Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and Its Policies

被引:11
|
作者
Li, Fenghua [1 ,2 ]
Li, Zifu [1 ,2 ]
Han, Weili [3 ]
Wu, Ting [4 ]
Chen, Lihua [5 ]
Guo, Yunchuan [1 ]
Chen, Jinjun [6 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai 200433, Peoples R China
[4] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Zhejiang, Peoples R China
[5] Beijing Elect Sci & Technol Inst, Dept Informat Secur, Beijing 100070, Peoples R China
[6] Swinburne Univ Technol, Sch Software & Elect Engn, Melbourne, Vic 3122, Australia
基金
中国国家自然科学基金;
关键词
Cyberspace-oriented access control (CoAC); security policy; Z specification; CLOUD; RBAC;
D O I
10.1109/JIOT.2018.2839065
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices (e.g., mobile phones or laptops) to publish social messages, facilitate remote e-health diagnosis, or monitor a variety of surveillance. However, security insurance for these activities remains as a significant challenge. Representation of security purposes and their enforcement are two main issues in security of cyberspace. To address these challenging issues, we propose a cyberspace-oriented access control model (CoAC) for cyberspace whose typical usage scenario is as follows. Users leverage devices via network of networks to access sensitive objects with temporal and spatial limitations. We generalize subjects and objects in cyberspace and propose scene-based access control. To enforce security purposes, we argue that all operations on information in cyberspace are combinations of atomic operations. If every single atomic operation is secure, then the cyberspace is secure. Taking applications in the browser-server architecture as an example, we present seven atomic operations for these applications. A number of cases demonstrate that operations in these applications are combinations of introduced atomic operations. We also design a series of security policies for each atomic operation. Finally, we demonstrate both feasibility and flexibility of our CoAC model by examples.
引用
收藏
页码:1471 / 1483
页数:13
相关论文
共 50 条
  • [1] Cyberspace-Oriented Access Control: Model and Policies
    Li, Fenghua
    Li, Zifu
    Han, Weili
    Wu, Ting
    Chen, Lihua
    Guo, Yunchuan
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 261 - 266
  • [2] Novel cyberspace-oriented access control model
    Li F.-H.
    Wang Y.-C.
    Yin L.-H.
    Xie R.-N.
    Xiong J.-B.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (05): : 9 - 20
  • [3] A Service Access Security Control Model in Cyberspace
    Li Qianmu
    Yin Jie
    Hou Jun
    Xu Jian
    Zhang Hong
    Qi Yong
    INTELLIGENT COMPUTING AND INFORMATION SCIENCE, PT I, 2011, 134 (0I): : 434 - +
  • [4] Regulating cyberspace: The policies and technologies of control
    Smillie, K
    IEEE ANNALS OF THE HISTORY OF COMPUTING, 2004, 26 (04) : 77 - 77
  • [5] Regulating cyberspace: The policies and technologies of control
    Landgraf, LM
    JOURNAL OF GOVERNMENT INFORMATION, 2002, 29 (05): : 340 - 342
  • [6] Research on the Cyberspace Map and Its Conceptual Model
    Zhang, Lan
    Wang, Guangxia
    You, Xiong
    Liu, Zhiyong
    Ma, Lin
    Tian, Jiangpeng
    Su, Mingzhan
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2023, 12 (09)
  • [7] Process oriented and model-supported teaching system in the cyberspace
    Gati, Jozsef
    Kartyas, Gyula
    2007 INTERNATIONAL SYMPOSIUM ON LOGISTICS AND INDUSTRIAL INFORMATICS, 2007, : 150 - 154
  • [8] Research and Construction Model of Cyberspace Based on Hypergraph
    Peng, Cheng
    PROCEEDINGS OF THE 2016 5TH INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS AND COMPUTER SCIENCE, 2016, 80 : 454 - 459
  • [9] Characteristics-based model predictive control of distributed parameter systems
    Shang, HL
    Forbes, JF
    Guay, M
    PROCEEDINGS OF THE 2002 AMERICAN CONTROL CONFERENCE, VOLS 1-6, 2002, 1-6 : 4383 - 4388
  • [10] Prediction of Cyberspace Security Data Based on the Markov Chain Model
    Zhang X.
    Applied Mathematics and Nonlinear Sciences, 2023, 8 (02) : 2539 - 2548