On access to trusted virtual group under cloud computing
There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynom...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2013-08-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539854110818304 |
---|---|
author | Peng LIANG Chang-xiang SHEN Zhen-hu NING |
author_facet | Peng LIANG Chang-xiang SHEN Zhen-hu NING |
author_sort | Peng LIANG |
collection | DOAJ |
description | There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynomial based on one-way hash function was constructed to achieve the separation of information flow between subgroups, that is, the information isolation within any department of a company was accomplished. Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified. |
format | Article |
id | doaj-art-f676936398fa4203b148bb0287dd0a43 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2013-08-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-f676936398fa4203b148bb0287dd0a432025-01-14T06:41:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-013420721559677384On access to trusted virtual group under cloud computingPeng LIANGChang-xiang SHENZhen-hu NINGThere is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynomial based on one-way hash function was constructed to achieve the separation of information flow between subgroups, that is, the information isolation within any department of a company was accomplished. Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/cloud computingcryptographic access controlkey managementproduction information system |
spellingShingle | Peng LIANG Chang-xiang SHEN Zhen-hu NING On access to trusted virtual group under cloud computing Tongxin xuebao cloud computing cryptographic access control key management production information system |
title | On access to trusted virtual group under cloud computing |
title_full | On access to trusted virtual group under cloud computing |
title_fullStr | On access to trusted virtual group under cloud computing |
title_full_unstemmed | On access to trusted virtual group under cloud computing |
title_short | On access to trusted virtual group under cloud computing |
title_sort | on access to trusted virtual group under cloud computing |
topic | cloud computing cryptographic access control key management production information system |
url | http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/ |
work_keys_str_mv | AT pengliang onaccesstotrustedvirtualgroupundercloudcomputing AT changxiangshen onaccesstotrustedvirtualgroupundercloudcomputing AT zhenhuning onaccesstotrustedvirtualgroupundercloudcomputing |