On access to trusted virtual group under cloud computing

There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynom...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng LIANG, Chang-xiang SHEN, Zhen-hu NING
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539854110818304
author Peng LIANG
Chang-xiang SHEN
Zhen-hu NING
author_facet Peng LIANG
Chang-xiang SHEN
Zhen-hu NING
author_sort Peng LIANG
collection DOAJ
description There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynomial based on one-way hash function was constructed to achieve the separation of information flow between subgroups, that is, the information isolation within any department of a company was accomplished. Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.
format Article
id doaj-art-f676936398fa4203b148bb0287dd0a43
institution Kabale University
issn 1000-436X
language zho
publishDate 2013-08-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-f676936398fa4203b148bb0287dd0a432025-01-14T06:41:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2013-08-013420721559677384On access to trusted virtual group under cloud computingPeng LIANGChang-xiang SHENZhen-hu NINGThere is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynomial based on one-way hash function was constructed to achieve the separation of information flow between subgroups, that is, the information isolation within any department of a company was accomplished. Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/cloud computingcryptographic access controlkey managementproduction information system
spellingShingle Peng LIANG
Chang-xiang SHEN
Zhen-hu NING
On access to trusted virtual group under cloud computing
Tongxin xuebao
cloud computing
cryptographic access control
key management
production information system
title On access to trusted virtual group under cloud computing
title_full On access to trusted virtual group under cloud computing
title_fullStr On access to trusted virtual group under cloud computing
title_full_unstemmed On access to trusted virtual group under cloud computing
title_short On access to trusted virtual group under cloud computing
title_sort on access to trusted virtual group under cloud computing
topic cloud computing
cryptographic access control
key management
production information system
url http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/
work_keys_str_mv AT pengliang onaccesstotrustedvirtualgroupundercloudcomputing
AT changxiangshen onaccesstotrustedvirtualgroupundercloudcomputing
AT zhenhuning onaccesstotrustedvirtualgroupundercloudcomputing