A Fine-grained Dynamic Access Control Method for Power IoT Based on Kformer

被引:3
作者
Qiu, Rixuan [1 ,2 ]
Xue, Xue [1 ]
Chen, Mingliang [3 ]
Zheng, Jinkun [2 ]
Jing, Sitong [4 ]
Li, Yuancheng [1 ]
机构
[1] North China Elect Power Univ, Sch Control & Comp Engn, Beijing, Peoples R China
[2] State Grid Jiangxi Elect Power Supply Co Ltd, Informat & Telecommun Branch, Ganzhou, Peoples R China
[3] State Grid Jiangxi Elect Power Co Ltd, Ganzhou, Peoples R China
[4] PowerChina Jiangxi Elect Power Engn Co Ltd, Nanchang, Jiangxi, Peoples R China
来源
INFOCOMMUNICATIONS JOURNAL | 2022年 / 14卷 / 04期
关键词
ABAC; Dynamic Authorization; Kformer; Knowledge Injection; Access Control Policy;
D O I
10.36244/ICJ.2022.4.11
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The existing static ABAC(Attribute-Based Access Control) model cannot fully meet the increasingly complex, dynamic and scalable demands of the power grid. At the same time, its versatility and flexibility bring high costs. Additionally, the increasing complexity of organizational systems and the need for federated access to their resources make implementing and managing access control more challenging. This paper proposes a fine-grained dynamic access control method based on Kformer to automate authorization management tasks. We use Kformer, which filters and integrates external knowledge through feed-forward layers in Transformer. Then, we use BERT(Bidirectional Encoder Representations from Transformer) to perform feature extraction on the input fused text, extract the implied attribute-authority relationship from the log records and external documents, and finally, perform sequence modeling on the extracted attribute features and input the obtained results. The final authorization result is obtained by classification through the softmax function in the final fully connected layer. The authorization management of the users request to the object is dynamically completed. Finally, using the access data of the grid information system to evaluate the method proposed by us, the experimental results show that the model can continuously monitor the access behavior of users inside the grid information system, change the access rights of entities and adjust the policy in real-time, and carry out dynamic access authorization. At the same time, the accuracy of the generated access control policy can reach 87.73%.
引用
收藏
页码:79 / 85
页数:7
相关论文
共 21 条
[1]   A Scalable Role Mining Approach for Large Organizations [J].
Abolfathi, Masoumeh ;
Jafarian, Haadi ;
Raghebi, Zohreh ;
Banaei-Kashani, Farnoush .
PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURITY AND PRIVACY ANALYTICS, IWSPA 2021, 2021, :45-54
[2]   Polisma - A Framework for Learning Attribute-Based Access Control Policies [J].
Abu Jabal, Amani ;
Bertino, Elisa ;
Lobo, Jorge ;
Law, Mark ;
Russo, Alessandra ;
Calo, Seraphin ;
Verma, Dinesh .
COMPUTER SECURITY - ESORICS 2020, PT I, 2020, 12308 :523-544
[3]   Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints [J].
Blundo, Carlo ;
Cimato, Stelvio ;
Siniscalchi, Luisa .
COMPUTER JOURNAL, 2022, 65 (06) :1386-1411
[4]  
Devlin J, 2019, 2019 CONFERENCE OF THE NORTH AMERICAN CHAPTER OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS: HUMAN LANGUAGE TECHNOLOGIES (NAACL HLT 2019), VOL. 1, P4171
[5]   The Secrecy Resilience of Access Control Policies and Its Application to Role Mining [J].
Guo, Qiang ;
Tripunitara, Mahesh .
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, :115-126
[6]  
Hao YR, 2021, AAAI CONF ARTIF INTE, V35, P12963
[7]   PROTECTION IN OPERATING-SYSTEMS [J].
HARRISON, MA ;
RUZZO, WL ;
ULLMAN, JD .
COMMUNICATIONS OF THE ACM, 1976, 19 (08) :461-470
[8]  
Hu VincentC., 2013, NIST SPECIAL PUBLICA, V800, P162, DOI DOI 10.6028/NIST.SP.800-162
[9]   Mining Positive and Negative Attribute-Based Access Control Policy Rules [J].
Iyer, Padmavathi ;
Masoumzadeh, Amirreza .
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, :161-172
[10]   An Automatic Attribute-Based Access Control Policy Extraction From Access Logs [J].
Karimi, Leila ;
Aldairi, Maryam ;
Joshi, James ;
Abdelhakim, Mai .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) :2304-2317