Intelligent Computing Making Access Control More Secure: From Cipher to Trust

被引:0
|
作者
Wang, Tian [1 ,2 ]
Fang, Weidong [1 ,2 ,3 ]
Ni, Mufan [7 ]
Yang, Xiaoliang [4 ]
Chen, Wei [5 ]
Chen, Wentao [6 ]
Zhang, Wuxiong [1 ,2 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[2] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[3] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[4] Minist Water Resources, HaiHe River Water Conservancy Commiss, HaiHe River Lower Reaches Adm Bur, Sluice Management Dept Duliujian River, Tianjin 300380, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[6] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[7] Southeast Univ, Chien Shiung Wu Coll, Nanjing 211102, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Trust; Information Security; Intelligent Computing; Game Theory;
D O I
10.1007/978-981-97-5603-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is an important component of information security system. It protects resources from unauthorized users or misuses by authorized users. Yet, the security of cipher-based access control may be compromised due to its fixed and predefined features. As an intelligent computing technology that simulates human behavior, trust evaluation can be an effective method for capturing users' unpredictable actions. Trust-based access control is a better method for tracking dynamic user behavior. Researchers are becoming increasingly enthusiastic in integrating Intelligent Computing concepts with access control. However, there is no article that covers all aspects of trust-based access control. Therefore, a comprehensive survey in this area of study is desperately needed. In this paper, we will investigate a novel approach to access control with trust. Access control is thus becoming more secure by incorporating trust evaluation. Furthermore, we will demonstrate how trust can be used to enhance access control secure by combining it with other intelligent computing technology like game theory.
引用
收藏
页码:307 / 317
页数:11
相关论文
共 50 条
  • [11] Provably Secure Data Access Control Protocol for Cloud Computing
    Zhang, Ji
    Chen, Anmin
    Zhang, Ping
    SYMMETRY-BASEL, 2023, 15 (12):
  • [12] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [13] Secure Dynamic Access Control Scheme of PHR in Cloud Computing
    Tzer-Shyong Chen
    Chia-Hui Liu
    Tzer-Long Chen
    Chin-Sheng Chen
    Jian-Guo Bau
    Tzu-Ching Lin
    Journal of Medical Systems, 2012, 36 : 4005 - 4020
  • [14] Research on cloud computing service based on trust access control
    Sun, Panjun
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2020, 12
  • [15] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469
  • [16] A trust-based cloud computing access control model
    Huang, Lanying
    Xiong, Zenggang
    Wang, Guangwei
    Ye, Conghuan
    INTERNATIONAL JOURNAL OF KNOWLEDGE-BASED AND INTELLIGENT ENGINEERING SYSTEMS, 2016, 20 (04) : 197 - 203
  • [17] Access Control Model for Ambient Intelligent Services in Cloud Computing
    Satoh, Ichiro
    2016 IEEE INTERNATIONAL CONFERENCE ON SMART CLOUD (SMARTCLOUD), 2016, : 112 - 117
  • [18] A telemedicine network using secure techniques and intelligent user access control
    Wallauer, Jader
    von Wangenheim, Aldo
    Andrade, Rafael
    de Macedo, Douglas D. J.
    PROCEEDINGS OF THE 21ST IEEE INTERNATIONAL SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, 2008, : 105 - +
  • [19] A Secure Cloud Computing System by Using Encryption and Access Control Model
    Mahmood, Ghassan Sabeeh
    Huang, Dong Jun
    Jaleel, Baidaa Abdulrahman
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2019, 15 (03): : 538 - 549
  • [20] Blockchain-Aided Secure Access Control for UAV Computing Networks
    Wang, Jingjing
    Jiao, Zihan
    Chen, Jianrui
    Hou, Xiangwang
    Yang, Tingting
    Lan, Dapeng
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2024, 11 (06): : 5267 - 5279