Game Analysis of Access Control Based on User Behavior Trust

被引:11
作者
Wang, Yan [1 ,2 ]
Tian, Liqin [3 ]
Chen, Zhenguo [3 ]
机构
[1] QingHai Normal Univ, Dept Comp, Xining 810008, Qinghai, Peoples R China
[2] Qinghai Nationalities Univ, Coll Phys & Elect Informat Engn, Xining 810007, Qinghai, Peoples R China
[3] North China Inst Sci & Technol, Dept Comp, Beijing 101601, Peoples R China
关键词
access control; user behavior trust; game theory; prisoner's dilemma; MODEL;
D O I
10.3390/info10040132
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will also be greater once cheating access is adopted. A general access control game model that can reflect both trust and risk is established in this paper. First, we construct an access control game model with user behavior trust between the user and the service provider, in which the benefits and losses are quantified by using adaptive regulatory factors and the user's trust level, which enhances the rationality of the policy making. Meanwhile, we present two kinds of solutions for the prisoner's dilemma in the traditional access control game model without user behavior trust. Then, due to the vulnerability of trust, the user's trust value is updated according to the interaction situation in the previous stage, which ensures that the updating of the user's trust value can satisfy the slow rising-fast falling principle. Theoretical analysis and the simulation experiment both show that this model has a better performance than a traditional game model and can guarantee scientific decision-making in the access control mechanism.
引用
收藏
页数:13
相关论文
共 27 条
[1]  
Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
[2]  
[Anonymous], 1973, SECURE COMPUTER SYST
[3]  
[Anonymous], P IEEE S SEC PRIV OA
[4]  
Baracaldo N., 2012, P 17 ACM S ACCESS CO, P167
[5]   A trust-based context-aware access control model for Web-services [J].
Bhatti, R ;
Bertino, E ;
Ghafoor, A .
DISTRIBUTED AND PARALLEL DATABASES, 2005, 18 (01) :83-105
[6]  
Bijon KhalidZaman., 2012, Information Systems Security, P59
[7]  
Chakraborty S., 2006, SACMAT 2006. Proceedings of Eleventh ACM Symposium on Access Control Models and Technologies, P49
[8]   Dynamic counter-measures for risk-based access control systems: An evolutive approach [J].
Diaz-Lopez, Daniel ;
Dolera-Tormo, Gines ;
Gomez-Marmol, Felix ;
Martinez-Perez, Gregorio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 :321-335
[9]   A framework and risk assessment approaches for risk-based access control in the cloud [J].
dos Santos, Daniel Ricardo ;
Marinho, Roberto ;
Schmitt, Gustavo Roecker ;
Westphall, Carla Merkle ;
Westphall, Carlos Becker .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 74 :86-97
[10]  
Graham G.S., 1972, P SPRING JOINT COMP