Scheduled System Maintenance:
Some services will be unavailable Sunday, March 29th through Monday, March 30th. We apologize for the inconvenience.
By Topic

The design of a trust and role based access control model in cloud computing

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Wenhui Wang ; PCN&CAD Center, Beijing Univ. of Posts & Telecommun., Beijing, China ; Jing Han ; Meina Song ; Xiaohui Wang

Today, the problem of trusting cloud computing is a paramount concern for most enterprises. Whether user behavior is trusted and how to evaluate user's behavior trust are important research contents in cloud computing. This paper suggests an adaptive access algorithm by introducing the trust into cloud computing to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic changes of the common resources. This access control model bases on trust determines whether the user has the right to get access to the resource by dynamically authorizing. And this mechanism can control the user's malicious behavior effectively.

Published in:

Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on

Date of Conference:

26-28 Oct. 2011