Trust Based Access Control Policy in Multi-domain of Cloud Computing

被引:17
作者
Lin, Guoyuan [1 ,2 ]
Bie, Yuyu [1 ]
Lei, Min [3 ,4 ]
机构
[1] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou, Peoples R China
[2] Nanjing Univ, State Key Lab Novel Software Technol, Nanjing, Jiangsu, Peoples R China
[3] Beijing Univ Posts & Telecommun, Informat Secur Ctr, Beijing, Peoples R China
[4] Beijing Univ Posts & Telecommun, Natl Engn Lab Disaster Backup & Recovery, Beijing, Peoples R China
关键词
cloud computing; trust; access control; multi-domain; role translation;
D O I
10.4304/jcp.8.5.1357-1365
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Cloud computing is a new paradigm which enables users to reduce their costs and is advantageous to both the serving and served organizations. However, security issue is a major concern in the adoption of cloud computing. The most effective way of protecting cloud computing services, resources and users is access control. This paper intends to provide a trust-based access control mechanism for cloud computing considering its multi-domain aspects. Firstly, trust is introduced into cloud computing environment and trust relationships between users and cloud platform are built. It also analyzes the difference between intra-domain trust and inter-domain trust. Furthermore, a role-based access control framework combined with trust degree in multi-domain is given from this paper. Access control in local domain directly applies RBAC model combined with trust degree, whereas in multi-domain it contains the conception of role translation. The simulation results show that the proposed method is more suitable to cloud environment and definitely can improve the reliability and validity of the system.
引用
收藏
页码:1357 / 1365
页数:9
相关论文
共 19 条
[1]  
Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
[2]  
Chen Xu-ri, 2008, Journal of Hunan University (Natural Science), V35, P85
[3]  
Feng Deng-Guo, 2011, Journal of Software, V22, P71, DOI 10.3724/SP.J.1001.2011.03958
[4]  
Grandison T., 2000, SURVEY TRUST INTERNE
[5]  
Jia Dongyan, 2013, J SOFTW, V8, P1
[6]  
Jincui C., 2011, ENERGY PROCEDIA, V13, P1056
[7]   A logic for uncertain probabilities [J].
Josang, A .
INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2001, 9 (03) :279-311
[8]  
Kapadia Apu, 2000, UIUCDCSR2000 IRBAC
[9]  
Lang Bo, 2010, J COMMUNICATIONS
[10]  
Liangmin Guo, 2013, Journal of Software, V8, P357, DOI 10.4304/jsw.8.2.357-360