Advertisement

Research on Dynamic Access Control Model of Distributed Network Under Big Data Technology

  • Yi-huo JiangEmail author
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 301)

Abstract

The traditional distributed network dynamic access control management model has the defects of poor control management efficiency and poor expansibility. In order to solve the above problems, the dynamic access control management model of the distributed network is constructed by the large-data technology. According to the requirement of distributed network dynamic access control management model, the mining model is constructed. Based on this model, the direct trust value and indirect trust value are calculated by big data technology, and the final trust value is obtained by combining them. Based on the final trust value obtained, the dynamic access control management process is formulated and executed to realize the control and management of distributed network dynamic access. The simulation results show that compared with the traditional distributed network dynamic access control management model, the distributed network dynamic access control management model greatly improves the efficiency and expansibility of the model. It fully shows that the distributed network dynamic access control management model has better control and management performance.

Keywords

Big data technology Distributed network Dynamic access Control Management 

References

  1. 1.
    Huang, H.: Research on security model and algorithm of learning flow access control under large data of the Yellow River Qing. J. Minnan Norm. Univ. (Nat. Ed.) 100(2), 30–39 (2018)Google Scholar
  2. 2.
    Zhang, R., Tang, T., Wanke: Fine-grained access control and audit management in large data environment. Inf. Secur. Res. 3(6), 509–515 (2017)Google Scholar
  3. 3.
    Yu, H., Hong, R., Shi, W.: Research on the model of enterprise theme network public opinion analysis system based on big data. Mod. Comput. (Prof. Ed.) 613(13), 73–77 (2018)Google Scholar
  4. 4.
    Xing, X., Tian, X.: A novel reputation-based dynamic access control model. J. Shanghai Electr. Power Inst. 12(6), 80–85 (2017)Google Scholar
  5. 5.
    Li, L., Shao, L., Wang, C., et al.: Access control of CA-RBAC for ubiquitous networks. Netw. Space Secur. 8(2), 48–54 (2017)MathSciNetGoogle Scholar
  6. 6.
    Hu, X.: Research and simulation of dynamic access control method for cloud computing storage data. Comput. Simul. 34(3), 365–368 (2017)Google Scholar
  7. 7.
    Liu, F., Ding, H.: Role-based secure access control method. Electron. World 45(1), 166–167 (2017)Google Scholar
  8. 8.
    Liu, H., Zhang, L., Chen, Z.: Task access control model based on fuzzy theory in P2P network. J. Commun. 38(2), 44–52 (2017)Google Scholar
  9. 9.
    Li, Q.: Research and implementation of educational administration management system based on role-based access control technology. J. Chengde Pet. Coll. 19(2), 40–44 (2017)MathSciNetGoogle Scholar
  10. 10.
    Chen, Y., Hao, T.: Research on access control based on dynamic monitoring of role trust. Comput. Technol. Dev. 27(10), 106–110 (2017)Google Scholar
  11. 11.
    Wang, Y., Yang, J.: A role-based and attribute-based access control model for cloud computing data. J. Tsinghua Univ. Nat. Sci. Ed. 16(11), 1150–1158 (2017)Google Scholar
  12. 12.
    Li, H., Song, F., Wang, L.: Research on four-tier access control model based on time and environment constraints. Comput. Appl. Softw. 35(1), 59–64 (2018)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  1. 1.Fuzhou University of International Studies and TradeFuzhouChina

Personalised recommendations