A multi-dimensional state-aware dynamic access control method

A dynamic access control and state-aware technology, applied in the field of cloud computing, can solve problems such as increasing the burden on security management personnel, and achieve the effect of improving access performance, accuracy, and accurate authentication results

Active Publication Date: 2020-09-25
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in these access control models for risk assessment, the risk assessment module still adopts static risk policies in essence. This method requires security administrators to configure not only traditional rule policies but also risk rule policies, although it enhances the The security of access control, but it also increases the burden on security managers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-dimensional state-aware dynamic access control method
  • A multi-dimensional state-aware dynamic access control method
  • A multi-dimensional state-aware dynamic access control method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0018] The invention is an access control method suitable for cloud computing environment. The invention proposes a dynamic access control method with request data flow awareness. The biggest difference from the existing methods is: first, it provides a completely dynamic access control technology, which no longer constrains the formulation of static rules; second, it effectively utilizes the user's historical data and provides a The method of authenticating the current request; the third is to calculate the validity of the historical data nodes, so that the authentication results of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a multi-dimensional state-aware dynamic access control method, which can identify the user's own state and also identify other unknown multi-dimensional states of the user, thereby achieving more accurate access control. This method mainly includes the following steps: Step 1: Obtain the relevant attributes of the information requested by the user; Step 2: Calculate the state of the request subject itself; Step 3: Through the flow sensing user request other states; Step 4: Synthesize the result of its own state and the result of flow sensing; Step 5: Make a decision based on the comprehensive evaluation result; Step 6: After the decision is fed back from the actual application, adjust the threshold value of the risk occupation in the comprehensive evaluation module; the present invention regards attributes such as subject, object, and context as data streams, and through historical The anomaly detection of the data flow of the window evaluates the risk value of the current access. The method can realize dynamic access control under the dynamic cloud ring mirror, thereby protecting the security of massive resources in the cloud computing environment.

Description

technical field [0001] The invention relates to the technical field of cloud computing, in particular to a multi-dimensional state-aware dynamic access control method. Background technique [0002] In the cloud computing environment, various resources are dynamically connected to the Internet. Since the Internet is an open network environment, interaction between nodes is inevitable, which involves security issues. Therefore, while enjoying the convenience brought by cloud computing At the same time, its security should also be considered. Access control technology is the most basic security method in the cloud computing environment, which is used to protect various resources from being used by unidentifiable systems and unauthorized users. However, the resources in the cloud computing environment are not only huge in scale but also dynamic, and the security requirements in the cloud computing environment are also different from those of traditional computers. The insecurit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/102
Inventor 陈爱国罗光春田玲惠孛邢瀚文
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products