MTBAC:云计算环境中一种基于互信任的访问控制模型(英文)

被引:11
作者
林果园 [1 ,2 ]
王丹茹 [1 ]
别玉玉 [1 ]
雷敏 [3 ]
机构
[1] School of Computer Science and Technology,China University of Mining and Technology
[2] State Key Laboratory for Novel Software Technology,Nanjing University
[3] Information Security Center,Beijing University of Posts and
关键词
cloud computing; access control; trust model; mutual trust mechanism; MTBAC;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
引用
收藏
页码:154 / 162
页数:9
相关论文
共 7 条
[1]   基于行为的云计算访问控制安全模型 [J].
林果园 ;
贺珊 ;
黄皓 ;
吴吉义 ;
陈伟 .
通信学报, 2012, (03) :59-66
[2]  
Trusted dynamic level scheduling based on Bayes trust model[J]. WANG Wei1 & ZENG GuoSun2 1 Department of Computer Science and Engineering, Tongji University, Shanghai 201804, China;2 Tongji Branch, National Engineering & Technology Center of High Performance Computer, Shanghai 201804, China.Science in China(Series F:Information Sciences). 2007(03)
[3]   蚁群算法中参数α、β、ρ设置的研究——以TSP问题为例 [J].
叶志伟 ;
郑肇葆 .
武汉大学学报(信息科学版), 2004, (07) :597-601
[4]   Trust Based Access Control Policy in Multi-domain of Cloud Computing [J].
Lin, Guoyuan ;
Bie, Yuyu ;
Lei, Min .
JOURNAL OF COMPUTERS, 2013, 8 (05) :1357-1365
[5]  
Role-Based Access Control Model of Cloud Computing[J] . Chen Jincui,Jiang Liqun.Energy Procedia . 2012
[6]  
Information theoretic framework of trust modeling and evaluation for ad hoc networks. Yan Lindsay Sun,Wei Yu,Zhu Han,Liu, K.J.R. IEEE Journal on Selected Areas in Communications . 2006
[7]  
The design of a trust and role based access control model in cloudcomputing. Wenhui Wang,Jing Han. Pervasive Computing and Applications (ICPCA) . 2011