Skip to main content

Improved Access Control Model Under Cloud Computing Environment

  • Conference paper
  • First Online:
Frontier and Future Development of Information Technology in Medicine and Education

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 269))

  • 168 Accesses

Abstract

With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in the cloud. This paper briefly describes the cloud computing and traditional access control model based on the latest research. Then the paper sums up the work and puts forward a new kind of access control model based on the hop named HBAC. It is based on the role access control that based on mapping. It is used to control the length of path to access the data in outer domain. At last, the paper gives the concrete steps to describe the principle of its operation in detail. And this paper makes a comparison with other related researches. Then this paper summarizes the advantages and disadvantages of HBAC.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 549.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Fauzi AAC, Noraziah A, Herawan T, Zin NM (2012) On cloud computing security issues. In: Pan J-S, Chen S-M, Nguyen NT (eds.) Paper presented at the 4th asian conference on intelligent information and database systems. Berlin, Heidelberg

    Google Scholar 

  2. Zou J-S (2012) Security problems and its countermeasures in the cloud computing environment. CD Comp Softw Applicat 35–37

    Google Scholar 

  3. Zhang F-J, Chen J, Chen H-B, Zang B-Y (2011) Data privacy protection and self destruct in cloud computing. Compute Res Develop, 1155–1167

    Google Scholar 

  4. Li H, Li H (2010) Trusted cloud security key technologies and realization. People’s Posts and Telecommunications Press, Beijing

    Google Scholar 

  5. Han D-J, Gao J,Huo H-L, Li L (2010) Progress of access control model research. Compute Sci, 29–33

    Google Scholar 

  6. Sandhu R, Coyne EJ (1996) Role based access control models. IEEE Compute, 38–47

    Google Scholar 

  7. Zou X (2006) Analysis and implementation of role-based access control model. Info Microcompute 108–111

    Google Scholar 

  8. Tan X (2011) Cloud computing environment access control model. Beijing Jiaotong University, Beijing

    Google Scholar 

  9. Zhang D-Y, Liu L-Z (2008) Multi-domain access control model. Compute Applicat, 633–637

    Google Scholar 

Download references

Acknowledgments

This research was supported by Natural Science Foundation of Shandong Province of China under Grant No. ZR2011FM019 and Postgraduate Education Innovation Projects of Shandong Province of China under Grant No. SDYY11117. It was also supported by the Project of Shandong Province Higher Educational Science and Technology Program under Grant No. J12LN61. In addition, the authors would like to thank the reviewers for their valuable comments and suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiashun Zou .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Zhang, Y., Zou, J., Gao, Y., Li, B. (2014). Improved Access Control Model Under Cloud Computing Environment. In: Li, S., Jin, Q., Jiang, X., Park, J. (eds) Frontier and Future Development of Information Technology in Medicine and Education. Lecture Notes in Electrical Engineering, vol 269. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7618-0_300

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-7618-0_300

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-7617-3

  • Online ISBN: 978-94-007-7618-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics