Fengying Wang
College of Computer Science and technology, Shandong University of Technology, Zibo,Shandong, 255049, China
Caihong Li
College of Computer Science and technology, Shandong University of Technology, Zibo,Shandong, 255049, China
Hui Zhao
College of Computer Science and technology, Shandong University of Technology, Zibo,Shandong, 255049, China
Shushu Liu
College of Computer Science and technology, Shandong University of Technology, Zibo,Shandong, 255049, China
ABSTRACT
Because cloud computing has the characters of virtualization, open, multi-tenant and elastification, cloud users and cloud objects always are changing dynamically, thus access control in cloud is more complex than traditional access control. The paper proposed Credible Usage Control Model in Cloud Computing (CUCONC),and based on the model given CUCONC reference monitor. CUCONC possesses Process continuity and attribute variability. By introducing credibility, CUCONC simplifies authorization policy,can change dynamically authorized rights,easy to grant or revoke rights. At the same time, the model enhances the manageability, flexibility and actionability.
PDF References Citation
How to cite this article
Fengying Wang, Caihong Li, Hui Zhao and Shushu Liu, 2013. A Credible Usage Access Control Model in Cloud Computing. Information Technology Journal, 12: 5553-5558.
DOI: 10.3923/itj.2013.5553.5558
URL: https://scialert.net/abstract/?doi=itj.2013.5553.5558
DOI: 10.3923/itj.2013.5553.5558
URL: https://scialert.net/abstract/?doi=itj.2013.5553.5558