Intelligent Computing Making Access Control More Secure: From Cipher to Trust

被引:0
|
作者
Wang, Tian [1 ,2 ]
Fang, Weidong [1 ,2 ,3 ]
Ni, Mufan [7 ]
Yang, Xiaoliang [4 ]
Chen, Wei [5 ]
Chen, Wentao [6 ]
Zhang, Wuxiong [1 ,2 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[2] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[3] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[4] Minist Water Resources, HaiHe River Water Conservancy Commiss, HaiHe River Lower Reaches Adm Bur, Sluice Management Dept Duliujian River, Tianjin 300380, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[6] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[7] Southeast Univ, Chien Shiung Wu Coll, Nanjing 211102, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Trust; Information Security; Intelligent Computing; Game Theory;
D O I
10.1007/978-981-97-5603-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is an important component of information security system. It protects resources from unauthorized users or misuses by authorized users. Yet, the security of cipher-based access control may be compromised due to its fixed and predefined features. As an intelligent computing technology that simulates human behavior, trust evaluation can be an effective method for capturing users' unpredictable actions. Trust-based access control is a better method for tracking dynamic user behavior. Researchers are becoming increasingly enthusiastic in integrating Intelligent Computing concepts with access control. However, there is no article that covers all aspects of trust-based access control. Therefore, a comprehensive survey in this area of study is desperately needed. In this paper, we will investigate a novel approach to access control with trust. Access control is thus becoming more secure by incorporating trust evaluation. Furthermore, we will demonstrate how trust can be used to enhance access control secure by combining it with other intelligent computing technology like game theory.
引用
收藏
页码:307 / 317
页数:11
相关论文
共 50 条
  • [21] Structured Document Model and Its Secure Access Control in Cloud Computing
    Xiong, Jinbo
    Yao, Zhiqiang
    Ma, Jun
    Liu, Ximeng
    Li, Qi
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 592 - 596
  • [22] A Secure and Lightweight Data Access Control Scheme for Mobile Cloud Computing
    Jin, Yu
    Tian, Chuan
    He, Heng
    Wang, Fan
    PROCEEDINGS 2015 IEEE FIFTH INTERNATIONAL CONFERENCE ON BIG DATA AND CLOUD COMPUTING BDCLOUD 2015, 2015, : 172 - 179
  • [23] Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services
    Liu, Lingshuang
    Huang, Cheng
    Zhu, Dan
    Liu, Dongxiao
    Ni, Jianbing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 5487 - 5492
  • [24] Secure and efficient data access control in cloud computing environment: A survey
    Namasudra, Suyel
    Roy, Pinki
    MULTIAGENT AND GRID SYSTEMS, 2016, 12 (02) : 69 - 90
  • [25] Efficient decentralized access control for secure data sharing in cloud computing
    Liu, Tonglai
    Wu, Jigang
    Li, Jiaxing
    Li, Jingyi
    Li, Yidong
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (17):
  • [26] An Android Based Secure Access Control Using ARM and Cloud Computing
    Srividhya, K.
    Manikanthan, S. V.
    2015 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2015, : 1480 - 1483
  • [27] Towards Secure Risk-Adaptable Access Control in Cloud Computing
    Abdullah, Salasiah
    Abu Bakar, Khairul Azmi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 324 - 330
  • [28] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    Tu Shanshan
    Huang Yongfeng
    CHINA COMMUNICATIONS, 2015, 12 (12) : 43 - 52
  • [29] Towards Efficient and Secure Access Control System for Mobile Cloud Computing
    TU Shanshan
    HUANG Yongfeng
    中国通信, 2015, 12 (12) : 43 - 52
  • [30] Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing
    Tang, Shaohua
    Li, Xiaoyu
    Huang, Xinyi
    Xiang, Yang
    Xu, Lingling
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (07) : 2325 - 2331