Int. J. of Internet Protocol Technology   »   2017 Vol.10, No.4

 

 

Title: System security model based on trusted access control under cloud computing environment

 

Author: Fengqi Wang

 

Address: Inner Mongolia Electronic Information Vocational Technical College, Inner Mongolia Hohhot, 010070, China

 

Abstract: It has become a hot spot of cloud security to provide good service for legal user, and prevent access from illegal user or illegal access from legal user. Therefore, it is urgent to design a reasonable access control security model under cloud computing. This paper discusses trust definition and computation in cloud computing environment and uses scientific methods to compute comprehensive trust degree. Then based on RBAC model the conception of trust is introduced to form a trust-based access control model. The security model satisfies the design for access control mechanism in opened system, by establishing indirect user-role distribution relation and context constrain which reflecting context information. The formal definition and access control policies of the model are explained. The scheme can dynamically determine the authorisation according to the user's trust value, so it can detect the user's abnormal behaviour at any time and respond in a timely manner. The simulations shows this model can effectively help users in cloud service to make choices on security and reliability, and it also shows better dynamic property to prevent abnormal behaviours of the users.

 

Keywords: security; access control; trust degree; context; RBAC.

 

DOI: 10.1504/IJIPT.2017.10009870

 

Int. J. of Internet Protocol Technology, 2017 Vol.10, No.4, pp.236 - 242

 

Submission date: 21 Jun 2017
Date of acceptance: 12 Aug 2017
Available online: 21 Dec 2017

 

 

Editors Full text accessPurchase this articleComment on this article