Font Size: a A A

Research On Access Control Based On Trust Model In Cloud Environment

Posted on:2014-01-22Degree:MasterType:Thesis
Country:ChinaCandidate:Z ZhangFull Text:PDF
GTID:2248330395984228Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of the Internet, cloud computing has begun to integrate into people’sdaily lives. Because of its superior processing capabilities and extensive application prospects,cloud computing became the hot topic of discussion for the large enterprise and people. Then manyenterprises begin to introduce the concept of cloud computing to their IT products. With thewidespread popularity of cloud computing, many problems begin slowly to be exposed, such as lossof privacy. So if cloud computing security issues could not be resolved, security may become abottleneck in the development of cloud computing. Now the research of cloud computing securityhas far-reaching significance to the development of cloud computing.This thesis analyzes the concept of cloud computing, the application, and the security challenges.Based on study of the typical trust models, this thesis proposes a prototype design method of trustmodel system in cloud environment. That the time decay factor into the dynamic trust model makesthe latest trust more reliable. Through the application of Bernonlli sampling theory used in thecalculation of trust degree, it can reduce the computational burden of massive trust. At the sametime, this thesis specified the relevant access control algorithm. In the system prototype of this trustmodel, the calculation of node trust degree is completed by the center server. The test results showthat the prototype mentioned in this thesis has better reasonableness, accuracy and feasibility.
Keywords/Search Tags:Security, Trust Model, Access Control, Time Decay
PDF Full Text Request
Related items