[1]付雄[],徐松[],周代明[]. 云计算环境下基于信任的访问控制模型研究[J].计算机技术与发展,2015,25(09):139-143.
 FU Xiong[],XU Song[],ZHOU Dai-ming[]. Research on Trust-based Access Control Model in Cloud Computing Environment[J].,2015,25(09):139-143.
点击复制

 云计算环境下基于信任的访问控制模型研究()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年09期
页码:
139-143
栏目:
安全与防范
出版日期:
2015-09-10

文章信息/Info

Title:
 Research on Trust-based Access Control Model in Cloud Computing Environment
文章编号:
1673-629X(2015)09-0139-05
作者:
 付雄[1] 徐松[1] 周代明[2]
 1.南京邮电大学 计算机学院;2.扬州莱斯信息技术有限公司
Author(s):
 FU Xiong[1] XU Song[1] ZHOU Dai-ming[2]
关键词:
 云存储访问控制行为信任值动态调整
Keywords:
 cloud storageaccess controlbehavior trust valuedynamic adjustment
分类号:
TP309
文献标志码:
A
摘要:
 随着云计算的应用范围越来越广,云计算相应的研究成果越来越丰富,与此同时各种各样的问题也越来越多,而其中的安全问题一直都是广受关注的问题之一,并且其重要性正呈现逐步上升的趋势。云计算安全主要表现在访问控制、虚拟化安全和Web安全防护三个方面。针对其中的访问控制问题,文中引入信任管理的思想,提出了一种基于信任的访问控制模型。该模型根据用户实时行为通过相应的算法计算出用户的信任值,据此为用户分配权限。当出现非安全访问时,此模型能够动态调整用户的权限,有效地阻止其非安全访问行为,保护其他用户以及云中重要资源免遭破坏。实验结果表明,根据该模型得到的信任值符合用户的实际情况,同时该模型能有效抵御用户的恶意攻击。
Abstract:
 With extensive application of cloud computing,the research of cloud computing becomes more and more rich,at the same time, various problems also become more and more,and the safety has been a popular one of concern,and its importance is gradually rising trends. Cloud computing security problems include access control,virtualization and Web security. For access control problem in cloud computing environment,introduce the idea of trust management and propose an access control model based on trust. The model calculates user’ s behavior trust value according to the behavior evidences that are obtained in real time,and then determine the appropriate permis-sions depending on the confidence value. When the user has a non-secure access behavior,this model can dynamically adjust the user’ s permissions,effectively preventing users from the non-secure access behavior and protecting other users and important resources in the cloud from destruction. The experimental results show that trust values according to the model are more in line with the user’ s actual situ-ation,and the model can resist malicious attacks of users effectively.

相似文献/References:

[1]王德政 申山宏 周宁宁.云计算环境下的数据存储[J].计算机技术与发展,2011,(04):81.
 WANG De-zheng,SHEN Shan-hong,ZHOU Ning-ning.Data Storage in Cloud Computing Environment[J].,2011,(09):81.
[2]王永洲[],茅苏[].HDFS中的一种数据放置策略[J].计算机技术与发展,2013,(05):90.
 WANG Yong-zhou,MAO Su.A Blocks Placement Strategy in HDFS[J].,2013,(09):90.
[3]卞艺杰,马玲玲.云环境下移动视频监控系统安全性研究[J].计算机技术与发展,2013,(09):119.
 BIAN Yi-jie,MA Ling-ling.Research on Security of Mobile Video Surveillance System under Cloud Environment[J].,2013,(09):119.
[4]李东阳,刘鹏,田浪军.基于SSD的云存储主服务器元数据管理研究[J].计算机技术与发展,2013,(10):68.
 LI Dong-yang,LIU Peng,TIAN Lang-jun.Research on Master Server Metadata Management in Cloud Storage System Based on SSD[J].,2013,(09):68.
[5]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[6]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[7]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[8]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[9]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[10]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[11]王凤领. 基于Hadoop高校教育资源云存储平台构建研究[J].计算机技术与发展,2016,26(03):176.
 WANG Feng-ling. Study on Construction of Cloud Storage Platform for College Education Resources Based on Hadoop[J].,2016,26(09):176.
[12]庞立君,廖春伟,黄波,等. 基于GID的车联网数据安全方案[J].计算机技术与发展,2016,26(04):101.
 PANG Li-jun,LIAO Chun-wei,HUANG Bo,et al. Data Security Scheme of IOV Based on GID[J].,2016,26(09):101.
[13]王法,谭郁松,伍复慧,等. 基于云存储视频处理框架的研究与实现[J].计算机技术与发展,2016,26(05):1.
 WANG Fa,TAN Yu-song,WU Fu-hui,et al. Research and Implementation of Video Processing Framework Based on Cloud Storage[J].,2016,26(09):1.
[14]周晓梅[],朱金付[],段洪秀[]. LeanCloud在图片管理系统中的应用研究[J].计算机技术与发展,2016,26(07):138.
 ZHOU Xiao-mei[],ZHU Jin-fu[],DUAN Hong-xiu[]. Application Study of LeanClound in Picture Management System[J].,2016,26(09):138.
[15]郑印[],吴振宇[],沈苏彬[]. 一种基于OpenStack的云存储空间动态调整方案[J].计算机技术与发展,2016,26(10):45.
 ZHENG Yin[],WU Zhen-yu[],SHEN Su-bin[]. A Dynamic Adjustment Solution of Cloud Storage Space Based on OpenStack[J].,2016,26(09):45.
[16]金思宇[],吴振宇[],沈苏彬[].一种基于Android平台的云客户端实现方案[J].计算机技术与发展,2016,26(11):19.
 JIN Si-yu[],WU Zhen-yu[],SHEN Su-bin[]. A Cloud Client Implementation Scheme Based on Android Platform[J].,2016,26(09):19.
[17]王强[],宗平[]. 云存储中基于可信第三方的安全可问责方案[J].计算机技术与发展,2017,27(10):111.
 WANG Qiang[],ZONG Ping[].A Data Security Accountability Scheme with Trusted Third Party in Cloud Storage[J].,2017,27(09):111.

更新日期/Last Update: 2015-10-16