Abstract
With the development of cloud computing, cloud security problem has become a hot topic. Some scholars put forward the role access control based on mapping, which is used to solve the leakage problem of data storing in the cloud. This paper briefly describes the cloud computing and traditional access control model based on the latest research. Then the paper sums up the work and puts forward a new kind of access control model based on the hop named HBAC. It is based on the role access control that based on mapping. It is used to control the length of path to access the data in outer domain. At last, the paper gives the concrete steps to describe the principle of its operation in detail. And this paper makes a comparison with other related researches. Then this paper summarizes the advantages and disadvantages of HBAC.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Fauzi AAC, Noraziah A, Herawan T, Zin NM (2012) On cloud computing security issues. In: Pan J-S, Chen S-M, Nguyen NT (eds.) Paper presented at the 4th asian conference on intelligent information and database systems. Berlin, Heidelberg
Zou J-S (2012) Security problems and its countermeasures in the cloud computing environment. CD Comp Softw Applicat 35–37
Zhang F-J, Chen J, Chen H-B, Zang B-Y (2011) Data privacy protection and self destruct in cloud computing. Compute Res Develop, 1155–1167
Li H, Li H (2010) Trusted cloud security key technologies and realization. People’s Posts and Telecommunications Press, Beijing
Han D-J, Gao J,Huo H-L, Li L (2010) Progress of access control model research. Compute Sci, 29–33
Sandhu R, Coyne EJ (1996) Role based access control models. IEEE Compute, 38–47
Zou X (2006) Analysis and implementation of role-based access control model. Info Microcompute 108–111
Tan X (2011) Cloud computing environment access control model. Beijing Jiaotong University, Beijing
Zhang D-Y, Liu L-Z (2008) Multi-domain access control model. Compute Applicat, 633–637
Acknowledgments
This research was supported by Natural Science Foundation of Shandong Province of China under Grant No. ZR2011FM019 and Postgraduate Education Innovation Projects of Shandong Province of China under Grant No. SDYY11117. It was also supported by the Project of Shandong Province Higher Educational Science and Technology Program under Grant No. J12LN61. In addition, the authors would like to thank the reviewers for their valuable comments and suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Zhang, Y., Zou, J., Gao, Y., Li, B. (2014). Improved Access Control Model Under Cloud Computing Environment. In: Li, S., Jin, Q., Jiang, X., Park, J. (eds) Frontier and Future Development of Information Technology in Medicine and Education. Lecture Notes in Electrical Engineering, vol 269. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7618-0_300
Download citation
DOI: https://doi.org/10.1007/978-94-007-7618-0_300
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-7617-3
Online ISBN: 978-94-007-7618-0
eBook Packages: EngineeringEngineering (R0)