Cross-tenant access control method based on trust model in cloud environment

A trust model and access control technology, applied in the field of cloud computing information security, can solve the problems of cloud resources losing security control and inapplicability, and achieve the effect of good promotion and use value, simple structure and reasonable design

Active Publication Date: 2016-08-17
HUAZHONG UNIV OF SCI & TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the cloud resource pool, the logical security domain replaces the physical security boundary under the traditional architectural model, and the tenant's cloud resources lose t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-tenant access control method based on trust model in cloud environment
  • Cross-tenant access control method based on trust model in cloud environment
  • Cross-tenant access control method based on trust model in cloud environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0061] (1) Tenant registration

[0062] Enterprise tenants plan to use the tenant trust relationship management services provided by cloud service providers. First, the enterprise tenant applies to the cloud service provider through the registration process, and registers the tenant information, including company name, address, phone number, etc.; then provides the tenant administrator information (this administrator will be used later to create tenant internal users and assign permissions), Select the specific functional modules of the trust relationship management service, such as application, permission, and revocation.

[0063] (2) Internal access control modeling

[0064] Tenant administrators can choose one of the three access control types (discretionary access control, mandatory access control, and role-based access control) provided by cloud service providers to complete tenant internal access control modeling.

[0065] (3) Cross-tenant access control modeling

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cross-tenant access control method based on a trust model in a cloud environment. Based on the characteristics of a cloud computing multi-tenant architecture, a user of a tenant can have access to resources of other tenants after being authorized, so that the problems related to resource security and privacy caused during tenant cooperation are solved. By designing two types of tenant trust relationships, the tenant trust relationship concept is introduced to an access control model to reflect the access control requirement between two tenants. Through the definition of model elements and the formal description of a model function, a tenant trust model is built to adapt to the multi-tenant characteristic of cloud computing, and then cross-tenant access control is achieved.

Description

technical field [0001] The invention belongs to the field of cloud computing information security, and more specifically relates to a trust model-based cross-tenant access control method in a cloud environment. Background technique [0002] Cloud computing is one of the hot topics in the current information technology field, and it is the focus of academia, industry, and government. Its core idea is to link a large number of computing resources, storage resources and software resources together to form a huge scale. Shared virtual IT resource pool. Multi-tenant technology enables different users to share the same resources, which is the key technology adopted by cloud computing and the key reason why resources can be dynamically scaled and fully utilized. Multi-tenant technology also faces new challenges while obtaining cloud services through on-demand customization and shared storage interaction: 1. Unauthorized tenants steal information in order to obtain business secrets...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0892H04L63/10H04L67/10
Inventor 邹德清金海闵军
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products