云计算中基于声明的访问控制分析-statement - based access control analysis in cloud computing.docxVIP

  • 2
  • 0
  • 约5.17万字
  • 约 57页
  • 2018-06-05 发布于上海
  • 举报

云计算中基于声明的访问控制分析-statement - based access control analysis in cloud computing.docx

云计算中基于声明的访问控制分析-statement - based access control analysis in cloud computing

AbstractWith the development and popularization of Internet network application technology, the amount of network users and data grow rapidly, and follow it cloud computing emerged. How- ever, the current development of cloud computing faces many key problems, and bears the brunt of the security. With the popularization of cloud computing, the importance of security has pre- sented a gradual upward trend, and become an important factors that limit the development of cloud computing. Access control is one of the security problems. It prevents illegal users inva- sion and legal user mistake that damage system resources through the control of the customer to access the resource of the system, in order to ensure that system resources can be lawful and reasonable used. Therefore, a highly efficient and secure access control system is one of the significant factors for the rapid development of cloud computing.This paper mainly studies claim-based access control in cloud computing. A claim is a bit of identity information that contains a type, value and authority. The accessing the protested resource is authorized with the claim. The main points of this paper are as follows:Analysis of Security Assertion Markup Language, it is an XML-based description lan- guage. It is not only to focus on a description of information, but also took note of the security of information sharing. Then ABE is introduced systematically.claim-based access control is realized through the two steps: first of all, perform a au- thorization strategy that an evaluation context as the input is translated into a authorized context as the output; Secondly, compare the authorized context and the access request, and then according to the results of the comparison, the request wether is accepted or refused. We propound a claim-based access control scheme in local domain in cloud computing in this paper, then implement the scheme.In the open environment, such as cloud platform, different clients and servers

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档