Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 64-70.doi: 10.12267/j.issn.2096-5931.2025.01.010
Previous Articles Next Articles
JIN Jiahong, KANG Yangyang, ZHU Shuai, FENG Kui, GU Zhijie, XU Yanjie
Received:
Online:
Published:
Abstract:
With the rapid development of cloud computing technology, more and more enterprises and individuals are choosing to migrate their business and data to cloud platforms. However, the openness and shared nature of cloud environments also bring numerous security challenges, among which access control stands out as a critical component for ensuring cloud security. This paper conducts in-depth research and discussion on the security design and implementation of access control in the cloud environment. It proposes a new system to solve the design and implementation of access control security, which includes the use of blockchain authorization security, user behavior analysis, feature extraction, trust analysis and other auxiliary decision-making to improve the business security of users in the cloud environment.
Key words: user behavior analysis, feature extraction, access control
CLC Number:
TP3.11
JIN Jiahong, KANG Yangyang, ZHU Shuai, FENG Kui, GU Zhijie, XU Yanjie. Design and implementation of a new cloud-secure access control system[J]. Information and Communications Technology and Policy, 2025, 51(1): 64-70.
Add to citation manager EndNote|Ris|BibTeX
http://ictp.caict.ac.cn/EN/10.12267/j.issn.2096-5931.2025.01.010