MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing

被引:50
|
作者
Lin Guoyuan [1 ,2 ]
Wang Danru [1 ]
Bie Yuyu [1 ]
Lei Min [3 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Jiangsu, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; access control; trust model; mutual trust mechanism; MTBAC;
D O I
10.1109/CC.2014.6827577
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As a new computing mode, cloud computing can provide users with virtualized and scalable web services, which faced with serious security challenges, however. Access control is one of the most important measures to ensure the security of cloud computing. But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing. In cloud computing environment, only when the security and reliability of both interaction parties are ensured, data security can be effectively guaranteed during interactions between users and the Cloud. Therefore, building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment. Combining with Trust Management(TM), a mutual trust based access control (MTBAC) model is proposed in this paper. MTBAC model take both user's behavior trust and cloud services node's credibility into consideration. Trust relationships between users and cloud service nodes are established by mutual trust mechanism. Security problems of access control are solved by implementing MTBAC model into cloud computing environment. Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 50 条
  • [1] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [2] Research on cloud computing service based on trust access control
    Sun, Panjun
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12
  • [3] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242
  • [4] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498
  • [5] Zero-trust based dynamic access control for cloud computing
    Ri Wang
    Chen Li
    Kun Zhang
    Bibo Tu
    Cybersecurity, 8 (1)
  • [6] A Novel Trust Based Access Control Model for Cloud Environment
    Behera, Pratap Kumar
    Khilar, Pabitra Mohan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL, NETWORKS, COMPUTING, AND SYSTEMS (ICSNCS 2016), VOL 1, 2017, 395 : 285 - 295
  • [7] An access control model for cloud computing
    Younis, Younis A.
    Kifayat, Kashif
    Merabti, Madjid
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2014, 19 (01) : 45 - 60
  • [8] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [9] Trust Based Access Control Policy in Multi-domain of Cloud Computing
    Lin, Guoyuan
    Bie, Yuyu
    Lei, Min
    JOURNAL OF COMPUTERS, 2013, 8 (05) : 1357 - 1365
  • [10] PpBAC: Popularity Based Access Control Model for Cloud Computing
    Namasudra, Suyel
    Roy, Pinki
    JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2018, 30 (04) : 14 - 31