MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing

被引:50
|
作者
Lin Guoyuan [1 ,2 ]
Wang Danru [1 ]
Bie Yuyu [1 ]
Lei Min [3 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing 210093, Jiangsu, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing 100876, Peoples R China
基金
美国国家科学基金会;
关键词
cloud computing; access control; trust model; mutual trust mechanism; MTBAC;
D O I
10.1109/CC.2014.6827577
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
As a new computing mode, cloud computing can provide users with virtualized and scalable web services, which faced with serious security challenges, however. Access control is one of the most important measures to ensure the security of cloud computing. But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing. In cloud computing environment, only when the security and reliability of both interaction parties are ensured, data security can be effectively guaranteed during interactions between users and the Cloud. Therefore, building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment. Combining with Trust Management(TM), a mutual trust based access control (MTBAC) model is proposed in this paper. MTBAC model take both user's behavior trust and cloud services node's credibility into consideration. Trust relationships between users and cloud service nodes are established by mutual trust mechanism. Security problems of access control are solved by implementing MTBAC model into cloud computing environment. Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 50 条
  • [31] A trust model of cloud computing based on Quality of Service
    Manuel, Paul
    ANNALS OF OPERATIONS RESEARCH, 2015, 233 (01) : 281 - 292
  • [32] A trust model of cloud computing based on Quality of Service
    Paul Manuel
    Annals of Operations Research, 2015, 233 : 281 - 292
  • [33] Data Security Access Control Model of Cloud Computing
    Hu, Jun
    Chen, Lei
    Wang, Yunhua
    Chen, Shi-hong
    2013 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND APPLICATIONS (CSA), 2013, : 29 - 34
  • [34] An assurance model for access control on cloud computing systems
    Li Y.
    Zhao Y.
    Guo X.
    Liu G.
    1600, Tsinghua University (57): : 432 - 436
  • [35] A credible usage access control model in cloud computing
    Wang, Fengying
    Li, Caihong
    Zhao, Hui
    Liu, Shushu
    Information Technology Journal, 2013, 12 (20) : 5553 - 5558
  • [36] A Classified Access Control Model Research for Cloud Computing
    Shen, Wenyi
    Tao, Linbo
    Liu, Bo
    Wang, Yishen
    PROCEEDINGS OF 2017 CHINESE INTELLIGENT AUTOMATION CONFERENCE, 2018, 458 : 327 - 334
  • [37] Survey on access control model in cloud computing environment
    Li, Xinlu
    Zhao, Xiaoxia
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 340 - 345
  • [38] New secure access control model for cloud computing based on Chaotic systems
    BenMbarak, Omessead
    Naanaa, Anis
    ElAsmi, Sadok
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1485 - 1490
  • [39] RETRACTED: Size Based Access Control Model in Cloud Computing (Retracted Article)
    Namasudra, Suyel
    Roy, Pinki
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [40] Access control for Hadoop-based cloud computing
    Wang, Zhihua
    Pang, Haibo
    Li, Zhanbo
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2014, 54 (01): : 53 - 59