Font Size: a A A

Research On Access Control Technology In Cloud Computing Environment

Posted on:2015-01-11Degree:MasterType:Thesis
Country:ChinaCandidate:M TianFull Text:PDF
GTID:2268330425495816Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In today’s information-technology industry, because cloud computing services can bemeasured, on-demand, low requirements for the client device, it is highly favored by businessesas well as individuals. As companies increase investments in cloud computing and moreattention on it, which make cloud computing becoming an emerging business model, academiaand industry also consider it to be a hot issue. At the same time, cloud computing security issuesarising in the development process is gradually revealed, although it has very good prospects inthe future, the cloud security problems are not well be solved, which will become a majorobstacle in its long-term stable development. Today, people focus cloud security concerns onwhether the cloud service providers can provide safe and reliable service for legitimate users andcompanies, and prevent user’s information from being leaked, but how to ensure that when usersaccess provider’s software and hardware resources, whose behaviors do not pose a security riskto cloud computing service providers also become an immediate demand under the current cloudcomputing environment. Meanwhile, between trusted cloud service providers on how to achieveresource sharing of information across security domains is what we should consider.Access control technology plays a key role in the information security system, but thetraditional access control technology cannot meet the current dynamic and complex cloudcomputing environments, aiming at the characteristics of cloud computing, combining traditionalaccess control technology and trust management techniques, we propose a dynamic domainaccess control policy in cloud computing environment. And Need for inter-domain resourcesharing cloud security access control, proposes a way to solve role conflicts between thedifferent cloud security domains.In this paper, the main object of study is the access control policy under the cloudcomputing environment, the main tasks include:1. According to the dynamics and openness characteristic of cloud computing environment,this paper makes improvements on the basis of traditional access control model, introducescertification, trust threshold concept, using secondary authentication policies and the trust valueby classification, and achieves trust value of real-time updates, which reaches dynamicauthorization based on the user’s trust value user dynamic.2. To introduce the concept of trust hierarchy in traditional access control model based ontrust, make access control model more flexible, user’s trust management at different levels, toauthorize the user based on the user’s trust level, so that users can obtain different levels ofservice.3. For traditional access control model authorization conditions are not clear shortcomings,the confidence threshold integrate access control model, when the trust value of users reachedthe trust threshold, Users can achieve credible standards that grant the user the appropriatepermissions, to a certain extent on reducing the possibility of malicious attacks and improve thesecurity of the system. 4. In the cross-domain resource sharing, the traditional role-based access control modelconflicts that exist in the role, a role in conflict resolution algorithm to improve effectively, avoidthe error mapping and bring too high or too low permission granted, resulting in a user’sprivileges and pose a security threat to the system, or the user with low privileges can’t unable tomeet their request.
Keywords/Search Tags:cloud computing, access control, role conflict, role mapping, trust level
PDF Full Text Request
Related items