Font Size: a A A

Research On Access Control Strategy Of Data In Cloud Computing

Posted on:2016-02-19Degree:MasterType:Thesis
Country:ChinaCandidate:C X WeiFull Text:PDF
GTID:2348330563951973Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Cloud computing in the way of resource virtualization,distributed computin g,storage,service components and network software and other resources to foc us on the network to provide users with on-demand dynamic,scalable and con venient services.Its development has realized the distributed sharing of resourc es and computing power,which makes people have a new understanding of ha rdware,software,data storage,data access,etc.In the typical application of cl oud computing,many complex computing and processing will be transferred to the cloud behind the client to complete,the users will save large-scale data in the data center,run the required applications in the server cluster;cloud ser vice providers will provide users with storage and computing services,manage ment and maintenance of data centers,server cluster normal operation.At present,in the application of cloud computing technology,data security and access control mainly depends on the security mechanism of the cloud ser vice providers.The application of cloud computing services,the users will lose complete control of the data,cloud computing system may exist in the manag ement of loopholes,service failures,error operation and other confidential infor mation leakage data;data sharing process is not perfect management and acces s control technology may lead to illegal access to data and collusion attack;sh ared hardware infrastructure exists in the secret channel may affect the integrit y and confidentiality of data.In the application of cloud computing technology,cloud security has been transferred to the key technology of data protection i n cloud computing service system and the research of high reliability access to data sharing.This paper focuses on cloud computing technology to protect data in the cl oud computing system,and data sharing services in the access control strategy.Through the introduction of cloud storage services,analysis of security threats and data protection technologies faced by cloud computing applications,compa rative analysis of mainstream access control model,based on the context of the real work of task execution,task-based role-based access control model(TRBAC)basis,based on the data presented ciphertext TRBAC of access control s cheme.TRBAC through improved access models,using the attribute encryption ciphertext policy(CP-ABE)program to encrypt data storage;in accordance wi th the implementation of tasks set access levels,time constraints,restrict access to authorized access request management;life in mission within the period,th e authorized management and key distribution combine to automate key manag ement strategies.In this scenario,the data owner through access constraints pre vent user access to shared data,long-term holding,as well as illegal users and cloud service providers collusion attack;task execution data confidentiality and integrity of access restrictions to improve the efficiency of data access and dy namic expansion,improved data storage,security and reliability of authorized a ccess.
Keywords/Search Tags:Cloud Computing, Data Security, Access Control, TRBAC, CP-ABE
PDF Full Text Request
Related items