Intelligent Computing Making Access Control More Secure: From Cipher to Trust

被引:0
|
作者
Wang, Tian [1 ,2 ]
Fang, Weidong [1 ,2 ,3 ]
Ni, Mufan [7 ]
Yang, Xiaoliang [4 ]
Chen, Wei [5 ]
Chen, Wentao [6 ]
Zhang, Wuxiong [1 ,2 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[2] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[3] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[4] Minist Water Resources, HaiHe River Water Conservancy Commiss, HaiHe River Lower Reaches Adm Bur, Sluice Management Dept Duliujian River, Tianjin 300380, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[6] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[7] Southeast Univ, Chien Shiung Wu Coll, Nanjing 211102, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Trust; Information Security; Intelligent Computing; Game Theory;
D O I
10.1007/978-981-97-5603-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is an important component of information security system. It protects resources from unauthorized users or misuses by authorized users. Yet, the security of cipher-based access control may be compromised due to its fixed and predefined features. As an intelligent computing technology that simulates human behavior, trust evaluation can be an effective method for capturing users' unpredictable actions. Trust-based access control is a better method for tracking dynamic user behavior. Researchers are becoming increasingly enthusiastic in integrating Intelligent Computing concepts with access control. However, there is no article that covers all aspects of trust-based access control. Therefore, a comprehensive survey in this area of study is desperately needed. In this paper, we will investigate a novel approach to access control with trust. Access control is thus becoming more secure by incorporating trust evaluation. Furthermore, we will demonstrate how trust can be used to enhance access control secure by combining it with other intelligent computing technology like game theory.
引用
收藏
页码:307 / 317
页数:11
相关论文
共 50 条
  • [31] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [32] A Trust-role Access Control Model Facing Cloud Computing
    Huang Lanying
    Xiong Zenggang
    Wang Guangwei
    PROCEEDINGS OF THE 35TH CHINESE CONTROL CONFERENCE 2016, 2016, : 5239 - 5242
  • [33] TACRM: trust access control and resource management mechanism in fog computing
    Ben Daoud, Wided
    Obaidat, Mohammad S.
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Hsiao, Kuei-Fang
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01):
  • [34] Flexible Data Access Control Based on Trust and Reputation in Cloud Computing
    Yan, Zheng
    Li, Xueyun
    Wang, Mingjun
    Vasilakos, Athanasios V.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) : 485 - 498
  • [35] Zero-trust based dynamic access control for cloud computing
    Wang, Ri
    Li, Chen
    Zhang, Kun
    Tu, Bibo
    CYBERSECURITY, 2025, 8 (01):
  • [36] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [37] An adaptive access control scheme based on trust degrees for edge computing
    Zheng, Wenying
    Chen, Bing
    He, Debiao
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [38] Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks
    Al Barazanchi, Israa Ibraheem
    Hashim, Wahidah
    Thabit, Reema
    Sekhar, Ravi
    Shah, Pritesh
    Penubadi, Harshavardhan Reddy
    FORTHCOMING NETWORKS AND SUSTAINABILITY IN THE AIOT ERA, VOL 2, FONES-AIOT 2024, 2024, 1036 : 265 - 275
  • [39] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [40] Blockchain Empowered Secure Video Sharing With Access Control for Vehicular Edge Computing
    Jiang, Bingcheng
    He, Qian
    Liu, Peng
    Maharjan, Sabita
    Zhang, Yan
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2023, 24 (09) : 9041 - 9054