Font Size: a A A

Research On Cloud Platform Access Control Model Based On User Attributes And Dynamic Trust Value

Posted on:2020-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:K L GuoFull Text:PDF
GTID:2428330575954516Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the continuous development of Internet technology,the application of cloud computing in daily life is more and more extensive,and people's interaction with computers is more and more frequent,then the security of Internet interaction becomes an important issue.Access control is an important module in today's computer systems that is used to secure computer system resources.A reasonable access control model is especially important for the system,which directly determines the security and efficiency of the system.With the development of cloud computing,access control of cloud platforms has become an important research content in the field of Internet security.To this end,this paper has carried out a series of optimizations on the traditional access control model,and proposed an access control model based on the combination of user attributes and dynamic evaluation of trust values.The main research work is as follows:(1)The traditional access control model is studied,and a scheme for access control of user behavior based on attributes and roles is given.In this scheme,the user role is determined first according to the attributes of the user and the tenant,and then the role's permissions are determined according to the attribute of the role.Finally,the user's right to use the right is determined according to the trust value of the user.The user trust value is calculated based on the user's historical behavior,reputation,and information entropy.(2)In order to prevent users from maliciously accessing the system illegally,a game-based trust value reward and punishment mechanism is introduced,which gives a certain trust value reward to the user's legitimate access,and gives a certain trust value penalty for the user's illegal access.Dynamic adjustment of user trust values.(3)The proposed model was simulated on the Hadoop platform and the experimental data was analyzed.The experimental and analytical results show that the proposed model can effectively deal with the access control problem of cloud computing platform.
Keywords/Search Tags:cloud computing, trust value, historical behavior, access control, game theory
PDF Full Text Request
Related items