全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2015 

云计算环境下访问控制关键技术

DOI: 10.3969/j.issn.0372-2112.2015.02.017, PP. 312-319

Keywords: 云计算,身份管理,访问控制,数据服务外包

Full-Text   Cite this paper   Add to My Lib

Abstract:

可控信任域的消失和多租户环境的出现,导致云计算环境下访问控制在诸多关键技术上都面临新的严峻挑战.该文从身份供应、身份认证、访问控制、身份联合和单点登录几个方面介绍了产业界在云访问控制上面临的问题和主要解决方法.从访问控制模型、基于属性的密文访问控制和外包数据的访问控制三个方面评述了学术界在云访问控制上的最新研究成果.基于对已有技术和研究成果的分析,预测了云访问控制研究的未来走向.

References

[1]  OASIS.Service provisioning markup language (SPML)[ EB/OL].http://www.oasis-open.org/committees/provision/,2012.
[2]  Slidershare.net.Identity-as-a-service-presentation[EB/OL].http://www.slideshare.net/prabathsiriwardena/identity-as-a-service-presentation,2012.
[3]  Amazon.Amazon simple storage service[EB/OL].http://awsdocs.s3.amazonaws.com/S3/latest/s3-dg.pdf,2012.
[4]  刘鹏.云计算[M].北京:电子工业出版社,2011.
[5]  IETF.The OAuth 1.0 Protocol[EB/OL].http://tools.ietf.org/html/rfc5849,2012.
[6]  OASIS.OASIS eXtensible access control markup language (XACML) TC[EB/OL].http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=xacml,2012.
[7]  Microsoft.Windows azure[EB/OL].http://social.technet.microsoft.com/,2012.
[8]  OASIS.Security assertion markup language (SAML)[ EB/OL].http:// www.oasis-open.org/committees/.../docs/cs-sstc-core-00.doc,2012.
[9]  俞能海,郝卓,徐甲甲,等.云安全研究进展综述[J].电子学报,2012,41(2):371-381. Yu Nenghai,Hao Zhuo,Xu Jiajia,et al.Review of cloud computing security[J].Acta Electronica Sinica,2012,41(2):371-381.(in Chinese)
[10]  Jung Y,Chung M.Adaptive security management model in the cloud computing environment[A].Proceedings of the 12th International Conference on Advanced Communication Technology[C].Washington DC:IEEE Press,2010.1664-1669.
[11]  Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].Proceedings of the 2007 IEEE Symposium on Security and Privacy[C].Berkeley:IEEE Press,2007.321-334.
[12]  Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[A].Proceedings of IEEE INFORCOM 2010[C].San Diego,CA:IEEE Press,2010.1-9.
[13]  陈丹伟,邵菊,樊晓唯,等.基于MAH-ABE的云计算隐私保护访问控制[J].电子学报,2014,42(4):821-827. Chen Danwei,Shao Ju,Fan Xiaowei,et al.MAH-ABE based privacy access control in cloud computing[J].Acta Electronica Sinica,2014,42(4):821-827.(in Chinese)
[14]  Ren K,Wang C,Wang Q.Security challenges for the public cloud[J].IEEE Internet Computing,2012,16 (1):69-73.
[15]  Takabi H,Joshi J B D,Ahn G.Security and privacy challenges in cloud computing environments[J].Security & Privacy,IEEE,2010,8(6):24-31.
[16]  Ronald L,Russell D.Cloud Security:A Comprehensive Guide to Secure Cloud Computing[M].Wiley Publishing,Inc.,2010.
[17]  罗军舟,金嘉晖,宋爱波,等.云计算:体系架构与关键技术[J].通信学报,2011,32(7):3-21. Luo Junzhou,Jing Jiahui,Song Aibo,et al.Cloud computing:architecture and key technologies[J].Journal on Communications,2011,32(7):3-21.(in Chinese)
[18]  IT专家网.盘点2011年各月影响云计算发展的大事件[EB/OL].http://www.ctocio.com.cn/cloud/261/12232761_10.shtml,2012.
[19]  Tim M,Subra K,Shahed L.Cloud Security and Privacy[M].O''Reilly Media,Inc,2009.
[20]  Cloud security alliance.Guidance for identity & access management V2.1[EB/OL].http://www.cloudsecurityalliance.org/guidance/csaguide-dom12-v2.10.pdf,2012.
[21]  Chandran S M,Joshi J B D.Towards administration of a hybrid role hierarchy[A].Proceedings of the 2005 International Conference on Information Reuse and Integration[C].Las Vegas:IEEE Press,2005.500-505.
[22]  Bertino E,Bonatti P A,Ferrari E.TRBAC:a temporal role-based access control model[J].ACM Transactions on Information and Systems Security,2001,4(3):191-223.
[23]  Du S,Joshi J B D.Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy[A].Proceedings of the 2006 ACM Symposium on Access Control Models and Technologies[C].Lake Tahoe:ACM Press,2006.228-236.
[24]  杨柳,唐卓,李仁发,等.云计算环境中基于用户访问需求的角色查找算法[J].通信学报,2011,32(7):169-175. Yang Liu,Tang Zhuo,Li Renfa,et al.Roles query algorithm in cloud computing environment based on user require[J].Journal on Communications,2011,32(7):169-175.(in Chinese)
[25]  林果园,贺珊,黄皓,等.基于行为的云计算访问控制安全模型[J].通信学报,2013,33(3):59-66.(in Chinese) Lin Guoyuan,He Shan,Huang Hao,et al.Access control security model based on behavior in cloud computing environment[J].Journal on Communications,2013,33(3):59-66.(in Chinese)
[26]  Sahai A,Waters B.Fuzzy identity-based encryption[A].Proceedings of Eurocrypt 2005[C].Berlin,2005.457-473.
[27]  Goyal V,Pandey,O,Sahai A,et al.Attribute based encryption for fine-grained access control of encryption security data[A].Proceedings of the 2006 ACM conference on Computer and Communications Security[C].Alexandria,Virginia,USA:ACM Press,2006.89-98.
[28]  Kamara S, Lauter K.Cryptographic cloud storage[A].Proceedings of the 14th international conference on Financial cryptography and data security[C].Berlin,Germany,2010.136-149.
[29]  Wang W,Li Z,Owens R,et al.Secure and efficient access to outsourced data[A].Proceedings of the ACM Workshop on Cloud Computing Security[C].Chicago,USA,2009.55-66.
[30]  Abdulrahman A A,Muhammad I S,Saleh B,et al.A distributed access control architecture for cloud computing[J].IEEE Software,2012,29(2):36-44.

Full-Text

Contact Us

[email protected]

QQ:3279437679

WhatsApp +8615387084133