Skip to main content
Erschienen in: Computing 7/2019

18.08.2018

Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation

verfasst von: A. S. M. Kayes, Wenny Rahayu, Tharam Dillon

Erschienen in: Computing | Ausgabe 7/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

New opportunities have been created for the management of critical situations utilizing the Internet of Things (IoT). However, one of the difficulties in providing services for critical situation management using IoT is that access will often be needed by users at the critical events, where access to data and resources is usually restricted by means of their normal roles. In Role-Based Access Control, these roles are organized in static hierarchies and users are authorized to play such roles in order to exercise their organizational functions. However, some of these roles cannot be organized in the same way in static hierarchies as the authorizations granted to such roles directly correspond to the dynamic contextual conditions (e.g., body sensors data). Users need to satisfy these conditions to exercise the functions of such dynamic contextual roles. These dynamic conditions can be effectively derived from the IoT devices in order to manage the critical situations. However, a large number of static roles and contextual conditions has led to the high administrative and processing overheads. In this paper, we present a formal approach to CAAC for dynamically specifying the contextual roles based on the relevant contextual conditions derived from information provided through IoT. We also introduce an ontology-based approach which models the dynamic contextual roles and its associated access control policies. We demonstrate the feasibility of our proposal by providing a walkthrough of the whole mechanism. We also carry out an experimental study on the performance of our approach compared to our previous approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurr Comput Pract Exp 23(9):905–923CrossRef Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurr Comput Pract Exp 23(9):905–923CrossRef
2.
Zurück zum Zitat Dillon TS, Talevski A, Potdar V, Chang E (2009) Web of things as a framework for ubiquitous intelligence and computing. In: International conference on ubiquitous intelligence and computing. Springer, Berlin, pp 2–13 Dillon TS, Talevski A, Potdar V, Chang E (2009) Web of things as a framework for ubiquitous intelligence and computing. In: International conference on ubiquitous intelligence and computing. Springer, Berlin, pp 2–13
3.
Zurück zum Zitat Kayes ASM, Han J, Colman A (2015) OntCAAC: an ontology-based approach to context-aware access control for software services. Comput J 58(11):3000–3034CrossRef Kayes ASM, Han J, Colman A (2015) OntCAAC: an ontology-based approach to context-aware access control for software services. Comput J 58(11):3000–3034CrossRef
4.
Zurück zum Zitat Kayes A, Rahayu W, Dillon T (2018) An ontology-based approach to dynamic contextual role for pervasive access control. In: AINA 2018. IEEE Computer Society Kayes A, Rahayu W, Dillon T (2018) An ontology-based approach to dynamic contextual role for pervasive access control. In: AINA 2018. IEEE Computer Society
5.
Zurück zum Zitat Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29:38–47CrossRef Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29:38–47CrossRef
6.
Zurück zum Zitat Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. TISSEC 4(3):224–274CrossRef Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. TISSEC 4(3):224–274CrossRef
7.
Zurück zum Zitat Gravina R, Ma C, Pace P, Aloi G, Russo W, Li W, Fortino G (2017) Cloud-based activity-aaservice cyber-physical framework for human activity monitoring in mobility. Future Gener Comput Syst 75:158–171CrossRef Gravina R, Ma C, Pace P, Aloi G, Russo W, Li W, Fortino G (2017) Cloud-based activity-aaservice cyber-physical framework for human activity monitoring in mobility. Future Gener Comput Syst 75:158–171CrossRef
8.
Zurück zum Zitat Chandran SM, Joshi JBD (2005) LoT-RBAC: a location and time-based RBAC model. In: WISE, pp 361–375 Chandran SM, Joshi JBD (2005) LoT-RBAC: a location and time-based RBAC model. In: WISE, pp 361–375
9.
Zurück zum Zitat Bhatti R, Ghafoor A, Bertino E, Joshi J (2005) X-gtrbac: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans Inf Syst Secur 8(2):187–227CrossRef Bhatti R, Ghafoor A, Bertino E, Joshi J (2005) X-gtrbac: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans Inf Syst Secur 8(2):187–227CrossRef
10.
Zurück zum Zitat Bertino E, Bonatti PA, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191–233CrossRef Bertino E, Bonatti PA, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191–233CrossRef
11.
Zurück zum Zitat Zhang H, He Y, Shi Z (2006) Spatial context in role-based access control. In: ICISC, pp 166–178 Zhang H, He Y, Shi Z (2006) Spatial context in role-based access control. In: ICISC, pp 166–178
12.
Zurück zum Zitat Bijon KZ, Krishnan R, Sandhu R (2012) Risk-aware RBAC sessions. In: ICISS. Springer, Berlin, pp 59–74 Bijon KZ, Krishnan R, Sandhu R (2012) Risk-aware RBAC sessions. In: ICISS. Springer, Berlin, pp 59–74
13.
Zurück zum Zitat Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv 49(4):65:1–65:45CrossRef Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv 49(4):65:1–65:45CrossRef
14.
Zurück zum Zitat Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14–16CrossRef Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14–16CrossRef
15.
Zurück zum Zitat Jin X, Sandhu RS, Krishnan R (2012) RABAC: role-centric attribute-based access control. In: Computer network security—6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17–19, 2012. Proceedings, pp 84–96 Jin X, Sandhu RS, Krishnan R (2012) RABAC: role-centric attribute-based access control. In: Computer network security—6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17–19, 2012. Proceedings, pp 84–96
16.
Zurück zum Zitat Kim YG, Lim J (2007) Dynamic activation of role on rbac for ubiquitous applications. In: ICCIT. IEEE, pp 1148–1153 Kim YG, Lim J (2007) Dynamic activation of role on rbac for ubiquitous applications. In: ICCIT. IEEE, pp 1148–1153
17.
Zurück zum Zitat Strembeck M, Neumann G (2004) An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans Inf Syst Secur (TISSEC) 7(3):392–427CrossRef Strembeck M, Neumann G (2004) An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans Inf Syst Secur (TISSEC) 7(3):392–427CrossRef
18.
Zurück zum Zitat Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies. ACM, pp 113–122 Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies. ACM, pp 113–122
19.
Zurück zum Zitat Hosseinzadeh S, Virtanen S, Díaz-Rodríguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. SBD, ACM 8(1–8):6 Hosseinzadeh S, Virtanen S, Díaz-Rodríguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. SBD, ACM 8(1–8):6
20.
Zurück zum Zitat Kayes ASM, Han J, Colman AW (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253–277CrossRef Kayes ASM, Han J, Colman AW (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253–277CrossRef
21.
Zurück zum Zitat Kayes ASM, Han J, Colman A, Islam MS (2014) Relboss: a relationship-aware access control framework for software services. In: CoopIS, pp 258–276 Kayes ASM, Han J, Colman A, Islam MS (2014) Relboss: a relationship-aware access control framework for software services. In: CoopIS, pp 258–276
22.
Zurück zum Zitat Kayes ASM, Han J, Colman A (2014) PO-SAAC: a purpose-oriented situation-aware access control framework for software services. In: CAiSE, pp 58–74 Kayes ASM, Han J, Colman A (2014) PO-SAAC: a purpose-oriented situation-aware access control framework for software services. In: CAiSE, pp 58–74
23.
Zurück zum Zitat Kayes A, Rahayu W, Dillon T, Chang E, Han J (2017) Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: CoopIS 2017. Springer, Berlin, pp 132–153 Kayes A, Rahayu W, Dillon T, Chang E, Han J (2017) Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: CoopIS 2017. Springer, Berlin, pp 132–153
24.
Zurück zum Zitat Oksama L, Hyönä J (2008) Dynamic binding of identity and location information: a serial model of multiple identity tracking. Cogn Psychol 56(4):237–283CrossRef Oksama L, Hyönä J (2008) Dynamic binding of identity and location information: a serial model of multiple identity tracking. Cogn Psychol 56(4):237–283CrossRef
28.
Zurück zum Zitat Riboni D, Bettini C (2011) Owl 2 modeling and reasoning with complex human activities. Pervasive Mob Comput 7:379–395CrossRef Riboni D, Bettini C (2011) Owl 2 modeling and reasoning with complex human activities. Pervasive Mob Comput 7:379–395CrossRef
34.
Zurück zum Zitat Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: SACMAT, pp 29–37 Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: SACMAT, pp 29–37
35.
Zurück zum Zitat Joshi J, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4–23CrossRef Joshi J, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4–23CrossRef
36.
Zurück zum Zitat Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709–757CrossRef Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709–757CrossRef
37.
Zurück zum Zitat Trnka M, Cerný T (2016) On security level usage in context-aware role-based access control. In: SAC, pp 1192–1195 Trnka M, Cerný T (2016) On security level usage in context-aware role-based access control. In: SAC, pp 1192–1195
38.
Zurück zum Zitat Hosseinzadeh S, Virtanen S, Rodríguez ND, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: SBD@SIGMOD, pp 1–6 Hosseinzadeh S, Virtanen S, Rodríguez ND, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: SBD@SIGMOD, pp 1–6
Metadaten
Titel
Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation
verfasst von
A. S. M. Kayes
Wenny Rahayu
Tharam Dillon
Publikationsdatum
18.08.2018
Verlag
Springer Vienna
Erschienen in
Computing / Ausgabe 7/2019
Print ISSN: 0010-485X
Elektronische ISSN: 1436-5057
DOI
https://doi.org/10.1007/s00607-018-0654-1

Weitere Artikel der Ausgabe 7/2019

Computing 7/2019 Zur Ausgabe