首页> 外文会议>IEEE Network Operations and Management Symposium >A dynamic risk-based access control architecture for cloud computing
【24h】

A dynamic risk-based access control architecture for cloud computing

机译:基于动态风险的云计算访问控制架构

获取原文

摘要

Cloud computing is a distributed computing model that still faces problems. New ideas emerge to take advantage of its features and among the research challenges found in the cloud, we can highlight Identity and Access Management. The main problems of the application of access control in the cloud are the necessary flexibility and scalability to support a large number of users and resources in a dynamic and heterogeneous environment, with collaboration and information sharing needs. This paper proposes the use of risk-based dynamic access control for cloud computing. The proposal is presented as an access control model based on an extension of the XACML standard with three new components: the Risk Engine, the Risk Quantification Web Services and the Risk Policies. The risk policies present a method to describe risk metrics and their quantification, using local or remote functions. The risk policies allow users and cloud service providers to define how to handle risk-based access control for their resources, using different quantification and aggregation methods. The model reaches the access decision based on a combination of XACML decisions and risk analysis. A prototype of the model is implemented, showing it has enough expressivity to describe the models of related work. In the experimental results, the prototype takes between 2 and 6 milliseconds to reach access decisions using a risk policy. A discussion on the security aspects of the model is also presented.
机译:云计算是一种分布式计算模型,仍然面临问题。新的想法出现利用其特征和云中发现的研究挑战,我们可以突出标识和访问管理。云中访问控制应用的主要问题是在动态和异构环境中支持大量用户和资源的必要灵活性和可扩展性,具有协作和信息共享需求。本文提出了对云计算的基于风险的动态访问控制。该提案作为基于XACML标准的扩展作为访问控制模型,具有三个新组件:风险引擎,风险量化Web服务和风险政策。风险策略存在使用本地或远程功能描述风险指标及其量化的方法。风险策略允许用户和云服务提供商使用不同的量化和聚合方法定义如何处理其资源的基于风险的访问控制。基于XACML决策和风险分析的组合,该模型达到了访问决策。实施模型的原型,显示它具有足够的表达性来描述相关工作的模型。在实验结果中,原型需要2至6毫秒,以达到使用风险政策的访问决策。还提出了关于模型的安全方面的讨论。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号