期刊文献+
共找到457篇文章
< 1 2 23 >
每页显示 20 50 100
Attribute-Based Access Control Scheme with Efficient Revocation in Cloud Computing 被引量:6
1
作者 Zhihua Xia Liangao Zhang Dandan Liu 《China Communications》 SCIE CSCD 2016年第7期92-99,共8页
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies... Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation. 展开更多
关键词 access control ABE efficient revocation removing escrow cloud computing
下载PDF
Service Security Architecture and Access Control Model for Cloud Computing 被引量:3
2
作者 闫丹凤 杨放春 Tet Yeap 《China Communications》 SCIE CSCD 2011年第6期44-50,共7页
Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces m... Security is a key problem for the development of Cloud Computing. A common service security architecture is a basic abstract to support security research work. The authorization ability in the service security faces more complex and variable users and environment. Based on the multidimensional views, the service security architecture is described on three dimensions of service security requirement integrating security attributes and service layers. An attribute-based dynamic access control model is presented to detail the relationships among subjects, objects, roles, attributes, context and extra factors further. The model uses dynamic control policies to support the multiple roles and flexible authority. At last, access control and policies execution mechanism were studied as the implementation suggestion. 展开更多
关键词 cloud computing service security security architecture access control AUTHORIZATION
下载PDF
Access Control Policy Analysis and Access Denial Method for Cloud Services 被引量:1
3
作者 Chi-Lun Liu 《Journal of Electronic Science and Technology》 CAS 2013年第2期176-180,共5页
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payme... Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 展开更多
关键词 access control cloud services ONTOLOGY PAYMENT service level agreement.
下载PDF
RoBAC—A New Way of Access Control for Cloud 被引量:1
4
作者 G. Krishnamoorthy N. UmaMaheswari R. Venkatesh 《Circuits and Systems》 2016年第7期1113-1119,共7页
Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predom... Access control has made a long way from 1960s. With the advent changes of technologies pertaining to location transparency in storage of data, there arises different access control scenarios. Cloud storage, the predominant storage that is being in use currently, also paves way to various access control problems. Though there are various access control mechanisms such as RBAC, ABAC, they are designed on the user’s perspective such as the role held by the user or other attributes assigned to the user. A new access control mechanism called object relationship based access control (RoBAC) has been developed based on the relations held among the users. The policy decision of access control is based on the relationship among the classes followed in the Java programming. Results have shown that this model best suits various scenarios in the cloud environment, and it also shows that the time for making decision either to allow or to deny is reduced compared to the existing system. 展开更多
关键词 cloud access control Class Relations ROLES
下载PDF
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
5
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
6
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 cloud Computing cloud DATA STORAGE cloud Service PROVIDER Formula-Based cloud DATA access control Multi-Agent System and Secure Java Agent Development Framework
下载PDF
Server-aided access control for cloud computing 被引量:1
7
作者 WENG Jian WENG Jia-si +1 位作者 LIU Jia-nan HOU Lin 《网络与信息安全学报》 2016年第10期58-76,共19页
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To addres... With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved. 展开更多
关键词 计算机网络 网络管理 应用程序 信息安全
下载PDF
Cloud-Based Access Control to Preserve Privacy in Academic Web Application
8
作者 Aljwhrh Almtrf Mohamed Zohdy 《Journal of Computer and Communications》 2019年第12期37-49,共13页
Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can ... Emerging cloud computing has introduced new platforms for developing enterprise academic web applications, where software, platforms and infrastructures are published to the globe as services. Software developers can build their systems by multiple invocations of these services. This research is devoted to investigating the management and data flow control over enterprise academic web applications where web services and developed academic web application are constructing infrastructure-networking scheme at the application level. Academic web services are invoked over http port and using REST based protocol;thus traditional access control method is not enough to control the follow of data using host and port information. The new cloud based access control rules proposed here are to be designed and implemented to work at this level. The new proposed access control architecture will be a web service gateway, and it published itself as a service (SaaS). We used three case studies to test our moodle and then we apply JSON parsers to perceive web service description file (WSDL file) and supply policies according to data are to be allowed or denied based on user roll through our parsing. 展开更多
关键词 cloud COMPUTING Web Application access control Data PRIVACY PRIVACY Framework
下载PDF
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
9
作者 Zhixin Li Lei Liu Kin Wang 《国际计算机前沿大会会议论文集》 2018年第1期33-33,共1页
下载PDF
新型电力系统面向云边端架构的安全访问控制技术研究 被引量:1
10
作者 吴克河 韩扬 +3 位作者 田峥 孙毅臻 吴雨希 过耀东 《电力信息与通信技术》 2024年第7期1-8,共8页
新型电力系统的建设正朝着云边端一体化方向发展,云边端架构带来灵活性和可扩展性的同时,也带来了数据隐私安全、非法操作、缺乏标准化集成方案等问题。基于此,文章提出一种结合云边端架构特点的基于属性的安全访问控制方案(cloud-edge-... 新型电力系统的建设正朝着云边端一体化方向发展,云边端架构带来灵活性和可扩展性的同时,也带来了数据隐私安全、非法操作、缺乏标准化集成方案等问题。基于此,文章提出一种结合云边端架构特点的基于属性的安全访问控制方案(cloud-edge-device attribute-based access control,CED-ABAC),方案通过边缘融合终端进行重加密,既保护数据安全,又减轻终端设备的通信开销,在策略授权方面,使用可扩展的访问控制标记语言(extensible access control markup language,XACML)设计授权策略和策略匹配算法,实现对多终端访问控制策略的同时下发,更高效地解决标准化集成问题。同时通过实验仿真,证明CED-ABAC方案的效率和性能相比于已有方案具有明显优势。 展开更多
关键词 新型电力系统 云边端 访问控制 XACML
下载PDF
面向云存储的属性基双边访问控制方案
11
作者 李琦 樊昊源 +3 位作者 陈伟 熊金波 韩立东 李瑞 《通信学报》 EI CSCD 北大核心 2024年第4期128-136,共9页
针对目前云存储中细粒度双边访问控制机制安全模型较弱且外包解密结果缺乏验证的问题,提出了一种面向云存储数据的属性基双边访问控制方案。首先,提出了自适应安全可验证外包双边CP-ABE的形式化定义和安全模型;其次,以此为基础并结合批... 针对目前云存储中细粒度双边访问控制机制安全模型较弱且外包解密结果缺乏验证的问题,提出了一种面向云存储数据的属性基双边访问控制方案。首先,提出了自适应安全可验证外包双边CP-ABE的形式化定义和安全模型;其次,以此为基础并结合批量可验证技术在合数阶群上设计了双边访问控制方案,支持数据拥有者与数据使用者同时为对方定义访问策略;最后,安全性分析表明,所提方案在自适应安全模型下针对选择明文攻击与选择消息攻击是不可区分的和存在性不可伪造的。实验结果显示,所提方案减轻了用户端的匹配、解密以及验证阶段的计算开销。 展开更多
关键词 云存储 双边访问控制 自适应安全 批量可验证 外包解密
下载PDF
一种基于Fabric区块链的云端数据动态访问控制方案 被引量:1
12
作者 胡睿 张功萱 寇小勇 《数据与计算发展前沿》 CSCD 2024年第1期150-161,共12页
【目的】云端存储数据的安全性是用户使用云存储服务的重要条件,一般用户与云服务提供商之间需要相互信任,而中心化的云服务器存在单点故障问题并且云端的数据存在泄露、丢失的风险。【方法】为解决上述问题,提出了一种基于Fabric区块... 【目的】云端存储数据的安全性是用户使用云存储服务的重要条件,一般用户与云服务提供商之间需要相互信任,而中心化的云服务器存在单点故障问题并且云端的数据存在泄露、丢失的风险。【方法】为解决上述问题,提出了一种基于Fabric区块链的云端数据动态访问控制方案。【结果】方案利用区块链难以篡改的特性解决了用户与云端的信任问题,使用去中心化云存储解决了云服务器的单点故障问题,利用智能合约实现了方案的自动执行,并采用属性基加密的方式实现了对云端数据的动态访问控制。【结论】通过对方案的安全分析与实验验证,方案具有良好的安全性与可用性。 展开更多
关键词 区块链 属性基加密 数据访问控制 云存储 智能合约
下载PDF
混合云环境下面向数据生命周期的自适应访问控制
13
作者 林莉 毛新雅 +1 位作者 储振兴 解晓宇 《软件学报》 EI CSCD 北大核心 2024年第3期1357-1376,共20页
混合云模式下企业业务应用和数据经常跨云流转迁移,面对多样复杂的云服务环境,当前大多数混合云应用仅以主体为中心制定数据的访问控制策略并通过人工调整策略,无法满足数据在全生命周期不同阶段时的细粒度动态访问控制需求.为此,提出... 混合云模式下企业业务应用和数据经常跨云流转迁移,面对多样复杂的云服务环境,当前大多数混合云应用仅以主体为中心制定数据的访问控制策略并通过人工调整策略,无法满足数据在全生命周期不同阶段时的细粒度动态访问控制需求.为此,提出一种混合云环境下面向数据生命周期的自适应访问控制方法AHCAC.该方法首先采用基于关键属性的策略描述思想去统一混合云下数据全生命周期的异构策略,尤其引入“阶段”属性显式标识数据的生命周期状态,为实现面向数据生命周期的细粒度访问控制提供基础;其次针对数据生命周期同阶段策略具有相似性和一致性的特点,定义策略距离,引入基于策略距离的层次聚类算法实现数据生命周期各阶段对应访问控制策略的构建;最后通过关键属性匹配实现当数据所处阶段变化时,触发策略评估引擎上数据对应阶段策略的自适应调整和加载,最终实现面向数据生命周期的自适应访问控制.在OpenStack和开源策略评估引擎Balana上通过实验验证了所提方法的有效性和可行性. 展开更多
关键词 混合云 数据生命周期 访问控制 层次聚类 策略自适应调整
下载PDF
城市轨道交通云平台网络安全访问控制技术研究 被引量:1
14
作者 刘为俊 《铁道通信信号》 2024年第3期69-74,共6页
通过分析城市轨道交通云平台网络安全常见风险及应用实施需求,首先论述访问控制技术的适用性,提出以资源隔离为主,结合安全策略实施的解决方案;其次采取业务系统分区分域的策略对城轨云平台进行边界划分,形成保障系统安全的基础架构,并... 通过分析城市轨道交通云平台网络安全常见风险及应用实施需求,首先论述访问控制技术的适用性,提出以资源隔离为主,结合安全策略实施的解决方案;其次采取业务系统分区分域的策略对城轨云平台进行边界划分,形成保障系统安全的基础架构,并遵循风险检测与控制的安全标准体系,实现基于主动防御技术的城轨云安全态势感控平台;最后按照等级保护规范的要求,提出一套基于安全标记的强制访问控制技术模型,从安全级别和安全范畴2个维度进行安全标记设计,按照数据敏感度和完整性设定安全级别,按照业务类型和业务区域进行安全范畴的抽象和定义,从而有效支持城轨云平台达到所设计的网络安全标记等级。 展开更多
关键词 城市轨道交通 云平台 网络安全 访问控制 主动防御 安全标记
下载PDF
云计算环境下的数据安全与访问控制
15
作者 韩国彬 《信息与电脑》 2024年第7期158-160,共3页
本文主要立足于多元化的技术操作视角,针对云计算环境下数据安全与访问控制这两个方面展开深入研究,围绕多种类型的云计算技术以及相应的操作技术进行了深入分析。希望通过本文的深入研究与探索,可以为广大技术操作人员提供一定的技术... 本文主要立足于多元化的技术操作视角,针对云计算环境下数据安全与访问控制这两个方面展开深入研究,围绕多种类型的云计算技术以及相应的操作技术进行了深入分析。希望通过本文的深入研究与探索,可以为广大技术操作人员提供一定的技术支持与工作保障,从而积极推动云计算技术操作模式的现代化发展,为解决云计算环境之下数据安全与访问控制这两个方面的问题提供一定的解决方案和建议。 展开更多
关键词 云计算环境 数据安全 访问控制
下载PDF
人脸识别云门禁系统在智慧社区中的应用
16
作者 吕述春 陈玉龍 伍银波 《现代计算机》 2024年第12期106-109,共4页
人脸识别因其独特的优势在各类门禁系统中有着广泛应用,相关研究大多集中在识别算法和识别装置的设计上,大规模的系统化应用研究较少。综合考虑智慧社区门禁管理的需求,对人脸识别云门禁系统进行研究。在充分调研的基础上,提出了由云端... 人脸识别因其独特的优势在各类门禁系统中有着广泛应用,相关研究大多集中在识别算法和识别装置的设计上,大规模的系统化应用研究较少。综合考虑智慧社区门禁管理的需求,对人脸识别云门禁系统进行研究。在充分调研的基础上,提出了由云端管理系统、云门禁设备和到家汇APP构建云门禁的方案。该方案实现了客户自助人脸录入、音视频实时交流等功能,并在深圳多个小区进行了试点。结果表明,该方案灵活可靠、易于扩展和维护,能满足智慧社区应用的需求。 展开更多
关键词 智慧社区 云门禁 人脸识别 软件开发工具包
下载PDF
云计算环境下的信息安全与隐私保护机制研究
17
作者 赵玉梅 《信息记录材料》 2024年第3期7-9,共3页
随着云计算的迅速普及,数据安全和隐私保护问题备受关注。本文首先细致探讨了云计算环境下的安全威胁,并提出了多层面的安全防护策略,包括数据加密与访问控制、安全的基础设施与网络防护、灾难恢复以及安全审计与监控。这些策略旨在有... 随着云计算的迅速普及,数据安全和隐私保护问题备受关注。本文首先细致探讨了云计算环境下的安全威胁,并提出了多层面的安全防护策略,包括数据加密与访问控制、安全的基础设施与网络防护、灾难恢复以及安全审计与监控。这些策略旨在有效维护云平台数据的机密性、完整性和可用性。其次以亚马逊为例,阐述了其在云安全领域的技术创新与全球认证情况。最后得出结论,构建全面、自动化、智能化的云安全体系对于用户信心和云计算产业的健康发展至关重要。 展开更多
关键词 云安全 数据加密 访问控制 安全监控 智能优化
下载PDF
基于物联网技术的智能居家安防系统设计
18
作者 李晓峰 张银慧 石大琨 《通信电源技术》 2024年第5期20-24,共5页
智能居家安防系统是实施安防控制,预防突发情况,保护用户生命和财产安全的重要技术手段。因此,设计基于物联网技术的智能居家安防系统,融合物联网、人工智能、传感器及云平台等新一代信息技术,提供智能化、网络化和人性化的居家安全保... 智能居家安防系统是实施安防控制,预防突发情况,保护用户生命和财产安全的重要技术手段。因此,设计基于物联网技术的智能居家安防系统,融合物联网、人工智能、传感器及云平台等新一代信息技术,提供智能化、网络化和人性化的居家安全保障。该系统采用STM32F429IGT6微控制器作为主要设计平台,利用各类信号检测传感器、ESP8266无线通信模块、ESP32-CAM无线监控模块、阿里云物联网平台以及手机App搭建物联网系统架构,从而满足用户身份识别、门禁开关、视频监控、灾情预警以及远程控制等需求。该系统设计和组装完成后,调试结果和实际工作状态表明各模块设计合理,功能完备,便于扩展。该系统既能够满足居家安防的日常需求,也可以推广到学校和企业的楼宇管理等应用场景。 展开更多
关键词 居家安防系统 物联网技术 云平台 门禁系统 灾情预警
下载PDF
基于区块链的云存储数据安全访问控制方法
19
作者 李雪松 廖芳 +2 位作者 李香冬 李迪 杨力 《无线互联科技》 2024年第19期118-120,共3页
为提高数据访问的安全性,文章引进区块链技术,开展云存储数据安全访问控制方法研究。该方法利用调制技术设定控制变量,计算数据访问信道的期望效益度,对云存储数据访问信道进行均衡设计,利用区块链技术中的E椭圆曲线加密算法生成一对公... 为提高数据访问的安全性,文章引进区块链技术,开展云存储数据安全访问控制方法研究。该方法利用调制技术设定控制变量,计算数据访问信道的期望效益度,对云存储数据访问信道进行均衡设计,利用区块链技术中的E椭圆曲线加密算法生成一对公钥和私钥,生成访问权限密文。设计智能合约中包含的主要内容,对云存储数据进行安全访问控制。对比实验结果证明:文章设计方法可以实现异常数据的精准辨识。 展开更多
关键词 区块链 访问权限密文 云存储数据 安全访问控制
下载PDF
云计算下的数据安全与隐私保护研究
20
作者 李海蓉 《软件》 2024年第2期104-106,共3页
针对云计算环境下的数据安全与隐私保护问题,提出相应的解决方案,以促进云计算技术的进一步发展。具体目标包括了解云计算环境下数据安全和隐私保护面临的挑战,分析现有的安全与隐私保护技术,探讨改进和优化的方向,并提出有效的数据安... 针对云计算环境下的数据安全与隐私保护问题,提出相应的解决方案,以促进云计算技术的进一步发展。具体目标包括了解云计算环境下数据安全和隐私保护面临的挑战,分析现有的安全与隐私保护技术,探讨改进和优化的方向,并提出有效的数据安全与隐私保护策略。 展开更多
关键词 云计算 数据安全 数据备份 访问控制 加密技术
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部