HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 20 | Page No.: 5553-5558
DOI: 10.3923/itj.2013.5553.5558
A Credible Usage Access Control Model in Cloud Computing
Fengying Wang, Caihong Li, Hui Zhao and Shushu Liu

Abstract: Because cloud computing has the characters of virtualization, open, multi-tenant and elastification, cloud users and cloud objects always are changing dynamically, thus access control in cloud is more complex than traditional access control. The paper proposed Credible Usage Control Model in Cloud Computing (CUCONC),and based on the model given CUCONC reference monitor. CUCONC possesses Process continuity and attribute variability. By introducing credibility, CUCONC simplifies authorization policy,can change dynamically authorized rights,easy to grant or revoke rights. At the same time, the model enhances the manageability, flexibility and actionability.

Fulltext PDF

How to cite this article
Fengying Wang, Caihong Li, Hui Zhao and Shushu Liu, 2013. A Credible Usage Access Control Model in Cloud Computing. Information Technology Journal, 12: 5553-5558.

© Science Alert. All Rights Reserved