• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Lin, L. (Lin, L..) | Mao, X.-Y. (Mao, X.-Y..) | Chu, Z.-X. (Chu, Z.-X..) | Xie, X.-Y. (Xie, X.-Y..)

Indexed by:

EI Scopus

Abstract:

In a hybrid cloud environment, enterprise business applications and data are often transferred across different cloud services. For complex and diversified cloud service environments, most hybrid cloud applications adopt access control policies made around only access subjects and adjust the policies manually, which cannot meet the fine-grained dynamic access control requirements at different stages of the data life cycle. This study proposes AHCAC, an adaptive access control method oriented to data life cycle in a hybrid cloud environment. Firstly, the the policy description idea based on key attributes are employed to unify the heterogeneous policies of the full life cycle of data under the hybrid cloud. Especially, the “stage” attribute is introduced to explicitly identify the life-cycle state of data, which is the basis for achieving fine-grained access control oriented to data life cycle. Secondly, in view of the similarity and consistency of access control policy with the same life-cycle stage, the policy distance is defined, and a hierarchical clustering algorithm based on the policy distance is proposed to construct the corresponding data access control policy in each life-cycle stage. Finally, when the life-cycle stage of data is changed, the adaptation and loading of policies of corresponding data stages in the policy evaluation are triggered through key attribute matching, which realizes the adaptive access control oriented to the data life cycle. This study also conducts experiments to verify the effectiveness and feasibility of the proposed method on OpenStack and open-source policy evaluation engine Balana. © 2024 Chinese Academy of Sciences. All rights reserved.

Keyword:

hybrid cloud adaptive policy adjustment data life cycle access control hierarchical clustering

Author Community:

  • [ 1 ] [Lin L.]College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 2 ] [Lin L.]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, China
  • [ 3 ] [Mao X.-Y.]College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 4 ] [Mao X.-Y.]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, China
  • [ 5 ] [Chu Z.-X.]College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 6 ] [Chu Z.-X.]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, China
  • [ 7 ] [Xie X.-Y.]College of Computer Science, Faculty of Information Technology, Beijing University of Technology, Beijing, 100124, China
  • [ 8 ] [Xie X.-Y.]Beijing Key Laboratory of Trusted Computing, Beijing University of Technology, Beijing, 100124, China

Reprint Author's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

Journal of Software

ISSN: 1000-9825

Year: 2024

Issue: 3

Volume: 35

Page: 1357-1376

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 1

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 2

Affiliated Colleges:

Online/Total:1063/10665523
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.