Risk-Aware Lightweight Data Access Control for Cloud-Assisted IIoT: A Zero-Trust Approach

被引:0
|
作者
Routray, Kasturi [1 ]
Bera, Padmalochan [1 ]
机构
[1] Indian Inst Technol Bhubaneswar, Bhuvaneswar, India
关键词
Access Control; Attribute-Based Encryption; Dynamic Access Policy; Policy Obfuscation; Zero-Trust Security Model;
D O I
10.1145/3672200.3673880
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement and applications of digital technologies in industries, a large number of IoT devices are connected to internet-assisted cloud services. In such settings, the system may suffer from various security threats where attackers can exploit devices with inadequate security capabilities, transforming them into compromised entry points. Traditional data security models rely on static access control mechanisms that fail to consider the dynamic requirements of the Industrial IoT (IIoT) environment. In addition, they assume internal devices are secure which may allow compromised devices to access sensitive information. Therefore, a robust, zero-trust security model is needed to prevent unauthorized access and data breaches in IIoT. In this poster, we propose a risk-aware access control framework utilizing zero-trust security principles to create and enforce dynamic and adaptive policies, thereby allowing access control mechanism to continuously evolve in response to emerging threats and changing contexts. Our framework employs ciphertext-policy attribute-based encryption (CP-ABE) to dynamically authorize access requests, ensuring fine-grained access control and eliminating the requirement for a trusted intermediary. Furthermore, region-specific fog servers are utilized to continuously monitor the dynamic behavioural and contextual attributes of users to detect security violations and provide feedback to update access policies based on current network conditions. Our framework obfuscates access policy attributes during data sharing to protect confidentiality and offloads computationally intensive decryption tasks from resource-constrained devices, enhancing its practicability for secure and efficient data access management in IIoT.
引用
收藏
页码:40 / 42
页数:3
相关论文
共 19 条
  • [1] Zero-trust based dynamic access control for cloud computing
    Ri Wang
    Chen Li
    Kun Zhang
    Bibo Tu
    Cybersecurity, 8 (1)
  • [2] Efficient Data Access Control With Fine-Grained Data Protection in Cloud-Assisted IIoT
    Qi, Saiyu
    Lu, Youshui
    Wei, Wei
    Chen, Xiaofeng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04): : 2886 - 2899
  • [3] Poster: Toward Zero-Trust Path-Aware Access Control
    Seaton, Joshua H.
    Hounsinou, Sena
    Wood, Timothy
    Xu, Shouhuai
    Brown, Philip N.
    Bloom, Gedare
    PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, : 267 - 269
  • [4] A Lightweight Trust-based Access Control Model in Cloud-Assisted Wireless Body Area Networks
    Wu, Xu
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 131 - 137
  • [5] Using Risk in Access Control for Cloud-Assisted eHealth
    Sharma, Meeta
    Bai, Yan
    Chung, Sam
    Dai, Lirong
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1047 - 1052
  • [6] A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT
    Sun, Jianfei
    Chen, Dajiang
    Zhang, Ning
    Xu, Guowen
    Tang, Mingjian
    Nie, Xuyun
    Cao, Mingsheng
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (12) : 10034 - 10046
  • [7] TIRIAC: A trust-driven risk-aware access control framework for Grid environments
    Nogoorani, Sadegh Dorri
    Jalili, Rasool
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 238 - 254
  • [8] SoK: Context and Risk Aware Access Control for Zero Trust Systems
    Xiao, Shiyu
    Ye, Yuhang
    Kanwal, Nadia
    Newe, Thomas
    Lee, Brian
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] A Trust-aware Access Control Policy for Cloud Data Protection
    Tang, Xiaoyong
    Li, Jinwei
    Liao, Guiping
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 40 - 44
  • [10] Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control
    Zhang, Kai
    Wang, Xiwen
    Ning, Jianting
    Gong, Junqing
    Huang, Xinyi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5286 - 5301