论文标题
改进的基于层次角色的云计算访问控制模型
Improved hierarchical role based access control model for cloud computing
论文作者
论文摘要
Cloud computing is considered as the one of the most dominant paradigm in field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Promising all these services as it is, this cloud computing paradigm still associates number of challenges such as data security, abuse of cloud services, malicious insider and cyber-attacks.在云计算访问控制的所有这些安全要求中,是避免未经授权访问系统和组织资产的基本要求之一。这项研究的主要目的是回顾云访问控制模型的现有方法及其变体的优点和缺点,并确定为开发公共云数据存储改进的访问控制模型的进一步相关研究方向。我们已经提出了针对云计算的详细访问控制要求分析,并确定了重要的差距,而传统访问控制模型无法实现。作为研究的结果,我们提出了一种改进的访问控制模型,其中包括混合密码模式和混合云体系结构以及对其进行实际实现。我们已经测试了模型的安全含义,性能,功能和数据完整性,以证明有效性。我们已经使用AES和RSA加密算法来实现加密模式,并使用公共和私有云来强制执行我们的访问控制安全性和可靠性。通过验证和测试,我们证明我们的模型可以承受对真实云环境中大多数网络攻击的承受。因此,与我们通过文献审查的其他先前访问控制模型相比,它具有提高的功能。
Cloud computing is considered as the one of the most dominant paradigm in field of information technology which offers on demand cost effective services such as Software as a service (SAAS), Infrastructure as a service (IAAS) and Platform as a service (PAAS).Promising all these services as it is, this cloud computing paradigm still associates number of challenges such as data security, abuse of cloud services, malicious insider and cyber-attacks. Among all these security requirements of cloud computing access control is the one of the fundamental requirement in order to avoid unauthorized access to a system and organizational assets. Main purpose of this research is to review the existing methods of cloud access control models and their variants pros and cons and to identify further related research directions for developing an improved access control model for public cloud data storage. We have presented detailed access control requirement analysis for cloud computing and have identified important gaps, which are not fulfilled by conventional access control models. As the outcome of the study we have come up with an improved access control model with hybrid cryptographic schema and hybrid cloud architecture and practical implementation of it. We have tested our model for security implications, performance, functionality and data integrity to prove the validity. We have used AES and RSA cryptographic algorithms to implement the cryptographic schema and used public and private cloud to enforce our access control security and reliability.By validating and testing we have proved that our model can withstand against most of the cyber attacks in real cloud environment. Hence it has improved capabilities compared with other previous access control models that we have reviewed through literature.