Access Control Based Resource Allocation in Cloud Computing Environment

@article{Wang2017AccessCB,
  title={Access Control Based Resource Allocation in Cloud Computing Environment},
  author={Junshe Wang and Jinliang Liu and Hongbin Zhang},
  journal={Int. J. Netw. Secur.},
  year={2017},
  volume={19},
  pages={236-243}
}
In this paper, we propose a new dynamic resource allocation scheme - Access Control-based Resource Allocation (ACRA) for cloud users in order to address some deficiencies of the current resources allocation mechanisms in some free cloud computing environment. The proposed scheme comprehensively analyses behavior characteristics of cloud users and evaluates user behavior trust using fuzzy analytic hierarchy process (FAHP), and then dynamically adjusts the resources permission of cloud users… 

Figures and Tables from this paper

Research on Cloud Service Security Measurement Based on Information Entropy
TLDR
The weights calculation method via case analysis is introduced and it is proved the feasibility and correctness of CSSAM model and weights calculation methods.
Role Mining Algorithms Satisfied the Permission Cardinality Constraint
TLDR
This paper proposes two kinds of role mining algorithms that satisfy the permission cardinality constraints and demonstrates that the performance of algorithm 2 is superior to algorithm 1 and PRUCC-RM.
Green city: An efficient task joint execution strategy for mobile micro-learning
TLDR
An efficient task joint execution strategy to reduce energy consumption is proposed and a new matching method of time series is proposed to obtain the latest requested record, which can provide guidance for the selection of a future service mode.
Research on Privacy Security Risk Assessment Method of Mobile Commerce Based on Information Entropy and Markov
TLDR
A mobile commerce privacy security risk assessment model is established based on information entropy and Markov chain, and effective security risk measurement, and assessment method is put forward that can provide accurate and quantitative results in assessing privacy disclosure risk.
A Constraint-Based Model for Virtual Machine Data Access Control in Cloud Platform
TLDR
The constraint-based VM data access control model in cloud platform could adapt to the complex dynamic cloud platform environment and improve the safety of VMs.
Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain
TLDR
The established model used Markov chain to describe random risk environment, and used information entropy to measure risk, effectively reduced the existing subjective factors in the assessment process, and provided a practical and reliable method for risk management decisions.

References

SHOWING 1-10 OF 27 REFERENCES
Capacity based resource allocation in cloud
  • K. Vimala DeviS. Vetha
  • Computer Science
    2014 International Conference on Communication and Network Technologies
  • 2014
TLDR
This paper proposes a new algorithm to allocate resources in efficient manner based on different parameters like number of processor requests, capacity requests etc and can be used for a better resource allocation of jobs in the cloud environment.
A survey on cloud computing resource allocation techniques
  • Swapnil M. Parikh
  • Computer Science
    2013 Nirma University International Conference on Engineering (NUiCONE)
  • 2013
TLDR
This paper mainly addresses key performance issues, challenges and techniques for resource allocation in cloud computing, and focuses on the key issues related to these existing resource allocation techniques and summarizes them.
CT-RBAC:An Access Control Model in Cloud Computing
TLDR
This scheme improves the monitoring ability of the object owner to the cloud server, guarantees the security and reliability of data, and ensures the well flexibility of data.
Local trust based resource allocation in cloud
TLDR
This work proposes technique of resource and reputation monitoring for `trustworthiness evaluation', by using self-assessment based scheme, which goes a step further in ensuring optimal resource allocation and workload balancing, by maintaining in the warm spot.
Adaptive Management and Multi-Objective Optimization for Virtual Machine Placement in Cloud Computing
TLDR
The proposed adaptive management framework for virtual machine placement in the cloud could effectively reduce the number of used nodes and virtual machine migration, and minimize violation of many application SLOs, compared with traditional heuristic methods and single objective solution.
A Survey of Public Auditing for Secure Data Storage in Cloud Computing
TLDR
This paper surveys the previous researches of data integrity based on public auditability which includes collecting the basic requirements and evaluation metrics, providing the representative with approaches to analyze security and efficiency, and proposes some future developments.
Key Techniques of Access Control for Cloud Computing
TLDR
The loss of on-board domain and appearance of multi-tenant context bring some new problems and challenges to access control, and corresponding solutions and techniques are introduced in terms of identity provision, authentication, authorization, identity federation and single sign-on.
Access Control in Networks Hierarchy: Implementation of Key Management Protocol
TLDR
An efficient architecture and the implementation of a key management protocol are proposed, which could be applied efficiently in networks with multi-nodes and multi-users authentication demands, providing high speed performance and high level security strength.
The GridEcon Platform: A Business Scenario Testbed for Commercial Cloud Services
TLDR
This paper presents the GridEcon Platform, a testbed for designing and evaluating economics-aware services in a commercial Cloud computing setting and the validation of an implemented market mechanism and a capacity planning service using the platform demonstrated its usefulness.
Cloud computing login authentication redesign
TLDR
It is argued conclusively that this work improves user-end login security for cloud clients and recommended multi-nodal bio-scanning to reduce authentication failure rate.
...
...