Mobile Internet Access Control Strategy Based on Trust Perception

被引:1
|
作者
Chen, Lu [1 ,2 ]
Zhao, Xinjian [3 ]
Zhao, Ran [3 ]
Yuan, Guoquan [3 ]
Zhang, Song [3 ]
Chen, Shi [3 ]
Wu, Fan [4 ]
机构
[1] Global Energy Interconnect Res Inst, Inst Informat & Commun, Nanjing 210003, Peoples R China
[2] State Grid Key Lab Informat & Network Secur, Nanjing 210003, Peoples R China
[3] State Grid Jiangsu Elect Power Co, Nanjing 210003, Peoples R China
[4] Tuskegee Univ, Comp Sci Dept, Tuskegee, AL 36088 USA
关键词
Access control; Mobile internet; Trust perception; RBAC model; ABAC model;
D O I
10.1007/978-3-031-06791-4_47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years, the rapid development of mobile Internet services has greatly increased the complexity of network interaction. In the mobile Internet scenario, there are higher requirements for the dynamic and fine-grained access control. However, the existing access control strategy is mainly based on static access control mechanism, which cannot meet its needs. For this reason, this paper proposes a mobile internet access control strategy based on trust perception, which improves the outstanding problems of traditional access control methods such as not supporting dynamic authorization and coarse-grained. This strategy combines the advantages of both the role-based access control (RBAC) model and the attribute-based access control (ABAC) model. And introduce comprehensive trust evaluation to quantify user trust, and realize dynamic authorization and fine-grained access control based on trust perception. User trust consists of two parts: attribute trust and historical trust. Attribute trust is derived based on the user's attributes, and historical trust is calculated based on the user's historical access behavior. Finally, this article simulates the two most common attack methods, bleaching attack and betrayal attack. Comparative experiments show that the method proposed in this paper has better ability to resist bleaching attacks and betrayal attacks.
引用
收藏
页码:598 / 611
页数:14
相关论文
共 50 条
  • [1] Research of Workflow Access Control Strategy based on Trust
    Ma, Rui
    Xu, Linying
    Gao, Pengxiang
    2014 11th Web Information System and Application Conference (WISA), 2014, : 86 - 90
  • [2] A Fuzzy Approach to Trust Based Access Control in Internet of Things
    Mahalle, Parikshit N.
    Thakre, Pravin A.
    Prasad, Neeli Rashmi
    Prasad, Ramjee
    2013 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS (VITAE), 2013,
  • [3] Research on Trust-Based Access Control in The Internet of Things
    Cheng, Xiao-hui
    Hu, Meng
    Wang, Tong
    Deng, Yun
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (12): : 283 - 288
  • [4] Trust and Risk Based on Access Control Model in Social Internet of Things
    Zhang, Hongbin
    Liu, Jian
    Zhao, Dongmei
    Liu, Bin
    Wang, Yanmei
    Fan, Fan
    International Journal of Network Security, 2023, 25 (05) : 736 - 744
  • [5] A trust and attribute-based access control framework in internet of things
    Wang, Junshe
    Wang, Han
    Zhang, Hongbin
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2020, 12 (01) : 116 - 124
  • [6] A Model for Trust-Based Access Control and Delegation in Mobile Clouds
    Ray, Indrajit
    Mulamba, Dieudonne
    Ray, Indrakshi
    Han, Keesook J.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 242 - 257
  • [7] Study on Grid Access Control Strategy Based on Trust and Security Grade
    Liu, Yihe
    WEB INFORMATION SYSTEMS AND MINING, PT I, 2011, 6987 : 397 - +
  • [8] Trust and Attribute-based Dynamic Access Control Model For Internet of Things
    Wang, Junshe
    Wang, Han
    Zhang, Hongbin
    Cao, Ning
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 342 - 345
  • [9] Access Control Strategy for the Internet of Vehicles Based on Blockchain and Edge Computing
    Li, Leixiao
    Wan, Jianxiong
    Liu, Chuyi
    ELECTRONICS, 2023, 12 (19)
  • [10] Heterogeneous mobile network access control technology based on mutual trust mechanism
    Feng Wang
    Shaojiang Liu
    Weichuan Ni
    Zhiming Xu
    Zhiping Wan
    Peer-to-Peer Networking and Applications, 2019, 12 : 1489 - 1498