计算机应用 ›› 2016, Vol. 36 ›› Issue (7): 1834-1840.DOI: 10.11772/j.issn.1001-9081.2016.07.1834

• 网络空间安全 • 上一篇    下一篇

云系统中多域安全策略规范与验证方法

蔡婷1, 蔡宇1, 欧阳凯2   

  1. 1. 重庆邮电大学移通学院 计算机系, 重庆 401520;
    2. 华中科技大学 计算机学院, 武汉 430074
  • 收稿日期:2015-12-28 修回日期:2016-03-14 出版日期:2016-07-10 发布日期:2016-07-14
  • 通讯作者: 蔡婷
  • 作者简介:蔡婷(1984-),女,湖北广水人,讲师,硕士,主要研究方向:互联网计算、网络安全结构与控制;蔡宇(1979-),男,河南郑州人,讲师,硕士,主要研究方向:云计算、信息安全;欧阳凯(1978-),男,四川成都人,副教授,博士,主要研究方向:网络安全控制、安全操作系统。
  • 基金资助:
    重庆市本科高校“三特行动计划”特色专业建设项目(渝教高(2013)49号);重庆市教委科学技术研究项目(KJ1502002,KJ1502003);重庆市高等教育学会2015-2016年度高等教育科学研究课题(CQGJ15203B);重庆市教育科学“十二五”规划高等教育质量提升专项成果(2015-GX-086)。

Specification and verification method for security policy in multi-domain cloud systems

CAI Ting1, CAI Yu1, OUYANG Kai2   

  1. 1. Department of Computer, College of Mobile Telecommunications, Chongqing University of Posts and Telecommunications, Chongqing 401520, China;
    2. School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan Hubei 430074, China
  • Received:2015-12-28 Revised:2016-03-14 Online:2016-07-10 Published:2016-07-14
  • Supported by:
    This work is partially supported by the "Three Special Action Plan" Specialty Construction Project of Universities in Chongqing (Yu Teach High (2013) No. 49), the Science and Technology Research Project of Education Committee of Chongqing (KJ1502002, KJ1502003), the Scientific Research Programs in Higher Education of Chongqing Institute of Higher Education (CQGJ15203B), the Quality Improvement Projects in Higher Education of Chongqing Education Science "Twelfth Five Year Plan" (2015-GX-086).

摘要: 为了有效管理云系统间跨域互操作中安全策略的实施,提出一种适用于云计算环境的多域安全策略验证管理技术。首先,研究了安全互操作环境的访问控制规则和安全属性,通过角色层次关系区分域内管理和域间管理,形式化定义了基于多域的角色访问控制(domRBAC)模型和基于计算树逻辑(CTL)的安全属性规范;其次,给出了基于有向图的角色关联映射算法,以实现domRBAC角色层次推理,进而构造出了云安全策略验证算法。性能实验表明,多域互操作系统的属性验证时间开销会随着系统规模的扩大而增加。技术采用多进程并行检测方式可将属性验证时间减少70.1%~88.5%,其模型优化检测模式相比正常模式的时间折线波动更小,且在大规模系统中的时间开销要明显低于正常模式。该技术在规模较大的云系统安全互操作中具有稳定和高效率的属性验证性能。

关键词: 云系统, 多域, 访问控制, 安全互操作, 策略, 验证

Abstract: To effectively manage the enforcement of secure policies during the cross-domain interoperation among cloud systems, a management technique applied for the verification of multi-domain cloud policies was proposed. First, both the access control policies and security properties under secure inter-operation environments were studied, the intra-domain administration was distinguished from inter-domain administration according to role hierarchies, and a multi-domain Role Based Access Control (domRBAC) model and specifications for the security properties based on Computation Tree Logic (CTL) were formally defined. Next, a role-to-role mapping algorithm derived from the graph theory was proposed, to depict the reasoning for domRBAC hierarchies, and a verification algorithm of security policies for cloud systems was further constructed. The simulation results show that, the time cost of security policy verification for multi-domains increases with the expansion of the size of the system. Multi-process parallel detection mode can reduce the time of policy verification from 70.1% to 88.5%, and compared to the normal mode, the model optimized detection mode fluctuates smaller in time lines, and the time overhead is significantly lower for large-scale systems. Therefore, the proposed technique has stable performance and high efficiency to be used in secure interoperation of large-scale cloud systems.

Key words: cloud system, multi-domain, access control, secure interoperation, policy, verification

中图分类号: