期刊文献+

MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing 被引量:12

MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
下载PDF
导出
摘要 As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes. As a new computing mode, cloud computing can provide users with virtualized and scalable web services, which faced with serious security challenges, however. Access control is one of the most important measures to ensure the security of cloud computing. But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing. In cloud computing environment, only when the security and reliability of both interaction parties are ensured, data security can be effectively guaranteed during interactions between users and the Cloud. Therefore, building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment. Combining with Trust Management(TM), a mutual trust based access control (MTBAC) model is proposed in this paper. MTBAC model take both user's behavior trust and cloud services node's credibility into consideration. Trust relationships between users and cloud service nodes are established by mutual trust mechanism. Security problems of access control are solved by implementing MTBAC model into cloud computing environment. Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
出处 《China Communications》 SCIE CSCD 2014年第4期154-162,共9页 中国通信(英文版)
基金 ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
关键词 cloud computing access control trust model mutual trust mechanism MTBAC 访问控制模型 计算模式 信任关系 安全性问题 基础 计算环境 服务节点 Web服务
  • 相关文献

参考文献2

二级参考文献14

  • 1梁彬,孙玉芳,石文昌,孙波.一种改进的以基于角色的访问控制实施BLP模型及其变种的方法[J].计算机学报,2004,27(5):636-644. 被引量:30
  • 2李益发,沈昌祥.一种新的操作系统安全模型[J].中国科学(E辑),2006,36(4):347-356. 被引量:20
  • 3袁禄来,曾国荪,姜黎立,蒋昌俊.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. 被引量:53
  • 4MILLER M.Cloud Computing:Web-Based Applications ThatChange the Way You Work and Collaborate Online[M].Que PrintPublication,2008.
  • 5SIRISHA A,GEETHAKUMARI G.API access control in cloud usingthe role based access control model[A].Trendz in Information Sci-ences and Computing-TISC2010[C].2010.
  • 6LI D,LIU C,WEI Q,et al.RBAC-Based access control for SaaSsystems[A].2010 2nd International Conference on Information Engi-neering and Computer Science(ICIECS)[C].2010.
  • 7XUE J,ZHANG J J.A brief survey on the security model of cloudcomputing[A].2010 Ninth International Symposium on DistributedComputing and Applications to Business Engineering and Science(DCABES)[C].2010.
  • 8Nat’l Computer Security Center.Trusted network interpretation of thetrusted computer system evaluation criteria[A].NCSC-TG2005[C].1987.
  • 9BELL D E,LAPADULA L J.Secure Computer Systems:Mathemati-cal Foundations[R].The MITRE Corporation,Bedford,Massachus-setts,1973.
  • 10LIN T,BELL Y,AXIOMS L.A“new”paradigm for an“old”model[A].Proc 1992 ACM SIGSAC New Security Paradigms Work-shop[C].1992.

共引文献81

同被引文献55

  • 1刘伟,蔡嘉勇,贺也平.一种基于信任度的自组安全互操作方法[J].软件学报,2007,18(8):1958-1967. 被引量:10
  • 2武少杰.云计算下虚拟环境安全的关键技术研究[D].郑州:解放军信息工程大学,2012.
  • 3LIN Guoyuan, BIE Yuyu, LEI Min, et al. ACO-BTM A Behavior Trust Model in Cloud Computing Environment [J]. International Journal of Computational Intelligence Systems, 2014, 7(4):785-795.
  • 4BELL D E, PADULA L J L. Unified Exposition and Multics Interpretation[R]. USA: Secure Computer System. MTR 2997 Rev 1, 1976.
  • 5Biba K J. Integrity Consideratiom for Secure Computer Systems[R]. USA: US Air Force Electronic System Division, Technical Report. MTR 3153, 1977.
  • 6MYERS A C, LISKOV B. Protecting Privacy Using the Decentralized Label Model [J]. ACM Transactiom on Computer Systems, 2000, 9(4):410-442.
  • 7SHI Q, ZHANG N. An effective model for composition of secure systems [J]. The Journal of Systems and Software, 1998, 43 (3) :233-244.
  • 8LU W P, SUNDARESHAN M K. A model for multilevel security in computer networks [J]. IEEE Transactions on Software Engineering, 1990, 16(6): 647-659.
  • 9LEVIN TE, IRVINE CE, NGUYEN TD. Least Privilege in Separation Kernels [C]//IEEE. Proceedings of the IEEE International Conference on Security and Cryptography. Piscataway, NJ: IEEE Press, 2006: 355-362.
  • 10RUSHBY J. Noninterference, Transitivity, and Channel-control Security Policies[R]. Menlo Park: Stanford Research Institute, CSL-92-02, 1992.

引证文献12

二级引证文献50

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部