Font Size: a A A

Investigation Of Access Control Model Based On Trust In Cloud Computing

Posted on:2016-02-07Degree:MasterType:Thesis
Country:ChinaCandidate:J SongFull Text:PDF
GTID:2308330479978114Subject:Pattern Recognition and Intelligent Systems
Abstract/Summary:PDF Full Text Request
Cloud computing makes computing resources distributed over a large number of distributed computers through cloud processing, rather than the local computer or a remote server. Which enable the user to switch the resource such as computing resources and storage resources based on need conveniently. They are worried that the control of data access and equipment will lead to many unpredictable security problem. Therefore the access control mechanism of the security issues with trust threshold to prevent the users’ trust and distrust behavior is the main focus in this paper.Aiming at the above problems, this paper studies and proposes a network analysis method and the trust evaluation model based on fuzzy relation matrix and Trust Based Access Control Model(Trust Based Access Control Model,TRBAC). The concrete work includes:According to the characteristics of cloud computing, the special security threats of the cloud computing, trust factors about cloud computing security, access control security technology have been discussed and analyzed in this paper especially the analysis of the necessity of the introduction of trust mechanism and access control strategy.The network analysis method and the trust evaluation model based on fuzzy relation matrix have been proposed. The trust evaluation between cloud services and the cloud users and the evaluation between the users have been constructed. The security of the cloud computing platform has been improved effectively through the establishment of the two-way trust evaluation and the combination between the trust threshold mechanism and risk behavior prevention of potential users. The trust model proposed in this paper and the classical Eigen Trust model have been compared through the simulation experiments.The trust based access control model in cloud computing environments has been researched. The dynamic trust and two-way selection mechanism have been introduced in the role based access control(Role Based Access Control, RBAC). The dynamic role cloud computing access control strategy has been implemented. Through the contrast among the RBAC, two-way selection mechanism and the access control strategy proposed in this paper, the relative advantages of the model proposed in this paper have been reflected.
Keywords/Search Tags:cloud computing, trust evaluation, ANP, fuzzy relation matrix, access control
PDF Full Text Request
Related items