期刊文献+

A Multi-Tenant Usage Access Model for Cloud Computing 被引量:1

下载PDF
导出
摘要 Most cloud services are built with multi-tenancy which enables data and configuration segregation upon shared infrastructures.It offers tremendous advantages for enterprises and service providers.It is anticipated that this situation will evolve to foster cross-tenant collaboration supported by Authorization as a service.To realize access control in a multi-tenant cloud computing environment,this study proposes a multi-tenant cloud computing access control model based on the traditional usage access control model by building trust relations among tenants.The model consists of three sub-models,which achieve trust relationships between tenants with different granularities and satisfy the requirements of different application scenarios.With an established trust relation in MT-UCON(Multi-tenant Usage Access Control),the trustee can precisely authorize cross-tenant accesses to the trustor’s resources consistent with constraints over the trust relation and other components designated by the trustor.In addition,the security of the model is analyzed by an information flow method.The model adapts to the characteristics of a dynamic and open multi-tenant cloud computing environment and achieves fine-grained access control within and between tenants.
出处 《Computers, Materials & Continua》 SCIE EI 2020年第8期1233-1245,共13页 计算机、材料和连续体(英文)
  • 相关文献

参考文献3

二级参考文献25

  • 1Park J, Sandhu R. The UCONABC usage control model. ACM Transactions on Information and System Security,2004, 7(1): 128- 174.
  • 2Hilty M, Pretschner A, Basin D, Schaefer D, Waiter T. A policy language for distributed usage control//Proceedings of the European Symposium on Research in Computer Security (ESORICS). Dresden, 2007:531-546.
  • 3Pretschner A, Hilty M, Basin D. Distributed usage control. Communications of the ACM, 2006, 49(9):39-44.
  • 4Sailer R, Zhange X L, Jaeger T, Doorn L V. Design and implementation of a TCG-based integrity measurement architecture//Proceedings of the 13th USENIX Security Symposium. San Diego, 2004: 223-238.
  • 5Jaeger T, Sailer R, Shankar U. PRIMA: Policy- reduced integrity measurement architecture//Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT). Lake Tahoe, 2006: 19-28.
  • 6Chen L Q, Lohr H, Manulis M, Sadeghi A R. Propertybased attestation without a trusted third party//Proceedings of the Information Security Conference(ISC). Taipei, China, 2008:31-46.
  • 7Brickell E, Camenisch J, Chen L Q. Direct anonymous attestation//Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004). Washington. D.C., 2004:132-145.
  • 8Chen L, Landfermann R, Lohr H, Rohe M, Sadeghi A, Stuble C. A protocol for property-based attestation//Proceedings of the 2006 ACM Workshop on Scalable Trusted Computing(STC), Alexandria, 2006:7-16.
  • 9Kyle D, Brustoloni J C. UCLinux: A Linux security module for trusted computing based usage controls enforcement// Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing(STC). Alexandria, 2007:63 -70.
  • 10Wright C, Cowan C, Smalley S, Morris J, Hartman G K. Linux security modules: General security support for the Linux kernel//Proceedings of the 11th USENIX Security Symposium. Berkeley, 2002:17 -31.

共引文献72

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部