期刊文献+

面向云计算环境的访问控制模型 被引量:13

Access control models for cloud computing
下载PDF
导出
摘要 针对云计算[1]领域中基础设施服务在运行和管理中存在的安全问题,在传统访问控制模型的基础上综合考虑了云计算基础设施服务[2]的特点,设计了一套访问控制模型。分析了云计算中安全问题的特点及现有方案的不足之处,提出基础设施服务的安全是云计算安全的基础。根据四条设计原则在RBAC模型[3]和TE模型[4]的基础上加以改进形成了适用于云计算基础设施服务的CIRBAC模型和CITE模型,对模型中的各个模块进行了详细的设计。在基于Xen[5-6]虚拟化技术[7]的OpenStack[8]云计算环境中实现了这些访问控制模型。该模型很好地增强了云计算基础设施服务的安全性。 In order to solve the security problems of operation and management in IaaS (Infrastructure as a Service), a access control mechanism is designed based on the traditional access control model and the features of IaaS. Firstly, the secure features of cloud computing and the inadequacies of existing programs are analyzed, It is pointed out the security of IaaS is the basis for the security of cloud computing. Then, according to four design principles, the CIRBAC model and the CITE model are de- signed, which can be used in the infrastructure layer of cloud computing based on the RBAC model and the TE model, and the modules of the models is designed in detail. Finally, the models are achieved at the openstack environment with Xen-based virtualization layer. The model enhances the security of IaaS.
作者 马强 艾中良
出处 《计算机工程与设计》 CSCD 北大核心 2012年第12期4487-4492,共6页 Computer Engineering and Design
关键词 云计算 基础设施层 基础设施即服务 虚拟化 访问控制 信息安全 cloud computing infrastructure infrastructure as a service virtualization access control information security
  • 相关文献

参考文献12

  • 1Armbrust M, Fox A,Griffith R,et al. Above the clouds: Aberkeley view of cloud computing [R]. Technical report UCB/EECS-2009-28, Electrical Engineering and Computer Sciences,University of California at Berkeley. Berkeley, USA, 2009.
  • 2王庆波,金滓,何乐,等.虚拟化与云计算[M].北京:电子工业出版社,2009.
  • 3韩若飞,汪厚祥.基于任务-角色的访问控制模型研究[J].计算机工程与设计,2007,28(4):800-802. 被引量:33
  • 4胡大晶.操作系统访问控制研究与实现[D].合肥:中国科学技术大学,2009.
  • 5David Chisnali. The definitive guide to the Xen hypervisor[M]. Prentic Hall, 2007.
  • 6Intel. Intel virtualization technology for directed IO [DB/OL].http: //download intel. com/ technology/computing/vptech/Intel (r) _ VT _ for _ Direct _ IO. pdf, 2011.
  • 7OpenStack. OpenStack compute administration manual [DB/OL]. http: //docs, openstack. org/diablo/openstack-compute/admin/os-compute-adminguide-trunk. pdf,2011.
  • 8冯登国,张敏,张妍,徐震.云计算安全研究[J].软件学报,2011,22(1):71-83. 被引量:1072
  • 9Murray D G,Milos G, Hand S. Improving Xen ‘securitythrough disaggregation [C]. Proc. of VEE New York, NY,USA, 2008: 151-160.
  • 10McCune J M, Jaeger T,Berger S,et al. Shamon : A systemfor distributed mandatory access control [C]. IEEE ComputerSociety Proc. of the 22nd Annual Computer Security Applica-tions Conference. Washington, DC, USA, 2006.

二级参考文献35

  • 1程玉松,孟丽荣,盛琦,刘学波,柳楠.利用规则RBAC模型实现门户的安全访问控制[J].计算机工程与设计,2005,26(5):1299-1301. 被引量:11
  • 2李卿,乔元松,郑慧.角色分离的层次化RBAC模型[J].计算机工程与设计,2005,26(6):1563-1565. 被引量:7
  • 3李帆,郑纬民.基于角色与组织的访问控制模型[J].计算机工程与设计,2005,26(8):2136-2140. 被引量:27
  • 4罗武庭.DJ—2可变矩形电子束曝光机的DMA驱动程序[J].LSI制造与测试,1989,10(4):20-26. 被引量:373
  • 5Organization for the Advancement of Structured Information Standards (OASIS) http://www.oasis-open.org/.
  • 6Distributed Management Task Force (DMTF) http://www.dmtf.org/home.
  • 7Cloud Security Alliance http://www.cloudsecurityalliance.org.
  • 8Crampton J, Martin K, Wild P. On key assignment for hierarchical access control. In: Guttan J, ed, Proc. of the 19th IEEE Computer Security Foundations Workshop--CSFW 2006. Venice: IEEE Computer Society Press, 2006. 5-7.
  • 9Damiani E, De S, Vimercati C, Foresti S, Jajodia S, Paraboschi S, Samarati P. An experimental evaluation of multi-key strategies for data outsourcing. In: Venter HS, Eloff MM, Labuschagne L, Eloff JHP, Solms RV, eds. New Approaches for Security, Privacy and Trust in Complex Environments, Proc. of the IFIP TC-11 22nd Int'l Information Security Conf. Sandton: Springer-Verlag, 2007. 395-396.
  • 10Bethencourt J, Sahai A, Waters B. Ciphertext-Policy attribute-based encryption. In: Shands D, ed. Proc. of the 2007 IEEE Symp. on Security and Privacy. Oakland: IEEE Computer Society, 2007. 321-334. [doi: 10.1109/SP.2007.11].

共引文献1179

同被引文献96

引证文献13

二级引证文献91

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部