MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing

被引:50
|
作者
Lin Guoyuan [1 ,2 ]
Wang Danru [1 ]
Bie Yuyu [1 ]
Lei Min [3 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Jiangsu, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; access control; trust model; mutual trust mechanism; MTBAC;
D O I
10.1109/CC.2014.6827577
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As a new computing mode, cloud computing can provide users with virtualized and scalable web services, which faced with serious security challenges, however. Access control is one of the most important measures to ensure the security of cloud computing. But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing. In cloud computing environment, only when the security and reliability of both interaction parties are ensured, data security can be effectively guaranteed during interactions between users and the Cloud. Therefore, building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment. Combining with Trust Management(TM), a mutual trust based access control (MTBAC) model is proposed in this paper. MTBAC model take both user's behavior trust and cloud services node's credibility into consideration. Trust relationships between users and cloud service nodes are established by mutual trust mechanism. Security problems of access control are solved by implementing MTBAC model into cloud computing environment. Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 50 条
  • [21] Dynamic Access Control Model for Cloud Computing
    Auxilia, M.
    Raja, K.
    2014 SIXTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING, 2014, : 47 - 56
  • [22] A Novel Access Control Model for Cloud Computing
    Saxena, Rajat
    Dey, Somnath
    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2016, 2016, 9864 : 81 - 94
  • [23] Secure Access Control Model for Cloud Computing Environment with Fuzzy Max Interval Trust Values
    Khan, Aakib Jawed
    Mehfuz, Shabana
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 536 - 542
  • [24] Research on access control model based on user action in cloud computing
    Wang, Huan-Bin
    Tao, Ma
    Hui, Xiao-Bin
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2016, 97 : 157 - 160
  • [25] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [26] Trusted Access Control Model Based on Role and Task in Cloud Computing
    Fan Yue-qin
    Zhang Yong-sheng
    2015 7TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME), 2015, : 710 - 713
  • [27] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [28] Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
    Abdul, Arif Mohammad
    Mohammad, Arshad Ahmad Khan
    Venkat Reddy, P.
    Nuthakki, Praveena
    Kancharla, Rakesh
    Joshi, Rahul
    Kannaiya Raja, N.
    SCIENTIFIC PROGRAMMING, 2022, 2022
  • [29] Cloud Multidomain Access Control Model Based on Role and Trust-Degree
    Xie, Lixia
    Wang, Chong
    JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2016, 2016
  • [30] A Trust Model in Cloud Computing Based on Fuzzy Logic
    Ritu
    Jain, Sushma
    2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 47 - 52