Intelligent Computing Making Access Control More Secure: From Cipher to Trust

被引:0
|
作者
Wang, Tian [1 ,2 ]
Fang, Weidong [1 ,2 ,3 ]
Ni, Mufan [7 ]
Yang, Xiaoliang [4 ]
Chen, Wei [5 ]
Chen, Wentao [6 ]
Zhang, Wuxiong [1 ,2 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[2] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[3] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[4] Minist Water Resources, HaiHe River Water Conservancy Commiss, HaiHe River Lower Reaches Adm Bur, Sluice Management Dept Duliujian River, Tianjin 300380, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[6] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[7] Southeast Univ, Chien Shiung Wu Coll, Nanjing 211102, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Trust; Information Security; Intelligent Computing; Game Theory;
D O I
10.1007/978-981-97-5603-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is an important component of information security system. It protects resources from unauthorized users or misuses by authorized users. Yet, the security of cipher-based access control may be compromised due to its fixed and predefined features. As an intelligent computing technology that simulates human behavior, trust evaluation can be an effective method for capturing users' unpredictable actions. Trust-based access control is a better method for tracking dynamic user behavior. Researchers are becoming increasingly enthusiastic in integrating Intelligent Computing concepts with access control. However, there is no article that covers all aspects of trust-based access control. Therefore, a comprehensive survey in this area of study is desperately needed. In this paper, we will investigate a novel approach to access control with trust. Access control is thus becoming more secure by incorporating trust evaluation. Furthermore, we will demonstrate how trust can be used to enhance access control secure by combining it with other intelligent computing technology like game theory.
引用
收藏
页码:307 / 317
页数:11
相关论文
共 50 条
  • [1] Secure Access Control Model for Cloud Computing Environment with Fuzzy Max Interval Trust Values
    Khan, Aakib Jawed
    Mehfuz, Shabana
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 536 - 542
  • [2] Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
    Patwary, Abdullah Al-Noman
    Naha, Ranesh Kumar
    Garg, Saurabh
    Battula, Sudheer Kumar
    Patwary, Md Anwarul Kaium
    Aghasian, Erfan
    Amin, Muhammad Bilal
    Mahanti, Aniket
    Gong, Mingwei
    ELECTRONICS, 2021, 10 (10)
  • [3] Making cloud computing more secure: Homomorphic encryption
    Naone, Erica
    Technology Review, 2011, 114 (03) : 50 - 51
  • [4] Making HeNB More Secure with Improved Secure Access Protocol and Analyzing It
    Najm, Fariba Ghasemi
    Payandeh, Ali
    Habibi, Hashem
    MOBILE NETWORKS AND MANAGEMENT, MONAMI 2015, 2015, 158 : 107 - 120
  • [5] Trust Management Approach for Secure and Privacy Data Access in Cloud Computing
    Mythili, K.
    Anandakumar, H.
    2013 INTERNATIONAL CONFERENCE ON GREEN COMPUTING, COMMUNICATION AND CONSERVATION OF ENERGY (ICGCE), 2013, : 923 - 927
  • [6] Toward More Secure and Reliable Access Control
    Peeters, Roel
    Singelee, Dave
    Preneel, Bart
    IEEE PERVASIVE COMPUTING, 2012, 11 (03) : 76 - 83
  • [7] Making Intelligent Reflecting Surfaces More Intelligent: A Roadmap Through Reservoir Computing
    Zhou, Zhou
    Bai, Kangjun
    Mohammadi, Nima
    Yi, Yang
    Liu, Lingjia
    IEEE NETWORK, 2022, 36 (02): : 175 - 180
  • [8] Trust and role based access control for secure interoperation ("TracSI")
    Phoomvuthisam, Suronapee
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1458 - 1463
  • [9] Secure intelligent traffic light control using fog computing
    Liu, Jian
    Li, Jiangtao
    Zhang, Lei
    Dai, Feifei
    Zhang, Yuanfei
    Meng, Xinyu
    Shen, Jian
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 817 - 824
  • [10] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Chen, Tzer-Shyong
    Liu, Chia-Hui
    Chen, Tzer-Long
    Chen, Chin-Sheng
    Bau, Jian-Guo
    Lin, Tzu-Ching
    JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (06) : 4005 - 4020