Collaboration IoT-Based RBAC with Trust Evaluation Algorithm Model for Massive IoT Integrated Application

被引:24
作者
Chen, Hsing-Chung [1 ,2 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[2] China Med Univ, China Med Univ Hosp, Dept Med Res, Taichung, Taiwan
关键词
Role-based access control; RBAC; Cooperative RBAC; Collaboration IoT-based RBAC; Internet of things; Cooperative trust evaluation; Massive IoT application; ACCESS-CONTROL;
D O I
10.1007/s11036-018-1085-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the recent advances in ubiquitous communications and the growing demand for low-power wireless technology, smart IoT device (SID) to access various Internet of Things (IoT) resources through Internet at any time and place alternately. There are some new requirements for integration IoT servers in which each one is individually gathering its local resources in Internet, which cooperatively supports SID to get some flexibility or temporary contract(s) and privileges in order to access their corresponding desired service(s) in a group of collaboration IoT servers. However, traditional access control schemes designed for a single server are not sufficient to handle such applications across multiple collaboration IoT servers to get rich services in IoT environments. It does not take into account both security and efficiency of IoT servers, which securely share their resources. Therefore, the collaboration IoT-based RBAC (Role-based Access Control) with trust evaluation (TE) algorithm model to reducing internal security threats in intra-server and inter server for the massive IoT integrated application is proposed in this paper. Finally, the three trust evaluation algorithms including a local trust evaluation algorithm, a virtual trust evaluation algorithm and a cooperative trust evaluation algorithm in the proposed collaboration IoT-based RBAC model, which are designed and presented for reducing internal security threats in collaborative IoT servers.
引用
收藏
页码:839 / 852
页数:14
相关论文
共 21 条
[1]  
5G Americas, 2017, LTE Progress Leading to the 5G Massive Internet of Things
[2]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[3]   Enhanced Role-Based Access Control for Cloud Security [J].
Balamurugan, B. ;
Krishna, P. Venkata .
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 :837-852
[4]  
Cardoza C, 2017, SD TIMES 0125
[5]  
Chen H.-C., 2014, J INTERNET SERV INF, V4, P52
[6]  
Chen H-C, 2017, P IOTAAS 2017 3 EAI
[7]  
Chen HC, 2017, CONSUM COMM NETWORK, P120, DOI 10.1109/CCNC.2017.7983092
[8]   A negotiation-based cooperative RBAC scheme [J].
Chen, Hsing-Chung .
INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2017, 13 (01) :94-111
[9]   TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks [J].
Chen, Hsing-Chung .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :449-459
[10]   A trusted user-to-role and role-to-key access control scheme [J].
Chen, Hsing-Chung .
SOFT COMPUTING, 2016, 20 (05) :1721-1733