Fuzzy Logic with Expert Judgment to Implement an Adaptive Risk-Based Access Control Model for IoT

被引:32
作者
Atlam, Hany F. [1 ,2 ]
Walters, Robert J. [1 ]
Wills, Gary B. [1 ]
Daniel, Joshua [3 ]
机构
[1] Univ Southampton, Elect & Comp Sci Dept, Southampton, Hants, England
[2] Menoufia Univ, Fac Elect Engn, Comp Sci & Engn Dept, Menoufia, Egypt
[3] BT Res & Innovat, Secur Futures Practice, Ipswich, Suffolk, England
关键词
Security risk; Internet of Things; Adaptive access control; Context; Fuzzy logic; Expert judgment; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1007/s11036-019-01214-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is becoming the future of the Internet with a large number of connected devices that are predicted to reach about 50 billion by 2020. With proliferation of IoT devices and need to increase information sharing in IoT applications, risk-based access control model has become the best candidate for both academic and commercial organizations to address access control issues. This model carries out a security risk analysis on the access request by using IoT contextual information to provide access decisions dynamically. This model solves challenges related to flexibility and scalability of the IoT system. Therefore, we propose an adaptive risk-based access control model for the IoT. This model uses real-time contextual information associated with the requesting user to calculate the security risk regarding each access request. It uses user attributes while making the access request, action severity, resource sensitivity and user risk history as inputs to analyze and calculate the risk value to determine the access decision. To detect abnormal and malicious actions, smart contracts are used to track and monitor user activities during the access session to detect and prevent potential security violations. In addition, as the risk estimation process is the essential stage to build a risk-based model, this paper provides a discussion of common risk estimation methods and then proposes the fuzzy inference system with expert judgment as to be the optimal approach to handle risk estimation process of the proposed risk-based model in the IoT system.
引用
收藏
页码:2545 / 2557
页数:13
相关论文
共 55 条
[1]  
Alberts C.J., 2002, MANAGING INFORM SECU
[2]  
[Anonymous], 2000, FUZZY SETS FUZZY INF
[3]  
[Anonymous], 2012, Ser. Y Glob. Inf. infrastructure, P22, DOI DOI 11.1002/1000/11559
[4]  
[Anonymous], 2018, P 3 INT C INT THINGS
[5]  
[Anonymous], 2018, 2018 IEEE MTT S INT
[6]  
[Anonymous], 2005, Itu Internet Rep. 2005, P212, DOI [10.2139/ssrn.2324902, DOI 10.2139/SSRN.2324902]
[7]  
Ashton K, 2009, RFID J, P4986, DOI DOI 10.1145/2967977
[8]   Integration of Cloud Computing with Internet of Things: Challenges and Open Issues [J].
Atlam, Hany F. ;
Alenezi, Ahmed ;
Alharthi, Abdulrahman ;
Walters, Robert J. ;
Wills, Gary B. .
2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, :670-675
[9]   An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things [J].
Atlam, Hany F. ;
Alenezi, Ahmed ;
Walters, Robert J. ;
Wills, Gary B. .
IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, :254-260
[10]  
Atlam Hany F., 2018, Big Data and Cognitive Computing, V2, P10, DOI DOI 10.3390/BDCC2020010