On access to trusted virtual group under cloud computing

There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynom...

Full description

Saved in:
Bibliographic Details
Main Authors: Peng LIANG, Chang-xiang SHEN, Zhen-hu NING
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2013-08-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.3969/j.issn.1000-436x.2013.z1.027/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:There is no appropriate internal isolation mechanism for important production information system based on cloud computing. Here the main access control technologies were compared thoroughly and then two-layer key manage-ment scheme was put forward. In terms of the first layer, access control polynomial based on one-way hash function was constructed to achieve the separation of information flow between subgroups, that is, the information isolation within any department of a company was accomplished. Based on the first layer, a hierarchical key management was presented for different subgroups so as to realize the access control between different departments of a company. Then the security and complexity were analyzed. Finally, through the example and simulation experiment, the access control model based on two-layer key management scheme was verified.
ISSN:1000-436X