计算机应用 ›› 2014, Vol. 34 ›› Issue (4): 1051-1054.DOI: 10.11772/j.issn.1001-9081.2014.04.1051

• 计算机安全 • 上一篇    下一篇

云计算下基于用户行为信任的访问控制模型

张凯,潘晓中   

  1. 武警工程大学 电子技术系,西安 710086
  • 收稿日期:2013-10-09 修回日期:2013-11-19 出版日期:2014-04-01 发布日期:2014-04-29
  • 通讯作者: 张凯
  • 作者简介:张凯(1990-),男,山西长治人,硕士研究生,主要研究方向:网络安全、云计算;
    潘晓中(1964-),男,陕西西安人,教授,主要研究方向:网络安全、密码学。

Access control model based on trust of users' behavior in cloud computing

ZHANG Kai,PAN Xiaozhong   

  1. Department of Electronics, Engineering University of Armed Police Force, Xi'an Shaanxi 710086, China
  • Received:2013-10-09 Revised:2013-11-19 Online:2014-04-01 Published:2014-04-29
  • Contact: ZHANG Kai

摘要:

针对当前云计算访问控制中角色不能随着时间动态改变的问题,提出了一种基于用户行为信任的云计算访问控制模型。该模型根据综合用户的直接和间接信任值得到的信任值确定其信任等级,激活其所对应的角色以及赋予该角色一定的访问权限,提供请求的资源,从而达到访问控制的目的;并给出了基本组成元素和实现过程。实验结果表明,所提出的访问控制模型能够提高用户行为信任值评估的客观性,能够抵抗各类非法用户访问云计算,增强了云计算中资源的安全性和可靠性。

Abstract:

Considering the problem that the role of the user cannot be changed dynamically over time in access control model of cloud computing, a new access control model was proposed based on trust of users' behaviors for cloud computing. The trust level was determined according to the trust value synthesized from direct trust and recommendation trust, the roles were activated and granted permission to access resources, then services provided the requested resources, so as to achieve the purposes of access control. Besides, the basic elements and implementation process were proposed. The experimental results demonstrate that the proposed model can improve the objectivity of the trust evaluation of users' behaviors, and it can resist all illegal users access to cloud computing and enhance reliability and security of the data in cloud computing.

中图分类号: