Improved Access Control Model Under Cloud Computing Environment
With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in the cloud. This paper briefly describ
- PDF / 238,120 Bytes
- 6 Pages / 439.37 x 666.142 pts Page_size
- 49 Downloads / 256 Views
Improved Access Control Model Under Cloud Computing Environment Yongsheng Zhang, Jiashun Zou, Yan Gao and Bo Li
Abstract With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in the cloud. This paper briefly describes the cloud computing and traditional access control model based on the latest research. Then the paper sums up the work and puts forward a new kind of access control model based on the hop named HBAC. It is based on the role access control that based on mapping. It is used to control the length of path to access the data in outer domain. At last, the paper gives the concrete steps to describe the principle of its operation in detail. And this paper makes a comparison with other related researches. Then this paper summarizes the advantages and disadvantages of HBAC. Keywords Cloud security
Access control RBAC HBAC
Y. Zhang J. Zou (&) Y. Gao School of Information Science and Engineering, Shandong Normal University, Shandong Provincial Key Laboratory for Novel Distributed Computer Software Technology, Jinan 250014, China e-mail: [email protected] Y. Zhang e-mail: [email protected] Y. Gao e-mail: [email protected] B. Li Academic Affairs Office, Shandong Polytechnic, Jinan 250104, China e-mail: [email protected]
S. Li et al. (eds.), Frontier and Future Development of Information Technology 2425 in Medicine and Education, Lecture Notes in Electrical Engineering 269, DOI: 10.1007/978-94-007-7618-0_300, Springer Science+Business Media Dordrecht 2014
2426
Y. Zhang et al.
300.1 Cloud Computing 300.1.1 Concept of Cloud Computing The cloud computing has not been clearly defined up to now. Although the exact meaning of cloud computing has not yet been fully understood, everywhere is various related service. The understanding of this paper is: Cloud computing is a kind of service used for data storage and applications through the Internet and remote service center [1].
300.1.2 Cloud Security Issues Under the cloud computing environment, users will not store their information data in their hard drives, but in the remote server data center [2]. Because of the change of data center from the client to the server, the data security of the server is very important. Therefore trusted cloud security technology is also developing rapidly. Many scholars have done research on the aspects of destruction and protection of data, such as the proposed Dissolver system [3].
300.2 Traditional Access Control Model ISO, the international organization for standard proposed the hierarchical security architecture in the design standard of the security of network system (ISO7498-2), and defined five security services: authentication service, access control, data confidentiality, data integrity, non-repudiation service. As one of the five services, access control service plays an irreplaceable role in network security system [4]. Traditional access control mo
Data Loading...