media detection
    Khaled Ahmed Nagi Rashed
    Dominik Renzel
    Ralf Klamma
    Matthias Jarke
    Multimedia Tools and Applications, 2014, 70 : 1069 - 1098
  • [44] Trust-aware collaborative filtering for recommender systems
    Massa, P
    Avesani, P
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2004: COOPIS, DOA, AND ODBASE, PT 1, PROCEEDINGS, 2004, 3290 : 492 - 508
  • [45] Privacy Aware Access Control for Data Sharing in Cloud Computing Environments
    Takabi, Hassan
    SCC'14: PROCEEDINGS OF THE 2ND INTERNATIONAL WORKSHOP ON SECURITY IN CLOUD COMPUTING, 2014, : 27 - 34
  • [46] Privacy Aware Access Control for Cloud-Based Data Platforms
    McCarthy, Donal
    Malone, Paul
    Hange, Johannes
    Doyle, Kenny
    Robson, Eric
    Conway, Dylan
    Ivanov, Stepan
    Radziwonowicz, Lukasz
    Kleinfeld, Robert
    Michalareas, Theodoros
    Kastrinogiannis, Timotheos
    Stasinos, Nikos
    Lampathaki, Fenareti
    CYBER SECURITY AND PRIVACY, CSP INNOVATION FORUM 2015, 2015, 530 : 26 - 37
  • [47] Trust-aware recommendation for improving aggregate diversity
    Liu, Haifeng
    Bai, Xiaomei
    Yang, Zhuo
    Tolba, Amr
    Xia, Feng
    NEW REVIEW OF HYPERMEDIA AND MULTIMEDIA, 2015, 21 (3-4) : 242 - 258
  • [48] Trust-Aware Collaborative Filtering with a Denoising Autoencoder
    Meiqi Wang
    Zhiyuan Wu
    Xiaoxin Sun
    Guozhong Feng
    Bangzuo Zhang
    Neural Processing Letters, 2019, 49 : 835 - 849
  • [49] Trust-aware Elastic Social Compute Units
    Riveni, Mirela
    Truong, Hong-Linh
    Dustdar, Schahram
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 135 - 142
  • [50] Design and evaluation of a trust-aware naming service
    Mezzetti, N
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 421 - 432