Research on role-based Trusted cloud computing Security strategy
Source: Internet
Author: User
KeywordsCloud computing cloud security cloud security role Trust
Research on role-based Trusted cloud computing Security strategy
Lu Shenjuan of Shandong Normal University
This paper focuses on the problem of trust and access control in cloud computing environment. The main work has the following points: 1, the implementation of cloud computing and the concept of the credibility of the combination of cloud computing and the concept of trust, the cloud service requester to authenticate the credibility of the use of two-level verification strategy, the right to judge the credibility of the transaction users, Implement more flexible role mappings and permission grants. 2, a new inverse cloud generation algorithm is proposed based on the original one-dimensional inverse cloud generation algorithm, a new inverse cloud generation algorithm is proposed, which combines the expectation ex, entropy en, and super entropy he to evaluate the user's credibility, and choose the object which is high in content and stable, and Thus provide a certain credible basis for the transaction of cloud services. 3, a role-based and trusted access control model is proposed based on the traditional role-based access control model, combining the trusted mechanism with the role, proposes a role-based and trusted access control model T‐RBAC, and validates the user's identity, credibility and other information. Enhance the anti-jamming capability and throughput of the access control model and reduce network latency. 4, a new method of trusted value updating is proposed to improve the possibility of reducing malicious attack. The user's direct trust value, recommended trust value, comprehensive trust value are calculated respectively, and the user's trust value is updated in real time according to the user's behavior, so that the malicious entity can carry out malicious attack by accumulating the trusted value for a long time. Poses a danger to cloud resources. 5, the design simulation experiment verifies the validity design simulation experiment to verify the algorithm, the accuracy, the efficiency, the network delay, the throughput and the anti-interference aspect contrast, the accuracy and the efficiency appraisal standard respectively is the confidence change rate, the trust value computation time expense.
Research on role-based Trusted cloud computing Security strategy
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.