Research on role-based Trusted cloud computing Security strategy

Source: Internet
Author: User
Keywords Cloud computing cloud security cloud security role Trust

Research on role-based Trusted cloud computing Security strategy

Lu Shenjuan of Shandong Normal University

This paper focuses on the problem of trust and access control in cloud computing environment. The main work has the following points: 1, the implementation of cloud computing and the concept of the credibility of the combination of cloud computing and the concept of trust, the cloud service requester to authenticate the credibility of the use of two-level verification strategy, the right to judge the credibility of the transaction users, Implement more flexible role mappings and permission grants. 2, a new inverse cloud generation algorithm is proposed based on the original one-dimensional inverse cloud generation algorithm, a new inverse cloud generation algorithm is proposed, which combines the expectation ex, entropy en, and super entropy he to evaluate the user's credibility, and choose the object which is high in content and stable, and Thus provide a certain credible basis for the transaction of cloud services. 3, a role-based and trusted access control model is proposed based on the traditional role-based access control model, combining the trusted mechanism with the role, proposes a role-based and trusted access control model T‐RBAC, and validates the user's identity, credibility and other information. Enhance the anti-jamming capability and throughput of the access control model and reduce network latency. 4, a new method of trusted value updating is proposed to improve the possibility of reducing malicious attack. The user's direct trust value, recommended trust value, comprehensive trust value are calculated respectively, and the user's trust value is updated in real time according to the user's behavior, so that the malicious entity can carry out malicious attack by accumulating the trusted value for a long time. Poses a danger to cloud resources. 5, the design simulation experiment verifies the validity design simulation experiment to verify the algorithm, the accuracy, the efficiency, the network delay, the throughput and the anti-interference aspect contrast, the accuracy and the efficiency appraisal standard respectively is the confidence change rate, the trust value computation time expense.


Research on role-based Trusted cloud computing Security strategy

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.