Skip to main content
Top

2018 | OriginalPaper | Chapter

A Classified Access Control Model Research for Cloud Computing

Authors : Wenyi Shen, Linbo Tao, Bo Liu, Yishen Wang

Published in: Proceedings of 2017 Chinese Intelligent Automation Conference

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security is a key problem to restrict the promotion of cloud computing, access control has important effect on security of cloud data for the distributed and dynamic characteristics of cloud computing. In order to realize the fine grained access control in cloud computing environment, the sensitivity classification strategy of objects and the authorization rules between the object owner and the cloud server have been studied. And then the classified-task-role access control model(CT-RBAC) according to T-RBAC model has been designed to get better efficiency and fine grain.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jiang Z-W, Zhao W-R, Liu Y, Liu B-X (2013) Model for cloud computing security assessment based on classified protection. Comput Sci 40(8):151–156 (in Chinese) Jiang Z-W, Zhao W-R, Liu Y, Liu B-X (2013) Model for cloud computing security assessment based on classified protection. Comput Sci 40(8):151–156 (in Chinese)
2.
go back to reference Xin Chen, Wang X-H, Huang H (2009) Research on multi-attribute information security risk assessment method based on threat analysis. Comput Eng Design 30(1):38–41 (in Chinese) Xin Chen, Wang X-H, Huang H (2009) Research on multi-attribute information security risk assessment method based on threat analysis. Comput Eng Design 30(1):38–41 (in Chinese)
3.
go back to reference Fan J, Xue Y (2010) Information security risk assessment method based on traffic and classified protection. Comput Digital Eng 38(3):112–115 (in Chinese) Fan J, Xue Y (2010) Information security risk assessment method based on traffic and classified protection. Comput Digital Eng 38(3):112–115 (in Chinese)
4.
go back to reference Yang H, Fong S (2013) Countering the Concept-drift Problem in Big Data Using iOVFDT. IEEE Int Congr Big Data 2013:126–132 Yang H, Fong S (2013) Countering the Concept-drift Problem in Big Data Using iOVFDT. IEEE Int Congr Big Data 2013:126–132
5.
go back to reference Wang Y-D, Yang J-H, Xu C, Ling X, Yang Y (2015) Survey on access control technologies for cloud computing. Journal of Software 26(5):1129–1150 (in Chinese)MathSciNet Wang Y-D, Yang J-H, Xu C, Ling X, Yang Y (2015) Survey on access control technologies for cloud computing. Journal of Software 26(5):1129–1150 (in Chinese)MathSciNet
6.
go back to reference Hong C, Zhang M, Feng DG (2010) AB-ACCS: a cryptographic access control scheme for cloud storage. J Comput Res Dev 47:259–265 Hong C, Zhang M, Feng DG (2010) AB-ACCS: a cryptographic access control scheme for cloud storage. J Comput Res Dev 47:259–265
7.
go back to reference Li W-G, Zhao F-Yu (2013) RBAC permission access control model with attribute policy. J Chin Comput Syst 34(2):328–331MathSciNet Li W-G, Zhao F-Yu (2013) RBAC permission access control model with attribute policy. J Chin Comput Syst 34(2):328–331MathSciNet
8.
go back to reference Li F-H, Su M, Shi G-Z, Ma J-F (2012) Research status and development trends of access control model. Acta Electronica Sinica 40(4):805–813 (in Chinese) Li F-H, Su M, Shi G-Z, Ma J-F (2012) Research status and development trends of access control model. Acta Electronica Sinica 40(4):805–813 (in Chinese)
9.
go back to reference Wang X-W, Zhao Y-M (2012) A task-role-based access control model for cloud computing. Comput Eng 38(24):9–13 (in Chinese) Wang X-W, Zhao Y-M (2012) A task-role-based access control model for cloud computing. Comput Eng 38(24):9–13 (in Chinese)
10.
go back to reference Yi H, Li K-L (2013) Model of cloud computing oriented T-RBAC. Application Research of Computers 30(12):3735–3737 (in Chinese) Yi H, Li K-L (2013) Model of cloud computing oriented T-RBAC. Application Research of Computers 30(12):3735–3737 (in Chinese)
Metadata
Title
A Classified Access Control Model Research for Cloud Computing
Authors
Wenyi Shen
Linbo Tao
Bo Liu
Yishen Wang
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6445-6_36