Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications

被引:2
|
作者
Arora, Chahal [1 ]
Rizvi, Syed Zain R. [1 ]
Fong, Philip W. L. [1 ]
机构
[1] Univ Calgary, Calgary, AB, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Access control model; Relationship-Based Access Control; transient relationship; temporality; Allen relation; policy language; graph matching; graph database; Constraint Satisfaction Problem;
D O I
10.1145/3532105.3535026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberphysical systems involve connected devices that are physically embedded. These devices enter into transient relationships with one another and with the environment. We propose an access control model, HO(T)-ReBAC, for facilitating access control in such dynamic environments. Specifically, HO(T)-ReBAC bases its authorization decisions on the history of relationship changes. We demonstrate the usefulness of this model in a case study on a Medical Internet-of-Things application. We extend a recently proposed graph matching algorithm to handle temporality in our model, thereby yielding an efficient authorization mechanism, the performance of which has been evaluated empirically. This model is the first instantiation of a general idea, Higher-Order Relationship-Based Access Control, that we have been developing.
引用
收藏
页码:223 / 234
页数:12
相关论文
共 50 条
  • [1] Attributes Aware Relationship-based Access Control for Smart IoT Systems
    Praharaj, Lopamudra
    Ameer, Safwa
    Gupta, Maanak
    Sandhu, Ravi
    [J]. 2022 IEEE 8TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING, CIC, 2022, : 72 - 81
  • [2] An Administrative Model for Relationship-Based Access Control
    Stoller, Scott D.
    [J]. Data and Applications Security and Privacy XXIX, 2015, 9149 : 53 - 68
  • [3] Mining Relationship-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Li, Jiajie
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 239 - 246
  • [4] Policy templates for relationship-based access control
    Aktoudianakis, Evangelos
    Crampton, Jason
    Schneider, Steve
    Treharne, Helen
    Waller, Adrian
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 221 - 228
  • [5] Active Learning of Relationship-Based Access Control Policies
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
  • [6] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [7] Performance analysis of Relationship-Based Access Control in OSNs
    Carminati, Barbara
    Ferrari, Elena
    Girardi, Jacopo
    [J]. 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 449 - 456
  • [8] Relationship-based access control: More than a social network access control model
    Lobo, Jorge
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2019, 9 (02)
  • [9] HoBAC: toward a Higher-order Attribute-Based Access Control Model
    Aliane, Linda
    Adda, Mehdi
    [J]. 16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 : 303 - 310
  • [10] Classifying and Comparing Attribute-Based and Relationship-Based Access Control
    Ahmed, Tahmina
    Sandhu, Ravi
    Park, Jaehong
    [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 59 - 70