Method of Access Control Model Establishment for Marine Information Cloud Platforms Based on Docker Virtualization Technology

ABSTRACT Shu, J. and Wu, Y., 2018. Method of access control model establishment for marine information cloud platforms based on Docker virtualization technology. In: Ashraf, M.A. and Chowdhury, A.J.K. (eds.), Coastal Ecosystem Responses to Human and Climatic Changes throughout Asia. Aiming at the problem that the current access control model is inefficient and computationally intensive for marine information access control in cloud platforms, a method of access control model establishment of marine information cloud platforms based on Docker is proposed. Information entropy theory is used to implement the violation operation, and the security theorem of the access control model is given in the form of security entropy. Docker container virtualization technology and an attribute-based ciphertext access control scheme are used to jointly control the user cross-domain and cross-level access, and ensure consistency in the control of illegal access to realize establishment of the marine information cloud platform access control model. The experimental results showed that the proposed method can improve the control efficiency while ensuring the security of access.

[1]  Muhammad Naeem,et al.  INFLUENCE OF DIETARY PROTEIN ON PROXIMATE COMPOSITION OF MORI,CIRRHINUSMRIGALA(HAMILTON) , 2017 .

[2]  Jun Wang,et al.  The crust and uppermost mantle s-wave velocity structure beneath japan islands revealed by joint analysis of p-and s-wave receiver functions , 2017 .

[3]  Norbert Simon,et al.  Landslide susceptibility analysis lsa using weighted overlay method wom along the genting sempah to bentong highway pahang , 2017 .

[4]  Muhammad Umar,et al.  BIOSTRATIGRAPHY OF EARLY EOCENE MARGALA HILL LIMESTONE IN THE MUZAFFARABAD AREA (KASHMIR BASIN, AZAD JAMMU AND KASHMIR) , 2017 .

[5]  Y. Tseng OVERVIEW AND EXPERIENCE OF ADOPTING AFFORDABLE PARALLEL COMPUTING PLATFORMS FOR HIGH PERFORMANCE COMPUTING EDUCATION , 2015 .

[7]  Stefan Tilkov The Modern Cloud-Based Platform , 2015, IEEE Softw..

[8]  Sungyoung Lee,et al.  Oblivious user management for cloud-based data synchronization , 2015, The Journal of Supercomputing.

[9]  Muhammad Shahid,et al.  COMPARATIVE ANTI-BACTERIAL ACTIVITIES OF NIGELLA SATIVA AND LINCOMYCIN IN THE GUT OF BROILER CHICKS , 2017 .

[10]  Rami Bahsoon,et al.  Self-Adaptive and Online QoS Modeling for Cloud-Based Software Services , 2017, IEEE Transactions on Software Engineering.

[11]  V. Viji Rajendran,et al.  Hybrid model for dynamic evaluation of trust in cloud services , 2016, Wirel. Networks.

[12]  Shufen Xiao,et al.  Research on Quantum Authentication Methods for the Secure Access Control Among Three Elements of Cloud Computing , 2016 .

[13]  Francisco Javier García Blas,et al.  Exploiting in-memory storage for improving workflow executions in cloud platforms , 2016, The Journal of Supercomputing.

[14]  A. Nasir,et al.  Clinical waste management practices in district faisalabad , 2017 .

[15]  Xiaohua Jia,et al.  Embedding complete binary trees into parity cubes , 2014, The Journal of Supercomputing.

[16]  Muhammad Yasin,et al.  THE MODAL ANALYSIS OF ROCKS IN THE DWELLING OF POONCH AND SUDHUNHOTI, AZAD JAMMU AND KASHMIR, PAKISTAN , 2017 .

[17]  Yang Wang,et al.  ACS: an effective admission control scheme with deadlock resolutions for workflow scheduling in clouds , 2014, Computing.

[18]  Tadashi Yamazaki,et al.  Simulation Platform: A cloud-based online simulation environment , 2011, Neural Networks.