Font Size: a A A

The Research Of Dynamic Access Control Based On Trust In Cloud Computing Environment

Posted on:2016-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:S S ZhaoFull Text:PDF
GTID:2298330452971395Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Cloud computing is scattered around the storage resources, software, service logically, providing users with services through the pattern of networking. What the cloud users need to concern is only the required service, it is not necessary to know where the hardware and software resources are stored. So cloud services can provide the users with flexible, economical and reliable service, with more and more people pay attention to the advantages of cloud services, a large number of cloud services which have similar or identical functions to the services provided by the cloud suppliers, it is particularly important to evaluate the safety and reliability of cloud services. This essay brings trust into the model, basing in the research of cloud services evaluation. It puts forward a kind of dynamic access control model based on trust evaluation, in view of the cloud service security access control problems. This model combines trust and attribute access control framework, adopts a trust evaluation method based on service quality indicators, the fusion of direct trust and indirect trust and comprehensive trust to evaluate the trust of the cloud resources. It can effectively help cloud services access users make judgment and choices with security, reliability analysis. This paper studies the main contents include:First, this article introduces the defects of cloud computing in the aspect of security, raises the security of cloud computing has become a hot field which people gradually pay attention to, through the introduction of cloud computing, and puts forward the idea that constructive trust mechanism used in access control is necessary. Besides, this paper also analyzes the access control of domestic and in the abroad. Those access control is no longer suitable for the complex environment change, those access control cannot suit with the safety control of the distributed and complex cloud environment. This paper makes detailed analysis of access control model and the models-property access control models which are suitable for cloud computing environment. On the basis of research a trust control model based on SQI (service quality indicators) was put forward. Secondly, to inherit selectively the existing Web service quality evaluation index from the aspect of the service resources’ non-functional attributes, combining the existing characteristics of the "cloud", using qualitative and quantitative analysis methods to evaluate the credibility of cloud resources. Using these service indicators to trust evaluation, combining direct trust and indirect trust through fusion to calculate the comprehensive trust, so that the strong guarantee can be provided to the users with safe and reliable cloud service resources, implements the access control based on trust, the access security and reliability of cloud service in the market is enhanced.Finally, this article makes a simulation through cloud platform simulation software CloudSim, analyzing the experiment in detail from the trust computation, the deification of malicious nodes, access to success, and failure rate. The simulation results can be clearly seen that this model can correctly and effectively restrain cloud users access to malicious false services, at the same time can enhance the security of cloud services access.
Keywords/Search Tags:Cloud security, Access control, Trust, SQI, Attribute
PDF Full Text Request
Related items