Cloud security access control model

A security access control and access control technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve data security and privacy concerns, user file leakage, security accidents, etc., to achieve small size, Easy-to-use, easy-to-process effects

Inactive Publication Date: 2012-07-11
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF2 Cites 102 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

According to Gartner's 2009 survey, more than 70% of the CTOs of the interviewed companies believe that the primary reason for not adopting cloud computing in the near future is the concern about data security and privacy
Recently, Amazon, Google and other cloud computing providers continue to break out various securi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security access control model
  • Cloud security access control model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0069] (1) Tenant access control modeling

[0070] The cloud service provider Cloud provides customer relationship management CRM services externally. According to its business needs and business functions, it defines the roles (including functions and positions) and permissions of cloud service managers, and gives each cloud service management Personnel are assigned corresponding roles, responsible for managing and maintaining a certain number of tenants, so as to complete the internal access control modeling with the service provider Cloud;

[0071] (2) Registration

[0072] Enterprise tenant A plans to use the customer relationship management (CRM) service provided by cloud service provider Cloud. First, enterprise tenant A applies to the cloud service provider Cloud through the registration process, and registers tenant information, including enterprise name, address, contact number, province and city, and other basic enterprise information; then provides tena...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cloud security access control model. The model is characterized in that: aiming at the multi-tenant architecture characteristic of cloud computing, by combining a role-based access control (RBAC) model, a tenant concept and a cloud service provider concept are introduced to an access control model, and a uniform tenant access control model and a user access control model are formed by defining model elements and formally describing model functions. The cloud security access control model can adapt to the characteristic of multi-tenant of the cloud computing, improves the flexibility of user authority management in a cloud computing environment, can reduce the complexity of authorization management and management overhead, and can effectively ensure the security and integrity of user data in the cloud computing environment.

Description

technical field [0001] The present invention relates to the field of computer information security, specifically a role-based access control model RBAC, aiming at the multi-tenant architecture characteristics of cloud computing, introducing the concept of tenant and cloud service provider into the access control model, through the model The definition of elements and the formal description of model functions constitute a unified tenant access control model and user access control model. Background technique [0002] Cloud computing is one of the hot topics in the current information technology field, and it is the focus of great attention from all walks of life, such as industry, academia, and government. With its advantages of convenience, economy and high scalability, cloud computing has attracted the attention of more and more enterprises, freeing them from the heavy pressure of IT infrastructure management and maintenance, and focusing more on their core business develop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 李清玉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products