The HABAC Model for Smart Home IoT and Comparison to EGRBAC

被引:11
作者
Ameer, Safwa [1 ]
Sandhu, Ravi
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
来源
SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS | 2021年
基金
美国国家科学基金会;
关键词
INTERNET;
D O I
10.1145/3445969.3450428
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the near future IoT will be part of every home turning our houses into smart houses, in which we have multiple users with complex social relationships between them using the same smart devices. This requires sophisticated access control specification and enforcement models. Recently, several access control models have been developed or adapted for IoT in general, with a few specifically designed for the smart home IoT domain. The majority of these models are built on role-based access control (RBAC) or attribute-based access control (ABAC) models which have had considerable traction in traditional non-IoT domains. In this paper, we introduce the smart home IoT attribute-based access control model (HABAC). HABAC is a dynamic and fine-grained model that is developed specifically to meet smart home IoT challenges. Currently it is not precisely clear what are the pros and cons of ABAC over RBAC in general, and in smart home IoT in particular. To this end we provide an analysis of HABAC relative to the previously published EGRBAC (extended generalized role based access control) model for smart home IoT. We compare the theoretical expressive power of these models by providing algorithms for converting an HABAC specification to EGRBAC and vice versa, and discuss the insights for practical deployment of these models resulting from these constructions. We conclude that a hybrid model combining ABAC and RBAC features may be the most suitable for smart home IoT, and likely more generally.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 44 条
[41]  
Ur Blase., 2013, HUPS
[42]  
Xie YP, 2015, 2015 IEEE 82ND VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL)
[43]   An Efficient Authentication and Access Control Scheme for Perception Layer of Internet of Things [J].
Ye, Ning ;
Zhu, Yan ;
Wang, Ru-chuan ;
Malekian, Reza ;
Lin Qiao-min .
APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (04) :1617-1624
[44]  
Zhang Guoping, 2011, Journal of Software, V6, P724, DOI 10.4304/jsw.6.4.724-731