2016
DOI: 10.1186/s13635-016-0031-6
|View full text |Cite
|
Sign up to set email alerts
|

A new usage control protocol for data protection of cloud environment

Abstract: With the rapid development of the cloud computing service, utilizing traditional access control models was difficult to meet the complex requirements of data protection in cloud environment. In cloud environment, the definition of data and its protection are gradually varied when contents shifting from one virtual machine to another; in these new scenarios, the multi-tenancy pattern has been taken as a core attribute. For this reason, many users need to change their roles according to different situations; cer… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Liu et al [35] introduced role elements and divided roles into provider roles and consumer roles based on the UCON model, using both direct use and the need for authorization to use, to manage the permissions in the UCON model more effectively while ensuring the reliability of the attributes. Fan et al [36] proposed a UCON-based multi-use control protocol model based on the inability of access control to adapt to changes in a multi-tenant model in a cloud environment, which features flexible authorization, feature binding, and offline control. Based on the idea of temporary authorization, Li et al [37] introduced the UCONABC based information resource usage control strategy and subject reliability into the UCONABC model as an authorization decision factor in information resource usage control, designed a subject reliability evaluation method based on subject relationship and subject attributes, and constructed a new resource usage control scheme.…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [35] introduced role elements and divided roles into provider roles and consumer roles based on the UCON model, using both direct use and the need for authorization to use, to manage the permissions in the UCON model more effectively while ensuring the reliability of the attributes. Fan et al [36] proposed a UCON-based multi-use control protocol model based on the inability of access control to adapt to changes in a multi-tenant model in a cloud environment, which features flexible authorization, feature binding, and offline control. Based on the idea of temporary authorization, Li et al [37] introduced the UCONABC based information resource usage control strategy and subject reliability into the UCONABC model as an authorization decision factor in information resource usage control, designed a subject reliability evaluation method based on subject relationship and subject attributes, and constructed a new resource usage control scheme.…”
Section: Related Workmentioning
confidence: 99%
“…On the contrary they have enforced unlawful agreements in restraining trade or have evaded statutory limits on the copyright. Furthermore, such uses have also given rise to problems concerning with the basic rights of "fair use" and privacy: the former is invoked in order to prevent copyright owners from having the exclusive control over their creations than the copyright law intends, whereas the latter is invoked in order to preserve the ownership and distribution of confidential data [1,7,8,9,10,11]. A different approach to the problems reported above is represented by the web systems that employ watermarking based technologies [12] to implement the copyright protection of digital content distributed on the Internet.…”
Section: Introductionmentioning
confidence: 99%