A Survey of Cloud Computing Access Control Technology
A Survey of Cloud Computing Access Control Technology
Series
Minghao WANG
Dalian vocational & technical college
116035
Abstract. Cloud computing access control technology originated in the 1970s. The initial goal
of this technology is to meet the requirements of the primary server for data access rights,
identify the identity of the visitor through relevant procedures, and then set access rights based
on the authentication result. And it also committed to protect important data and prevent the
main server from being illegally invaded. With the development of technology, cloud
computing access control technology has been widely used in computer systems, which has
played a good role. This article will briefly discuss cloud computing access control technology
research and present personal insights.
1. Introduction
With the rapid development of network platforms, cloud computing technology is widely used in
computer management systems. At the same time, it also brings various cloud security issues. In order
to solve cloud security problems and protect cloud resources, cloud computing access needs to be set
up the control technology. This article will briefly introduce the basic concepts of cloud computing,
discuss cloud computing security management issues, analyze cloud computing access control
technologies in traditional mode, and discuss about the access control technologies in cloud
environments.
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
ISPECE IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1187 (2019) 032019 doi:10.1088/1742-6596/1187/3/032019
to enter the computing resource sharing pool through the cloud service interaction (in general, the
internal resources of the computing resource sharing pool mainly include the network, the storage, the
software, the server, and other services). IBM, the IT business giant, believes that cloud computing
technology is a modern consumer delivery model. In the process of consumption and delivery, cloud
computing technology integrates computer technology, information technology and various business
services. Users can choose the procurement mode according to their specific needs, access network
resources, consumer subjects are not only people, but also equipment or programs. Consumer goods
mainly include computing resources, servers, storage capabilities, business services and other
resources.
From the analysis of service structure, cloud computing has three layers of service subsystems. The
first layer is SPI mode. Its English name is Infrastructure as a Service, Iaa S. This mode is mainly used
to provide infrastructure services like host, storage, network and Various hardware services; the second
layer is Paa S, the English full name is Platform as a Service, that is, service platform, such as identity
authentication, service bus, workflow, access control, data mining, etc.; the third layer is Saa S, the full
name of English Software as a Service, namely software services, such as communication services,
mail delivery and content management [2].
From the perspective of technical support system, cloud computing has a key technology, namely
intelligent scheduling technology, which not only can rationally adjust resource dynamics,
comprehensively monitor data, migrate business dynamics, but also has the function of scheduling
large-scale data. Quickly match cloud resources and reduce or increase CPU computing units, cloud
servers, and storage space as needed.
On the other hand, cloud computing technology has seven characteristics: First, the scale is large.
Cloud computing technology can scientifically dispatch cloud resources, integrate massive cloud
resources, and eventually form a large-scale cloud resource pool, thereby continuously strengthening
cloud service capabilities, computing power, and storage capabilities. In addition, cloud services can
provide users with service resources, computing power and storage performance that traditional
computers cannot provide to meet the needs of different users. Second, it needs to be virtualized. In
the information age, users can use the Internet to obtain all valuable cloud resources and use the
corresponding terminals to obtain the required services without locating the specific location of the
hardware architecture and cloud technology. Moreover, cloud technology is specific, but not tangible.
Therefore, it is not limited by geographical location, and it can provide various services to users
through virtualization technology. Third, the reliability is good. The services provided by cloud
computing technology are more reliable than traditional technology service models. In short, cloud
computing technology combines a variety of valuable data and copy fault tolerance technologies with
homogeneous compatibility technologies to back up valuable data and ensure the completeness,
continuity and reliability of stored data. Fourth, it should be multifunctional. Compared with other
features, the versatility of cloud computing technology is not specific to a specific application, but is
reflected in the application of a variety of different service structures, and to ensure that a variety of
applications can be effectively run with the support of the cloud platform. Fifth, the service is flexible.
Cloud computing technology and traditional computer technology services have a significant
difference - cloud computing technology can provide a good flexible service, which is scalable and
fast, meets the user's growth needs, and automatically expands or reduces the size of cloud resources,
it can continuously improve the utilization of cloud resources. Sixth, the convenience is strong.
Seventh, the effectiveness is high. The 21st century cloud computing technology belongs to a
modern network business service model with high centralized management functions, which can
greatly reduce data management costs, improve cloud resource utilization, improve computer
technology operation mode, and assist users to smoothly enter services. The webpage, which saves a
lot of time, experience and cost, shows that cloud computing technology has good effectiveness.
2
ISPECE IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1187 (2019) 032019 doi:10.1088/1742-6596/1187/3/032019
the intrusion of network viruses. There are five main features, namely, concealment, contagious,
destructive, stimulating and unpredictable [3]. Among them, concealment means that the presence,
infection and destruction of computer data are not easy to be found; infectivity means that most
network viruses can self-replicate under the corresponding conditions, and the infection speed is very
fast, if it cannot be cleared in a short time. The virus will affect the entire network system; destructive
means that once a virus program is attached to the currently running program, the running program
will be infected, thereby affecting the entire network system, destroying the contents of the disk file,
and illegally deleting the data. Deliberately tampering with files, occupying a large amount of storage
space, resulting in disk formatting and data loss; the essential nature of stimulating is conditional
control. Under normal circumstances, the types of viruses are different, and the excitation conditions
controlled by the outside are also different, but as long as the computer network system environment
can meet the conditions of virus transmission, and the virus program will be further activated,
resulting in a paralysis of the computer network system; the unpredictability mainly means that the
virus spreads much faster than the anti-virus software, in short, There is currently no anti-virus
software that can clear the site. Network virus. From the operation of the virus, computer network
viruses can be divided into three parts: virus boot program, virus infection program and virus disease
program. Among all viruses, Trojan virus is the most common virus file at present. It is different from
the general network virus. This virus does not copy and multiply itself, and does not interfere with
other files, but it will provide open hackers for Trojans. The host's portal, thus arbitrarily destroying
and stealing computer files, passwords, stock accounts, bank accounts, etc., and even remotely
controlling the host being hosted, the Trojan virus is seriously jeopardizing the safe operation of
modern networks. In this regard, it is necessary to set up a perfect protection system and security
password by means of cloud computing technology, to avoid network erosion by viruses, to do
network security monitoring work, thereby continuously improving computer performance, reducing
power configuration, speeding up computer startup speed and running speed, and comprehensively
doing good computer network maintenance work.
It can be seen from Table 1 that the object resources in the access control matrix are controlled by
the subject and are realized by the subject.
An access control list is a permission table in computer storage that is used to express access rights
to individual files and folders. Moreover, the access control list has the right to access the object, and
can specify the specific steps and processes of the subject operation object.
The second type is the Mandatory Access Control Technology System (MAC). The full name of the
English is Mandatory Access Control. This system is mainly used to access user control requirements
and set security fixed policies and management rights for computers. In addition, the core of the
Access Control Technology System (MAC) is to protect the computer information system, avoid data
3
ISPECE IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1187 (2019) 032019 doi:10.1088/1742-6596/1187/3/032019
leakage, and set the access basis for resources. Moreover, the Mandatory Access Control Technology
System (MAC) sets up security control and "up-write" and "read-down" execution to ensure that the
subject and the object can be safely executed and operated [4].
The third is Role-Based Access Control, which enables organic separation of access subjects and
objects, and builds a Role-Based Access Control model to perform authorized operations through
mapping, strengthen access rights management.
6. Conclusion
In summary, the new network service management model of cloud computing originated in the 1960s.
With the development of technology, the technology is widely used in various fields to effectively
enhance cloud service capabilities, computing power and storage capabilities. To comprehensively
improve the access control technology in the cloud environment, it is necessary to construct a good
T-ABAC model, refine the combination module, and continuously optimize the user behavior
evidence collection technology.
References
[1]Wang Shulan. Research on attribute-based access control technology in cloud computing [D].
Shenzhen University, 2016 (06:1).
[2] Liu Zhengnan. Research on access control model based on user behavior evaluation in cloud
environment [D]. Northwest A&F University, 2016(05:2).
[3] Feng Lixiao. Research on attribute-based access control method in cloud computing environment
4
ISPECE IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1187 (2019) 032019 doi:10.1088/1742-6596/1187/3/032019