Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2025, Vol. 51 ›› Issue (1): 64-70.doi: 10.12267/j.issn.2096-5931.2025.01.010

Previous Articles     Next Articles

Design and implementation of a new cloud-secure access control system

JIN Jiahong, KANG Yangyang, ZHU Shuai, FENG Kui, GU Zhijie, XU Yanjie   

  1. China Mobile (Suzhou) Software Technology Co., Ltd., Suzhou 215000, China
  • Received:2024-08-09 Online:2025-01-25 Published:2025-02-14

Abstract:

With the rapid development of cloud computing technology, more and more enterprises and individuals are choosing to migrate their business and data to cloud platforms. However, the openness and shared nature of cloud environments also bring numerous security challenges, among which access control stands out as a critical component for ensuring cloud security. This paper conducts in-depth research and discussion on the security design and implementation of access control in the cloud environment. It proposes a new system to solve the design and implementation of access control security, which includes the use of blockchain authorization security, user behavior analysis, feature extraction, trust analysis and other auxiliary decision-making to improve the business security of users in the cloud environment.

Key words: user behavior analysis, feature extraction, access control

CLC Number: