{"id":"https://openalex.org/W3083433785","doi":"https://doi.org/10.1109/access.2020.3021415","title":"Dynamic Control Method for Tenants\u2019 Sensitive Information Flow Based on Virtual Boundary Recognition","display_name":"Dynamic Control Method for Tenants\u2019 Sensitive Information Flow Based on Virtual Boundary Recognition","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3083433785","doi":"https://doi.org/10.1109/access.2020.3021415","mag":"3083433785"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.3021415","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021415","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186089.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186089.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100719897","display_name":"Xin Lu","orcid":"https://orcid.org/0000-0001-6486-3460"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Xin Lu","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","Zhengzhou City Science and Technology Department, Zhengzhou, China","He'nan Province Key Laboratory of Information Security, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-6486-3460","affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Zhengzhou City Science and Technology Department, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"He'nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000876556","display_name":"Lifeng Cao","orcid":"https://orcid.org/0000-0002-4605-8545"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lifeng Cao","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","Zhengzhou City Science and Technology Department, Zhengzhou, China","He'nan Province Key Laboratory of Information Security, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4605-8545","affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Zhengzhou City Science and Technology Department, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"He'nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100697401","display_name":"Xuehui Du","orcid":"https://orcid.org/0000-0002-4923-900X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xuehui Du","raw_affiliation_strings":["He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","Zhengzhou City Science and Technology Department, Zhengzhou, China","He'nan Province Key Laboratory of Information Security, Zhengzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-4923-900X","affiliations":[{"raw_affiliation_string":"He\u2019nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"Zhengzhou City Science and Technology Department, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"He'nan Province Key Laboratory of Information Security, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100719897"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.816,"has_fulltext":true,"cited_by_count":8,"citation_normalized_percentile":{"value":0.79356489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":97},"biblio":{"volume":"8","issue":null,"first_page":"162548","last_page":"162568"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10502","display_name":"Advanced Memory and Neural Computing","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.850989818572998},{"id":"https://openalex.org/keywords/information-flow","display_name":"Information flow","score":0.5992510914802551},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5540480017662048},{"id":"https://openalex.org/keywords/boundary","display_name":"Boundary (topology)","score":0.5023508071899414},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4660545289516449},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.45765766501426697},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4570695161819458},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.44562166929244995},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4236100912094116},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38551586866378784},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.35525792837142944},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10368168354034424}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.850989818572998},{"id":"https://openalex.org/C2779136372","wikidata":"https://www.wikidata.org/wiki/Q10283002","display_name":"Information flow","level":2,"score":0.5992510914802551},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5540480017662048},{"id":"https://openalex.org/C62354387","wikidata":"https://www.wikidata.org/wiki/Q875399","display_name":"Boundary (topology)","level":2,"score":0.5023508071899414},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4660545289516449},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.45765766501426697},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4570695161819458},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.44562166929244995},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4236100912094116},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38551586866378784},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.35525792837142944},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10368168354034424},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.3021415","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021415","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186089.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c5f83810d4d948d68fe916155f1710de","is_oa":true,"landing_page_url":"https://doaj.org/article/c5f83810d4d948d68fe916155f1710de","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 162548-162568 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.3021415","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3021415","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09186089.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2301373926","display_name":null,"funder_award_id":"61502531","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8150955476","display_name":null,"funder_award_id":"61702550","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3083433785.pdf","grobid_xml":"https://content.openalex.org/works/W3083433785.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W152631077","https://openalex.org/W205715760","https://openalex.org/W1516432943","https://openalex.org/W1594455430","https://openalex.org/W2022570654","https://openalex.org/W2039573396","https://openalex.org/W2062563428","https://openalex.org/W2062959015","https://openalex.org/W2080914957","https://openalex.org/W2086234010","https://openalex.org/W2094631741","https://openalex.org/W2094873755","https://openalex.org/W2121001711","https://openalex.org/W2124774833","https://openalex.org/W2150858564","https://openalex.org/W2162003043","https://openalex.org/W2169651649","https://openalex.org/W2273623950","https://openalex.org/W2343815575","https://openalex.org/W2358694693","https://openalex.org/W2464889299","https://openalex.org/W2467908049","https://openalex.org/W2511013218","https://openalex.org/W2561842425","https://openalex.org/W2767031271","https://openalex.org/W2769438610","https://openalex.org/W2774583971","https://openalex.org/W2786372306","https://openalex.org/W2913573163","https://openalex.org/W2916690964","https://openalex.org/W2924942557","https://openalex.org/W2937949509","https://openalex.org/W2939668582","https://openalex.org/W2946100318","https://openalex.org/W2997799626","https://openalex.org/W3120740533","https://openalex.org/W4236528540","https://openalex.org/W4237990977","https://openalex.org/W4238764625","https://openalex.org/W4301772419","https://openalex.org/W6630914723","https://openalex.org/W6671957770","https://openalex.org/W6682445428","https://openalex.org/W7025322074"],"related_works":["https://openalex.org/W2106969392","https://openalex.org/W1595551935","https://openalex.org/W1997179160","https://openalex.org/W2360781613","https://openalex.org/W3014916130","https://openalex.org/W1646148796","https://openalex.org/W2138926267","https://openalex.org/W2157160400","https://openalex.org/W2477375555","https://openalex.org/W2144022323"],"abstract_inverted_index":{"In":[0,36],"the":[1,6,10,15,20,26,49,75,82,101,115,121,130,157,161,169,178,191,196,217,222,232,240,245,250,255],"cloud":[2,207],"environment,":[3],"owing":[4],"to":[5,34],"large-scale":[7],"sharing":[8],"of":[9,39,51,54,80,86,95,114,132,143,164,171,184,199,225,244,257],"upper":[11],"application":[12,122,204],"instance":[13],"and":[14,32,77,90,134,160,168,181,189,229,242,254],"underlying":[16],"virtual":[17,28,68,97,117,193],"machine":[18,29],"resources,":[19],"tenants'":[21,62,165,185,208],"information":[22,41,53,64,136,145,166,186,210,258],"flow":[23,42,65,137,146,167,187,211,259],"boundary":[24,69,98,119,224],"in":[25,48],"shared":[27],"is":[30,45,71,106,147,152,212,247],"fuzzy":[31],"difficult":[33],"identify.":[35],"addition,":[37],"protection":[38],"tenant":[40,96,116,172,192],"between":[43],"processes":[44],"inadequate,":[46],"resulting":[47],"leakage":[50],"sensitive":[52,63,144,209],"tenants.":[55],"Therefore,":[56],"a":[57,139,200],"dynamic":[58,102,112,140,180,201],"control":[59,141,162,183,203],"method":[60,142,246],"for":[61,206],"based":[66,99],"on":[67,100],"recognition":[70,93],"proposed.":[72],"By":[73],"analyzing":[74],"behavior":[76,83],"operation":[78],"log":[79],"tenants,":[81],"feature":[84],"vectors":[85],"tenants":[87,226],"are":[88,175],"constructed,":[89],"an":[91],"automatic":[92],"algorithm":[94,109,219],"spiking":[103,234],"neural":[104,235],"network":[105,236],"designed.":[107,176],"This":[108],"can":[110,220],"realize":[111],"identification":[113],"security":[118,150,202,223,241],"when":[120],"service":[123],"demand":[124],"changes":[125],"dynamically.":[126],"Further,":[127,239],"combined":[128],"with":[129],"concept":[131],"centralized":[133],"decentralized":[135],"control,":[138],"established.":[148],"The":[149],"label":[151,173],"formally":[153],"defined":[154],"by":[155,249],"using":[156],"lattice":[158],"structure,":[159],"rules":[163,170],"encryption-declassification":[174],"Thus,":[177],"independent,":[179],"secure":[182],"inside":[188],"outside":[190],"boundary.":[194],"Finally,":[195],"detailed":[197],"design":[198],"system":[205],"provided.":[213],"Experiments":[214],"confirm":[215],"that":[216],"proposed":[218],"identify":[221],"more":[227],"accurately":[228],"efficiently":[230],"than":[231],"traditional":[233],"classification":[237],"methods.":[238],"effectiveness":[243],"verified":[248],"intransitive":[251],"noninterference":[252],"theory":[253],"experiment":[256],"control.":[260]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2020-09-11T00:00:00"}
