Font Size: a A A

Research And Application Of Access Control Based On Ucon In Cloud Computing

Posted on:2014-02-05Degree:MasterType:Thesis
Country:ChinaCandidate:J L ZhuFull Text:PDF
GTID:2248330398472323Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
With the continuous development of cloud computing, cloud security problem becomes more and more significant.Since the user data needs to be saved in the cloud server side, the safety protection, such as data confidentiality, integrity, isolation, provided by cloud computing environment has a direct impact on the widespread use of cloud computing. That is the important means which bind user identity together with cloud computing resources and play important role in Fine grained access control, user audit, compliance support and data protection. So the research of access control technology in cloud computing environment is very necessary and urgent.Traditional access control technologies such as DAC, MAC, RBAC are static, not easy to expand. Obviously,the traditional access control technology lose their effectiveness in dynamic, scalable cloud computing environment. The UCON model has decision continuity and attribute mutability, so as to make it more dynamic, more applicable to the cloud computing environment. This paper presents the X-UCON access control model which is adapted cloud computing environment through the study of traditional access control model and the UCON model. This model introduced post-obligations into compulsory modules, so that it has decision continuity, attribute mutability and compulsory persistence. This model through the integration of UCON, reference monitor mechanism and XACML technology to enhance the flexibility of authorization, the access control model with fine-grain, dynamic, scalable and more security features and very suitable for cloud computing access control. In order to verify the effectiveness of the new model and the adaptability to access control for cloud computing SaaS layer, this article uses the finite experimental environment to develop a medical information system, which use this model for access control security. This paper tests the sample data and analysis the experimental results to prove that this model can provide efficiently safety protection.
Keywords/Search Tags:cloud computing, UCON, SaaS, XACMLaccess control
PDF Full Text Request
Related items