The HABAC Model for Smart Home IoT and Comparison to EGRBAC

被引:11
作者
Ameer, Safwa [1 ]
Sandhu, Ravi
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
来源
SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS | 2021年
基金
美国国家科学基金会;
关键词
INTERNET;
D O I
10.1145/3445969.3450428
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification and enforcement models. Recently, several access control models have been developed or adapted for IoT in general, with a few specifically designed for the smart home IoT domain. The majority of these models are built on role-based access control (RBAC) or attribute-based access control (ABAC) models which have had considerable traction in traditional non-IoT domains. In this paper, we introduce the smart home IoT attribute-based access control model (HABAC). HABAC is a dynamic and fine-grained model that is developed specifically to meet smart home IoT challenges. Currently it is not precisely clear what are the pros and cons of ABAC over RBAC in general, and in smart home IoT in particular. To this end we provide an analysis of HABAC relative to the previously published EGRBAC (extended generalized role based access control) model for smart home IoT. We compare the theoretical expressive power of these models by providing algorithms for converting an HABAC specification to EGRBAC and vice versa, and discuss the insights for practical deployment of these models resulting from these constructions. We conclude that a hybrid model combining ABAC and RBAC features may be the most suitable for smart home IoT, and likely more generally.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 44 条
[1]   Blockchain based permission delegation and access control in Internet of Things (BACI) [J].
Ali, Gauhar ;
Ahmad, Naveed ;
Cao, Yue ;
Asif, Muhammad ;
Cruickshank, Haitham ;
Ali, Qazi Ejaz .
COMPUTERS & SECURITY, 2019, 86 :318-334
[2]  
Alramadhan Mousa., 2017, 2017 26 INT C COMP
[3]  
Ameer S., 2020, 2020 IEEE 21 INT C I
[4]  
[Anonymous], INTERNET THINGS
[5]   Privacy and Security in Internet of Things and Wearable Devices [J].
Arias, Orlando ;
Wurm, Jacob ;
Khoa Hoang ;
Jin, Yier .
IEEE TRANSACTIONS ON MULTI-SCALE COMPUTING SYSTEMS, 2015, 1 (02) :99-109
[6]  
Bandara S, 2016, ASIA-PAC CONF COMMUN, P210, DOI 10.1109/APCC.2016.7581479
[7]  
Barka Ezedine., 2015, C2SI
[8]  
Bezawada Bruhadeshwar., 2018, P 3 ACM WORKSHOP ATT
[9]   ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things [J].
Bhatt, Smriti ;
Sandhu, Ravi .
SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, :203-212
[10]  
Covington M. J., 2000, GEN ROLEBASED ACCESS