首页 | 本学科首页   官方微博 | 高级检索  
     

云计算访问控制技术研究综述
引用本文:王于丁,杨家海,徐聪,凌晓,杨洋. 云计算访问控制技术研究综述[J]. 软件学报, 2015, 26(5): 1129-1150
作者姓名:王于丁  杨家海  徐聪  凌晓  杨洋
作者单位:清华大学 网络科学与网络空间研究院, 北京 100084,清华大学 网络科学与网络空间研究院, 北京 100084,清华大学 网络科学与网络空间研究院, 北京 100084,清华大学 网络科学与网络空间研究院, 北京 100084,清华大学 网络科学与网络空间研究院, 北京 100084
基金项目:国家重点基础研究发展计划(973)(2012CB315806); 国家自然科学基金(61170211); 教育部高等学校博士学科点专项科研基金(20110002110056, 20130002110058); 教育部-中移动科研基金(MCM20123041)
摘    要:随着云计算规模化和集约化的发展,云安全问题成为云计算领域亟待突破的重要问题.访问控制技术是安全问题的重中之重,其任务是通过限制用户对数据信息的访问能力及范围,保证信息资源不被非法使用和访问.主要对目前云计算环境下的访问控制问题进行研究,首先介绍访问控制理论;然后分析了云计算环境下的访问控制技术体系框架,重点从云计算访问控制模型、基于ABE(attribute-based encryption)密码体制的云计算访问控制、云中多租户及虚拟化访问控制这3个方面对云计算环境下的访问控制问题进行综述,并且调研了工业界云服务提供商和开源云平台的访问控制机制;最后对未来的研究趋势进行了展望.

关 键 词:云计算  云安全  访问控制  访问控制策略  访问控制模型  ABE(attribute-based encryption)
收稿时间:2014-10-03
修稿时间:2015-01-21

Survey on Access Control Technologies for Cloud Computing
WANG Yu-Ding,YANG Jia-Hai,XU Cong,LING Xiao and YANG Yang. Survey on Access Control Technologies for Cloud Computing[J]. Journal of Software, 2015, 26(5): 1129-1150
Authors:WANG Yu-Ding  YANG Jia-Hai  XU Cong  LING Xiao  YANG Yang
Affiliation:Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China,Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China,Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China,Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China and Institute for Network Sciences and Cyberspace, Tsinghua University, Beijing 100084, China
Abstract:With the intensive and large scale development of cloud computing, security becomes one of the most important problems. As an important part of security domain, access control technique is used to limit users' capability and scope to access data and ensure the information resources not to be used and accessed illegally. This paper focuses on the state-of-the-art research of access control technology in cloud computing environment. First, it briefly introduces access control theory, and discusses the access control framework in cloud computing environment. Then, it thoroughly surveys the access control problems in cloud computing environment from three aspects including cloud access control model, cloud access control based on ABE (attribute-based encryption) cryptosystem, and multi-tenant and virtualization access control in cloud. In addition, it probes the best current practices of access control technologies within the major cloud service providers and open source cloud platforms. Finally, it summarizes the problems in the current research and prospects the development of future research.
Keywords:cloud computing  cloud security  access control  access control policy  access control model  ABE (attribute-based encryption)
本文献已被 万方数据 等数据库收录!
点击此处可从《软件学报》浏览原始摘要信息
点击此处可从《软件学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号