Font Size: a A A

Research On Cross-Domain Access Security Based On Trusted Expectations

Posted on:2021-02-18Degree:MasterType:Thesis
Country:ChinaCandidate:N YuFull Text:PDF
GTID:2428330611981030Subject:Software engineering
Abstract/Summary:PDF Full Text Request
As the main means of protecting information security,access control can effectively guarantee users' legitimate access to resources.In order to facilitate the management of resources,multiple independent security domains are defined to have the same security access requirements in the same network environment,and they have independent access control policies.With the development of cloud computing sharing technology,the resources requested by users for interaction are no longer limited to their own security domain.We need to address the need for users to interact across domains.Role-Based Access Control(RBAC)is widely used across domains to implement inter-domain authorization using inter-domain role mapping.However,due to the diversity and dynamics of interactive entities,potential interaction risks exist between users and security domains.Therefore,how to carry out inter-domain interaction operations and use the information to conduct risk assessment is an important subject for studying cross-domain interactions.The research in this article is based on RBAC access control technology,and conducts research from two aspects of cross-domain service operation and assessing the risk of cross-domain interaction:(1)Based on the RBAC access model,we propose a cross-domain interaction method based on trusted expectations.In this method,we add credible decay function,risk penalty factor and role level function to calculate the trust value of cross-domain interaction.Then use Bayesian theory to calculate the credible expectation of user interaction.Finally,it is compared with a predetermined access threshold to determine whether the user's interactive request is allowed.The simulation results show that the proposed method can not only reduce the access requests of high-risk users and improve the success rate of user interaction,but also solve the authorization problem of cross-domain interaction through the method of minimum permission set.(2)Based on the existing evaluation model,this paper proposes a method to evaluate the risk relationship between users and security domains.It collects interactive credentials such as the frequency,credibility,and time-effectiveness of the user submitted evaluations.At the same time,it collects the evaluation of quality of service provided by the network security domain.Then we set up a risk evaluation equation based on the interaction credentials to implement the risk evaluation of cross-domain interaction behavior.The experimental results show that the method can comprehensively evaluate the interaction behavior from multiple aspects.Compared with other evaluation methods,it improves the accuracy of evaluation results and meets the security requirements of cross-domain interactions.In summary,in the multi-domain environment of cloud computing,the cross-domain interaction method based on trusted expectations effectively solves the security problem in cross-domain services and provides reference value for the research of cross-domain access technology.
Keywords/Search Tags:cloud computing, Bayesian theory, RBAC, Cross domain access, Safety Assessment, Interactive risk
PDF Full Text Request
Related items