Trust Based Access Control Policy in Multi-domain of Cloud Computing

Cloud computing is a new paradigm which enables users to reduce their costs and is advantageous to both the serving and served organizations. However, security issue is a major concern in the adoption of cloud computing. The most effective way of protecting cloud computing services, resources and users is access control. This paper intends to provide a trust-based access control mechanism for cloud computing considering its multi-domain aspects. Firstly, trust is introduced into cloud computing environment and trust relationships between users and cloud platform are built. It also analyzes the difference between intra-domain trust and inter-domain trust. Furthermore, a role-based access control framework combined with trust degree in multi-domain is given from this paper. Access control in local domain directly applies RBAC model combined with trust degree, whereas in multi-domain it contains the conception of role translation. The simulation results show that the proposed method is more suitable to cloud environment and definitely can improve the reliability and validity of the system.

[1]  Su Cheng Using trust in access control mechanism , 2007 .

[2]  Roy H. Campbell,et al.  IRBAC 2000: Secure Interoperability Using Dynamic Role Translation , 2000, International Conference on Internet Computing.

[3]  Krishna P. Gummadi,et al.  Towards Trusted Cloud Computing , 2009, HotCloud.

[4]  Sai Liu,et al.  A Robust Collaborative Filtering Recommendation Algorithm Based on Multidimensional Trust Model , 2013, J. Softw..

[5]  Lang Bo Access control oriented quantified trust degree representation model for distributed systems , 2010 .

[6]  Dengguo Feng,et al.  Study on Cloud Computing Security: Study on Cloud Computing Security , 2011 .

[7]  Chen Xu-ri Trustworthiness-Based Dynamic Access Control for Grid Application , 2008 .

[8]  Zhang Hong,et al.  TRBAC: Trust Based Access Control Model , 2011 .

[9]  Zhang Min,et al.  Study on Cloud Computing Security , 2011 .

[10]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[11]  Vijay Varadharajan,et al.  General Methodology for Analysis and Modeling of Trust Relationships in Distributed Computing , 2006, J. Comput..

[12]  A. Sadeghi,et al.  Token-Based Cloud Computing Secure Outsourcing of Data and Arbitrary Computations with Lower Latency , 2010 .

[13]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[14]  Liu Yang,et al.  Research on trust-based access control model in cloud computing , 2011, 2011 6th IEEE Joint International Information Technology and Artificial Intelligence Conference.

[15]  Junzhou Luo,et al.  A trust degree based access control in grid environments , 2009, Inf. Sci..

[16]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[17]  Meina Song,et al.  The design of a trust and role based access control model in cloud computing , 2011, 2011 6th International Conference on Pervasive Computing and Applications.

[18]  Liangmin Guo,et al.  A Recommendation Trust Method Based on Fuzzy Clustering in P2P Networks , 2013, J. Softw..

[19]  Tong Wang,et al.  Recent Advances in Cloud Security , 2011, J. Comput..