• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Lin, Li (Lin, Li.) | Hu, Jian (Hu, Jian.) | Zhang, Jianbiao (Zhang, Jianbiao.) (学者:张建标)

收录:

EI Scopus SCIE CSCD

摘要:

Combining different independent cloud services must coordinate their access control policies. Otherwise unauthorized access to composite cloud service can occur when there's a conflict among different cloud service providers' access control policies, and then it will bring serious data security and privacy issues. In this paper, we propose Packet, a novel access control policy composition method that can detect and resolve policy conflicts in cloud service composition, including those conflicts related to privacyaware purposes and conditions. The Packet method is divided into four steps. First, employing a unified description, heterogeneous policies are transformed into a unified attributebased format. Second, to improve the conflict detection efficiency, policy conflicts on the same resource can be eliminated by adopting cosine similarity-based algorithm. Third, exploiting a hierarchical structure approach, policy conflicts related to different resources or privacy-aware purposes and conditions can be detected. Fourth, different conflict resolution techniques are presented based on the corresponding conflict types. We have successfully implemented the Packet method in Openstack platform. Comprehensive experiments have been conducted, which demonstrate the effectiveness of the proposed method by the comparison with the existing XACML-based system at conflict detection and resolution performance.

关键词:

access control cloud service composition conflict detection conflict resolution policy composition privacy similarity analysis unified policy format

作者机构:

  • [ 1 ] [Lin, Li]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
  • [ 2 ] [Hu, Jian]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
  • [ 3 ] [Zhang, Jianbiao]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
  • [ 4 ] [Lin, Li]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 5 ] [Hu, Jian]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 6 ] [Zhang, Jianbiao]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
  • [ 7 ] [Lin, Li]Natl Engn Lab Classified Informat Secur Protect, Beijing 100124, Peoples R China
  • [ 8 ] [Zhang, Jianbiao]Natl Engn Lab Classified Informat Secur Protect, Beijing 100124, Peoples R China

通讯作者信息:

  • [Lin, Li]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China;;[Lin, Li]Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China;;[Lin, Li]Natl Engn Lab Classified Informat Secur Protect, Beijing 100124, Peoples R China

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

FRONTIERS OF COMPUTER SCIENCE

ISSN: 2095-2228

年份: 2016

期: 6

卷: 10

页码: 1142-1157

4 . 2 0 0

JCR@2022

ESI学科: COMPUTER SCIENCE;

ESI高被引阀值:109

中科院分区:4

被引次数:

WoS核心集被引频次: 9

SCOPUS被引频次: 10

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 3

在线人数/总访问数:2550/3726302
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司