Enhancing Cross-Device Security with Fine-Grained Permission Control

被引:0
|
作者
Hu, Han [1 ]
Wang, Daibin [2 ]
Hong, Tailiang [2 ]
Zhang, Sheng [1 ]
机构
[1] Tsinghua Univ, Shenzhen Int Grad Sch, Key Lab Adv Sensor & Integrated Syst, Shenzhen 518055, Peoples R China
[2] Huawei Technol Co Ltd, Shenzhen, Peoples R China
关键词
Mobile device; Access control; Permission; Cross device; Operating system; ACCESS-CONTROL;
D O I
10.1007/978-3-031-64954-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of smart devices in personal and home environments, there is a growing need for cross-device interaction. However, distributed scenarios that cross device boundaries pose unique security and privacy challenges. While existing cross-device security mechanisms focus primarily on authentication, there is little research on fine-grained permission control. Permission models, which are critical security mechanisms for single devices, do not adequately support cross-device access control. To address this gap, we proposed and implemented a distributed role and attribute hybrid-based access control (DHBAC) model to enhance the security of cross-device access. DHBAC extends the single-device permission system to cross-device access control, providing fine-grained control based on users, devices, and applications. This approach effectively eliminates the over-authorization problem and supports the principle of least privilege. In addition, DHBAC can dynamically adjust and assign permissions based on specific scenarios and user requirements, improving the flexibility and adaptability of the system. To evaluate DHBAC, we deployed it on Harmony Operating System and tested it in several real-world, cross-device scenarios. Our evaluation shows that DHBAC effectively blocked malicious cross-device access and mitigated the associated security risks with acceptable system overhead.
引用
收藏
页码:101 / 121
页数:21
相关论文
共 50 条
  • [31] Fine-Grained Fault Tolerance using Device Checkpoints
    Kadav, Asim
    Renzelmann, Matthew J.
    Swift, Michael M.
    ACM SIGPLAN NOTICES, 2013, 48 (04) : 473 - 484
  • [32] Fine-grained device management in an interactive media server
    Rangaswami, R
    Dimitrijevic, Z
    Chang, E
    Chan, SHG
    IEEE TRANSACTIONS ON MULTIMEDIA, 2003, 5 (04) : 558 - 569
  • [33] Keyword Extraction for Fine-Grained IoT Device Identification
    Andrews, Ashley
    Oikonomou, George
    Armour, Simon
    Thomas, Paul
    Cattermole, Thomas
    2022 SEVENTH INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING, FMEC, 2022, : 79 - 85
  • [34] PreciseControl: Enhancing Text-to-Image Diffusion Models with Fine-Grained Attribute Control
    Parihar, Rishubh
    Sachidanand, V. S.
    Mani, Sabraswaran
    Karmali, Tejan
    Babu, R. Venkatesh
    COMPUTER VISION-ECCV 2024, PT LXXXII, 2025, 15140 : 469 - 487
  • [35] Wear's my Data? Understanding the Cross-Device Runtime Permission Model in Wearables
    Yeke, Doguhan
    Ibrahim, Muhammad
    Tuneay, Guliz Seray
    Farrukh, Habiba
    Imran, Abdullah
    Bianchi, Antonio
    Celik, Z. Berkay
    45TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP 2024, 2024, : 2404 - 2421
  • [36] Combined access control model embedding configurable policy for fine-grained data security
    Zhu, Lei
    He, Ping
    Hei, Xinhong
    Yao, Yanni
    Wang, Yichuan
    Ji, Wenjiang
    Zhao, Qin
    Pan, Long
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 75
  • [37] FMNISCF: Fine-Grained Multi-Domain Network Interconnection Security Control Framework
    Lu, Bo
    Cao, Ruohan
    Tian, Luyao
    Wang, Hao
    Lu, Yueming
    APPLIED SCIENCES-BASEL, 2020, 10 (01):
  • [38] Views: Synthesizing Fine-Grained Concurrency Control
    Demsky, Brian
    Lam, Patrick
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2013, 22 (01)
  • [39] Towards a fine-grained access control for Cloud
    Msahli, Mounira
    Chen, Xiuzhen
    Serhrouchni, Ahmed
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2014, : 286 - 291
  • [40] Fine-grained integration of access control policies
    Rao, Prathima
    Lin, Dan
    Bertino, Elisa
    Li, Ninghui
    Lobo, Jorge
    COMPUTERS & SECURITY, 2011, 30 (2-3) : 91 - 107