Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model

被引:6
作者
Atlam, Hany F. [1 ,2 ]
Azad, Muhammad Ajmal [1 ]
Fadhel, Nawfal F. [3 ]
机构
[1] Univ Derby, Sch Comp & Engn, Derby DE22, England
[2] Menoufia Univ, Comp Sci Engn Dept, Fac Elect Engn, Menoufia 32952, Egypt
[3] Univ Southampton, Elect & Comp Sci Dept, Southampton SO17 1BJ, Hants, England
关键词
risk estimation; NFS model; Internet of Things; security risk; risk-based access control; NEURAL-NETWORKS; ALGORITHM; SECURITY; ANFIS;
D O I
10.3390/s22052005
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Providing a dynamic access control model that uses real-time features to make access decisions for IoT applications is one of the research gaps that many researchers are trying to tackle. This is because existing access control models are built using static and predefined policies that always give the same result in different situations and cannot adapt to changing and unpredicted situations. One of the dynamic models that utilize real-time and contextual features to make access decisions is the risk-based access control model. This model performs a risk analysis on each access request to permit or deny access dynamically based on the estimated risk value. However, the major issue associated with building this model is providing a dynamic, reliable, and accurate risk estimation technique, especially when there is no available dataset to describe risk likelihood and impact. Therefore, this paper proposes a Neuro-Fuzzy System (NFS) model to estimate the security risk value associated with each access request. The proposed NFS model was trained using three learning algorithms: Levenberg-Marquardt (LM), Conjugate Gradient with Fletcher-Reeves (CGF), and Scaled Conjugate Gradient (SCG). The results demonstrated that the LM algorithm is the optimal learning algorithm to implement the NFS model for risk estimation. The results also demonstrated that the proposed NFS model provides a short and efficient processing time, which can provide timeliness risk estimation technique for various IoT applications. The proposed NFS model was evaluated against access control scenarios of a children's hospital, and the results demonstrated that the proposed model can be applied to provide dynamic and contextual-aware access decisions based on real-time features.
引用
收藏
页数:23
相关论文
共 51 条
[11]   Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System [J].
Bera, Basudeb ;
Saha, Sourav ;
Das, Ashok Kumar ;
Vasilakos, Athanasios V. .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (07) :5744-5761
[12]   Performance Evaluation of Neural Networks for Animal Behaviors Classification: Horse Gaits Case Study [J].
Cerezuela-Escudero, E. ;
Rios-Navarro, A. ;
Dominguez-Morales, Juan P. ;
Tapiador-Morales, R. ;
Gutierrez-Galan, D. ;
Martin-Canal, C. ;
Linares-Barranco, A. .
DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, (DCAI 2016), 2016, 474 :377-385
[13]   Speeding up the scaled conjugate gradient algorithm and its application in neuro-fuzzy classifier training [J].
Cetisli, Bayram ;
Barkana, Atalay .
SOFT COMPUTING, 2010, 14 (04) :365-378
[14]   A Dynamic Risk-based Access Control Model for Cloud Computing [J].
Chen, Aiguo ;
Xing, Hanwen ;
She, Kun ;
Duan, Guiduo .
PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, :579-584
[15]   Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract [J].
Cheng, Pau-Chen ;
Rohatgi, Pankaj ;
Keser, Claudia ;
Karger, Paul A. ;
Wagner, Grant M. ;
Reninger, Angela Schuett .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :222-+
[16]   A Framework for Context Sensitive Risk-Based Access Control in Medical Information Systems [J].
Choi, Donghee ;
Kim, Dohoon ;
Park, Seog .
COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2015, 2015
[17]  
Chung K.-C., 2008, International Journal of Business and Management, V3, P19
[18]  
Diep Nguyen Ngoc, 2007, Proceedings of the 2007 International Conference on Security & Management. SAM 2007, P406
[19]  
Diep NN, 2007, ECUMN 2007: FOURTH EUROPEAN CONFERENCE ON UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, P419
[20]  
dos Santos DR, 2014, IEEE IFIP NETW OPER