Font Size: a A A

Study Of Workflow Scheduling Strategy Based On Access Control Model In The Cloud Environment

Posted on:2013-03-19Degree:MasterType:Thesis
Country:ChinaCandidate:H WuFull Text:PDF
GTID:2248330395484861Subject:Information and Communication Engineering
Abstract/Summary:PDF Full Text Request
Cloud Computing is an emerging business computing model, tasks of which areassigned to large-scale computing clusters composed by a large number of computers,users can obtain the required computing resources on demand. With the developmentof cloud computing, the access control technology in cloud computing environmentare getting more and more attention. In the traditional access control models, DACand MAC are short of integrality control, RBAC can’t authorize privilege dynamically,and in TBAC model the authorization is too complex. Existing scheduling algorithmin the cloud computing environment didn’t put the association of task priority andQoS constraints in a more important position. To solve these problems, our main workare as follows:1. A Privilege Oriented Access Control (POAC) model is presented. By theintroduction of mandate task, the POAC model divides the least privilege intoinheritable permissions and non-inheritable permissions. And the inheritablepermissions are divided into inheritable permissions within department andintersectoral inheritable permissions. In addition to the least privilege, there aretask-related permissions and user group permissions. The basic idea of this model isthat roles and permissions are not connected directly but are put together by tasks,which is more convenient for controlling and managing the granularity of permissions.In this way, we can control the permissions’ circulation between the roles, therebyincreasing the security of the system.2. This paper has done a research on workflow scheduling strategy in cloudcomputing environment, then a task priority based scheduling algorithm was proposed.This paper extends the CloudSim simulation tool to implement the job schedulingalgorithm, and it also gives the method of mapping the tasks and resources. It isproved to be valid by the simulation analysis.
Keywords/Search Tags:Cloud Computing, Access Control Model, RBAC, TBAC, POAC, TaskScheduling
PDF Full Text Request
Related items