Intelligent Computing Making Access Control More Secure: From Cipher to Trust

被引:0
|
作者
Wang, Tian [1 ,2 ]
Fang, Weidong [1 ,2 ,3 ]
Ni, Mufan [7 ]
Yang, Xiaoliang [4 ]
Chen, Wei [5 ]
Chen, Wentao [6 ]
Zhang, Wuxiong [1 ,2 ]
机构
[1] Chinese Acad Sci, Shanghai Inst Microsyst & Informat Technol, Sci & Technol Microsyst Lab, Shanghai 201899, Peoples R China
[2] Univ Chinese Acad Sci, Sch Elect Elect & Commun Engn, Beijing 100049, Peoples R China
[3] Shanghai Res & Dev Ctr Micronano Elect, Shanghai 201210, Peoples R China
[4] Minist Water Resources, HaiHe River Water Conservancy Commiss, HaiHe River Lower Reaches Adm Bur, Sluice Management Dept Duliujian River, Tianjin 300380, Peoples R China
[5] China Univ Min & Technol, Sch Comp Sci & Technol, Xuzhou 221116, Jiangsu, Peoples R China
[6] State Grid Xinjiang Co Ltd, Elect Power Res Inst, Urumqi 830011, Peoples R China
[7] Southeast Univ, Chien Shiung Wu Coll, Nanjing 211102, Peoples R China
基金
中国国家自然科学基金;
关键词
Access Control; Trust; Information Security; Intelligent Computing; Game Theory;
D O I
10.1007/978-981-97-5603-2_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Access control is an important component of information security system. It protects resources from unauthorized users or misuses by authorized users. Yet, the security of cipher-based access control may be compromised due to its fixed and predefined features. As an intelligent computing technology that simulates human behavior, trust evaluation can be an effective method for capturing users' unpredictable actions. Trust-based access control is a better method for tracking dynamic user behavior. Researchers are becoming increasingly enthusiastic in integrating Intelligent Computing concepts with access control. However, there is no article that covers all aspects of trust-based access control. Therefore, a comprehensive survey in this area of study is desperately needed. In this paper, we will investigate a novel approach to access control with trust. Access control is thus becoming more secure by incorporating trust evaluation. Furthermore, we will demonstrate how trust can be used to enhance access control secure by combining it with other intelligent computing technology like game theory.
引用
收藏
页码:307 / 317
页数:11
相关论文
共 50 条
  • [41] Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing
    Luo, Wei
    Ma, Wenping
    IEEE ACCESS, 2018, 6 : 40420 - 40428
  • [42] SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing
    Huang, Qinlong
    Yang, Yixian
    Shi, Yuxiang
    SENSORS, 2018, 18 (02)
  • [43] New secure access control model for cloud computing based on Chaotic systems
    BenMbarak, Omessead
    Naanaa, Anis
    ElAsmi, Sadok
    2023 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2023, : 1485 - 1490
  • [44] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang Yang
    Ximeng Liu
    Wenzhong Guo
    Xianghan Zheng
    Chen Dong
    Zhiquan Liu
    Multimedia Tools and Applications, 2020, 79 : 10701 - 10716
  • [45] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang, Yang
    Liu, Ximeng
    Guo, Wenzhong
    Zheng, Xianghan
    Dong, Chen
    Liu, Zhiquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10701 - 10716
  • [46] Biometric based authentication and access control techniques to secure Mobile Cloud Computing
    Khatri, Sunil Kumar
    Monica
    Vadi, Vikas Rao
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 371 - 377
  • [47] Design and Implementation of Trust - based Access Control System fo Cloud Computing
    Xia, Hui
    2017 IEEE 3RD INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC), 2017, : 922 - 926
  • [48] Trust Based Access Control Policy in Multi-domain of Cloud Computing
    Lin, Guoyuan
    Bie, Yuyu
    Lei, Min
    JOURNAL OF COMPUTERS, 2013, 8 (05) : 1357 - 1365
  • [49] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wu, Wei
    Hu, Shun
    Yang, Xu
    Liu, Joseph K.
    Au, Man Ho
    SOFT COMPUTING, 2017, 21 (10) : 2643 - 2649
  • [50] Towards secure and cost-effective fuzzy access control in mobile cloud computing
    Wei Wu
    Shun Hu
    Xu Yang
    Joseph K. Liu
    Man Ho Au
    Soft Computing, 2017, 21 : 2643 - 2649