Activity Control Design Principles: Next Generation Access Control for Smart and Collaborative Systems

被引:11
作者
Park, Jaehong [1 ]
Sandhu, Ravi [2 ]
Gupta, Maanak [3 ]
Bhatt, Smriti [4 ]
机构
[1] Univ Alabama, Dept Management Mkt & Informat Syst, Huntsville, AL 35899 USA
[2] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
[3] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
[4] Purdue Univ, Dept Comp & Informat Technol, W Lafayette, IN 47907 USA
关键词
Access control; Internet of Things; Cloud computing; Collaboration; Biological system modeling; Computational modeling; Social networking (online); activity control; smart system; connected system; collaborative system; cyber physical systems; online social networking; security; privacy; CHALLENGES; SECURITY; INTERNET; PRIVACY; MODEL;
D O I
10.1109/ACCESS.2021.3126201
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, access control solutions have focused on how to utilize a specific type of decision parameter for access control decisions. While these "decision parameter"-focused approaches have been well accepted, they typically consider access control with centralized administration. Smart and collaborative computing systems (SCSs) such as online social networks, the Internet of Things (IoT) and connected cyber-physical systems (CPSs) require a disparate approach to meet their unique and complex access control requirements primarily because there are multiple participants who create, share, manage and protect resources (e.g., files, smart devices) individually, collaboratively or even competitively. A distinct feature of SCSs is the diffuse nature of control activities and their complex influence on other activities. Activity control (ACON) extends the scope of traditional access control models and considers how multiple administrative authorities (including users) can manage complex and interacting usage, service and control activities. In this paper, we articulate key characteristics and limitations of various existing access control models and highlight the significance and necessity of activity control in smart collaborative ecosystems. We then propose an extended ACON framework for catering to the needs of dynamic SCSs. Furthermore, we compare existing access control design principles and propose a set of activity control design principles for smart and collaborative computing systems. The proposed ACON framework and design principles will provide a solid foundation for secure SCS design and development.
引用
收藏
页码:151004 / 151022
页数:19
相关论文
共 58 条
[1]   PAX: Using Pseudonymization and Anonymization to Protect Patients' Identities and Data in the Healthcare System [J].
Al-Zubaidie, Mishall ;
Zhang, Zhongwei ;
Zhang, Ji .
INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2019, 16 (09)
[2]  
Alshehri A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P530, DOI [10.1109/CIC.2016.79, 10.1109/CIC.2016.081]
[3]  
[Anonymous], 2015, P IEEEACS 12 INT C C
[4]  
Bauer L, 2009, CHI2009: PROCEEDINGS OF THE 27TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, VOLS 1-4, P899
[5]   IoT Security A Comprehensive Life Cycle Framework [J].
Bertino, Elisa .
2019 IEEE 5TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC 2019), 2019, :196-203
[6]   Convergent Access Control to Enable Secure Smart Communities [J].
Bhatt, Smriti ;
Sandhu, Ravi .
2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, :148-156
[7]   An Access Control Framework for Cloud-Enabled Wearable Internet of Things [J].
Bhatt, Smriti ;
Patwa, Farhan ;
Sandhu, Ravi .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, :328-338
[8]   IoTGUARD: Dynamic Enforcement of Security and Safety Policy in Commodity IoT [J].
Celik, Z. Berkay ;
Tan, Gang ;
McDaniel, Patrick .
26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
[9]   An Access Control Model for Online Social Networks Using User-to-User Relationships [J].
Cheng, Yuan ;
Park, Jaehong ;
Sandhu, Ravi .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) :424-436
[10]  
Cheng Y, 2013, PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'13 COMPANION), P723