计算机科学 ›› 2014, Vol. 41 ›› Issue (Z6): 262-264.

• 无线网络与通信 • 上一篇    下一篇

云环境下基于UCON的访问控制模型研究

蔡婷,陈昌志   

  1. 重庆邮电大学移通学院计算机系 重庆401520;重庆邮电大学移通学院计算机系 重庆401520;重庆邮电大学计算机学院 重庆400065
  • 出版日期:2018-11-14 发布日期:2018-11-14

Research for Access Control Model Based on UCON in Cloud Computing

CAI Ting and CHEN Chang-zhi   

  • Online:2018-11-14 Published:2018-11-14

摘要: UCON(Usage Control)访问控制模型,通过引入“义务”和“条件”两个概念,实现了传统访问控制模型、信任管理和数字版权管理3个技术领域的融合,扩展了模型的控制覆盖范围,能更好地应用于云计算环境。针对 UCON模型的隐私保护问题,提出了一种基于加密方式的授权管理控制模型——AM-UCON。该模型在认证和监控的基础上,以多方验证的方法来提高属性更新的可信性和授权的正确性,能在一定程度上抵制恶意篡改隐私策略信息的问题。最后给出该模型的实现过程,并在基于云计算的数字对象发布系统中予以实现。

关键词: 云环境,UCON,访问控制,授权管理,隐私策略 中图法分类号TP393文献标识码A

Abstract: UCON(Usage Control) access control model,by introducing two concepts of “obligation” and “conditon”,integrates the three technical fields of traditional access control model-confidence mana-gement and digital copyrigh management,and extends the cover scope in control mechanism of the model,which make it more adapt to cloud computing.In consideration of the privacy protection in UCON model,an authorized management control(AM-UCON) model based on encryption pattern was proposed.Based on identification and monitoring,the model uses multiple validation to improve the creditability in the renew of attributes and the correctness in authorization,to some extend,which can deal with the problem of malicious tampering for privacy strategies.Finally,the model’s realization process was given,and was achieved in the digital object release system based on cloud computing environment.

Key words: Cloud environment,UCON,Access control,Authorize manage,Privacy strategy

[1] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,2(1):71-83
[2] 赵明斌,姚志强.基于RBAC的云计算访问控制模型[J].计算机应用,2012,2(S2):267-270
[3] Ferraiolo D,Cugini J,Kuhn D R.Role Based Access Control(RBAC):Features and Motivations[C]∥Proc.1995Computer Security Applications Conference.December 1995:241-248
[4] Sandhu R,Park J.Towards Usage Control Models:Beyond traditional access control[C]∥Proceedings of the 7th ACM Symposium on Access Control Models and Technologies.2002:57-64
[5] 聂丽平.基于UCON访问控制模型的分析与研究[D]:合肥:合肥工业大学,2006
[6] 崔永泉,洪帆,龙涛,等.基于使用控制和上下文的动态网络访问控制模型研究[J].计算机科学,2008,5(2):37-41
[7] Yao Dong-mei,Pan Jing-gui.A Method of Solving Geographical Constraints in Cloud Computing with UCON Access Control Model[C]∥The 3rd International Conference on Information Science and Engineering.Yangzhou:ICISE,2012:5111-5114
[8] Krautsevich L,Lazouski A,Martineli F,et al.Risk-Aware Usa-ge Decision Making in Highly Dynamic Systems[C]∥The Fifth International Conference on Internet Monitoring and Protection.Barcelona:Spain,2010
[9] 李钢,李沛武,胡海霞.使用控制系统中属性更新的并发控制研究[J].南京工程学院学报,2008,7(4):19-23
[10] Ghemawat S,Gobioff H,Leung S T.The Google File System[C]∥Proc.of the 19th ACM Symposium on Operating Systems Principles.New York:ACM Press,2003:29-43
[11] 陈坤定.消息摘要算法在Java Web系统中的应用[J].长春大学学报,2012,2(4):409-412
[12] Zhu Yan,Hu Hong-xin,Ahn G-J.Towards temporal access control in cloud computing[C]∥INFOCOM,Proceedings IEEE.2012:2576-2580

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!