期刊文献+

云计算环境下基于用户访问行为的动态访问控制模型的研究 被引量:2

Research on Dynamic Access Control Model Based on User Access Behavior in Cloud Computing Environment
下载PDF
导出
摘要 针对云计算环境下基于信任访问控制模型不能动态适应网络环境变化的问题,提出一种基于数据安全的动态访问控制模型。首先,采用关联规则的方法对用户历史访问行为进行分析,提取用户频繁访问路径并创建访问行为数据库;然后,基于实时访问行为获取用户实时状态信息,利用"时空切片"的方式构建具有时空敏感性的可信度评估模块;最后,结合动态访问授权管理模块和访问控制规则模块实现基于用户访问行为的动态访问控制。实验证明,所提出的模型较传统的基于信任访问控制模型具有更高的安全性。 To solve the problem that the trust-based access control model in cloud computing environment can not adapt to the changes of network environment dynamically, a dynamic access control model based on data security is proposed. Firstly, the association rule method is used to analyze the user’s historical access behavior, extract the user’s frequent access path and create the access behavior database. Then, the user’s real-time state information is obtained based on the real-time access behavior, and a credibility evaluation module with spatiotemporal sensitivity is established by using the spatiotemporal slice. Finally, combining the dynamic access authorization management module and access control rule module, the dynamic access control is realized based on user access behavior. Experiments show that the proposed model has higher security than the traditional trust-based access control model.
作者 段炼 朱龙 岳岩岩 吕正林 汪帆 李飞龙 DUAN Lian;ZHU Long;YUE Yanyan;LV Zhenglin;WANG Fan;LI Feilong(China Mobile Internet Technology Co.,Ltd.,Shenzhen 51804&China)
出处 《移动通信》 2021年第6期99-102,共4页 Mobile Communications
关键词 用户访问行为 时空切片 时空敏感性 动态访问控制 user access behavior spatiotemporal slice spatiotemporal sensitivity dynamic access control
  • 相关文献

参考文献5

二级参考文献42

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 4冀铁果,田立勤,胡志兴,孙锦霞.可信网络中一种基于AHP的用户行为评估方法[J].计算机工程与应用,2007,43(19):123-126. 被引量:27
  • 5Saidani O,Nurcan S.A flexible organisation and role-based access control model for secure information systems[C]//ADVIS 2006: 364-376.
  • 6Shcn Hai-bo,Hong Fan.A context-aware role-based access control model for Web services[C]//Proceedings of IEEE International Conference on E-Business Engineering 2005.Piscataway, NJ:Institute of Electrical and Electronics Engineers Computer Society, 2005 : 220-223.
  • 7Liu Miao,Guo He-qing,Su Jin-dian.An attribute and role based access control model for Web services[C]//Proc of 2005 International Con-ference on Machine Learning and Cybernetics.Piscataway,NJ:Institute of Electrical and Electronics Engineers Computer Society,2005 : 1302-1306.
  • 8Oh S,Park-S.Task-role-based access control model[J].Information Systems, 2003,28 ( 6 ) : 533 -562.
  • 9Ray I,Toahchoodee M.A spatio-temporal role-based access control model[C]//DBSec 2007,2007:211-226.
  • 10Abdallah A E,Khayat E J.Formal Z specifications of several flat role-based access control models[C]//SEW 2006,2006:282-292.

共引文献109

同被引文献18

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部