首页 | 本学科首页   官方微博 | 高级检索  
     

云计算环境基于客体属性匹配的逆向混合访问控制方案
引用本文:葛丽娜,胡雨谷,张桂芬,陈园园.云计算环境基于客体属性匹配的逆向混合访问控制方案[J].计算机应用,2021,41(6):1604-1610.
作者姓名:葛丽娜  胡雨谷  张桂芬  陈园园
作者单位:1. 广西民族大学 人工智能学院, 南宁 530006;2. 广西民族大学 网络通信工程重点实验室, 南宁 530006;3. 广西混杂计算与集成电路设计分析重点实验室, 南宁 530006
基金项目:国家自然科学基金资助项目(61862007);广西自然科学基金资助项目(2018GXNSFAA138147,2018GXNSFAA281269)。
摘    要:云计算提高了大数据的使用、分析和管理的效率,但也给数据贡献者带来了对云服务的数据安全及隐私信息泄露的担忧。针对这个问题,结合了基于角色的访问控制、基于属性的访问控制方法并采用了下一代访问控制的体系结构,提出了云计算环境下的基于客体属性匹配的逆向混合访问控制方法。首先,数据贡献者设置共享文件访问权限级别,逆向规定了访问客体的最低权值;然后,采用变异系数加权的方法直接计算各属性的权值,取消了以属性为中心的基于角色的访问控制中策略规则匹配的过程;最后,把数据贡献者对数据文件设定的权限值定为数据访问者被允许访问的阈值,这样既实现了数据访问控制,又保障了对隐私数据的保护。实验结果表明,随着访问次数的增多,所提方法对恶意行为、权限不足行为等的判断基准趋于稳定,检测能力越来越强,成功率趋于一个较为平稳的水平。该方法在用户访问数量较大的环境下相较传统的访问控制方法能够实现更高的决策效率,验证了所提方法的有效性和可行性。

关 键 词:访问控制  权值计算  访问策略  数据共享  云计算  
收稿时间:2020-11-04
修稿时间:2021-04-01

Reverse hybrid access control scheme based on object attribute matching in cloud computing environment
GE Lina,HU Yugu,ZHANG Guifen,CHEN Yuanyuan.Reverse hybrid access control scheme based on object attribute matching in cloud computing environment[J].journal of Computer Applications,2021,41(6):1604-1610.
Authors:GE Lina  HU Yugu  ZHANG Guifen  CHEN Yuanyuan
Affiliation:1. School of Artificial Intelligence, Guangxi University for Nationalities, Nanning Guangxi 530006, China;2. Key Laboratory of Network Communication Engineering, Guangxi University for Nationalities, Nanning Guangxi 530006, China;3. Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis, Nanning Guangxi 530006, China
Abstract:Cloud computing improves the efficiency of the use, analysis and management of big data, but also brings the worry of data security and private information disclosure of cloud service to the data contributors. To solve this problem, combined with the role-based access control, attribute-based access control methods and using the architecture of next generation access control, a reverse hybrid access control method based on object attribute matching in cloud computing environment was proposed. Firstly, the access right level of the shared file was set by the data contributor, and the minimum weight of the access object was reversely specified. Then, the weight of each attribute was directly calculated by using the variation coefficient weighting method, and the process of policy rule matching in the attribute centered role-based access control was cancelled. Finally, the right value of the data contributor setting to the data file was used as the threshold for the data visitor to be allowed to access, which not only realized the data access control, but also ensured the protection of private data. Experimental results show that, with the increase of the number of visits, the judgment standards of the proposed method for malicious behaviors and insufficient right behaviors tend to be stable, the detection ability of the method becomes stronger and stronger, and the success rate of the method tends to a relatively stable level. Compared with the traditional access control methods, the proposed method can achieve higher decision-making efficiency in the environment of large number of user visits, which verifies the effectiveness and feasibility of the proposed method.
Keywords:access control  weight calculation  access policy  data sharing  cloud computing  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号