首页> 外文会议>International conference on computer engineering and network >Strategy of Domain and Cross-Domain Access Control Based on Trust in Cloud Computing Environment
【24h】

Strategy of Domain and Cross-Domain Access Control Based on Trust in Cloud Computing Environment

机译:云计算环境中基于信任的域和跨域访问控制策略

获取原文

摘要

Under the current cloud computing environment, a reasonable and practicable access control strategy is needed, which is a guarantee to protect cloud computing suppliers to provide services and many cloud users access to services. In this paper, based on analysis of many cloud computing safety features, trust management is introduced into the cloud computing service access control, within the domain of a trust-based access control strategy, in domain, presents a trust-based access control policy. Credible value will be given through the comprehensive treatment of the entity, and then AAC (authentication and authorization center) authorizes the appropriate access rights to achieve the control of the monomer in the domain. Combined with the characteristics of the existing cloud computing environment, in multiple management domains, this paper proposes a role mapping, with the role mapping relationship between the domain, which can make the inter-domain access to resources and security shared access between different domains, in order to avoid the problem of permission penetration and privilege escalation, this paper presents the mirror role based on role mapping, ultimately solves the problem.
机译:在当前的云计算环境下,需要一种合理可行的访问控制策略,这是保护云计算供应商提供服务和许多云用户访问服务的保证。本文在分析了许多云计算安全特性的基础上,将信任管理引入到云计算服务访问控制中,在基于信任的访问控制策略的范围内,提出了一种基于信任的访问控制策略。通过对实体的综合处理,将获得可信赖的价值,然后AAC(身份验证和授权中心)授权适当的访问权限,以实现对域中单体的控制。结合现有云计算环境的特点,在多个管理域中提出了一种角色映射,具有域之间的角色映射关系,可以使域间资源访问和不同域之间的安全共享访问,为了避免权限渗透和权限提升的问题,本文提出了一种基于角色映射的镜像角色,最终解决了该问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号