Font Size: a A A

A Bidirectional Trust Model Based Access Control

Posted on:2019-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:K ShiFull Text:PDF
GTID:2428330566499356Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Cloud computing is an emerging hot technology in today's Internet age.Since its inception,the research and application of cloud computing have grown.At the same time,the problems faced by cloud computing are gradually exposed.The most important issue is the security of cloud computing.People realize that this issue has become a constraint to the development of cloud computing.In order to solve this problem,this article will focus on how to ensure the safety of the cloud environment.In the existing technology,access control technology can be used to effectively solve the problem,but in the face of today's complex and changeable In the network environment,traditional cloud computing access control technologies cannot effectively solve security problems.In order to solve this problem,this paper will optimize the traditional access control model.This paper first establishes a model for calculating the user's corresponding trust value based on the user's behavior evidence,and divides it into the influencing factors of different attributes according to the extracted behavior information,and calculates the trust value of the user and the service provider according to the information..Then based on the cloud user and cloud service provider's behavioral evidence,a trust value evaluation model is designed to calculate the trust value of the two.Based on the above content and research,a bidirectional trust model based access control model in the cloud computing environment is designed.This model is used to control access to users and service providers to prevent malicious users.And the entry of malicious service providers.Finally,a simulation experiment is designed to carry out functional verification and performance test analysis of the model.From the experiment,the model proposed in this paper can effectively implement cloud computing access control.
Keywords/Search Tags:cloud computing, cloud security, trust model, access control, dynamic monitoring
PDF Full Text Request
Related items