信息网络安全 ›› 2016, Vol. 16 ›› Issue (3): 53-58.doi: 10.3969/j.issn.1671-1122.2016.03.009

Previous Articles     Next Articles

Key Technology Research and Implement on Insider Threat for Controlled Cloud Computing

XIANG Linbo, LIU Chuanyi   

  1. Key Laboratory of Trustworthy Distributed Computing and Service, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China
  • Received:2016-01-20 Online:2016-03-25

Abstract: Cloud computing has generated significant interest in both academia and industry, but the data security and privacy problem is hindering the development of cloud computing. Originated from the OpenStack open source cloud computing framework, this paper analyzes its operation and maintenance mode, and proposes using API proxy and access control to achieve internal controls of cloud platform and protect user data from insider threat in cloud platform. Experiment results show that the method in this article, which can achieve the basic need of cloud platform operation maintenance, implements the division of authority to the cloud administrator and can block malicious and illegal access requests.

Key words: cloud computing, controlled cloud, insider threat, API proxy, access control

CLC Number: