A trusted user-to-role and role-to-key access control scheme

被引:20
作者
Chen, Hsing-Chung [1 ,2 ]
机构
[1] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41354, Taiwan
[2] China Med Univ, China Med Univ Hosp, Dept Med Res, Taichung 40402, Taiwan
关键词
RSA; Akl; Trust; Role-based access control;
D O I
10.1007/s00500-015-1715-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The generalized trusted user-to-role assignment role-based access control (TURA-RBAC) scheme is first integrated and proposed in this paper, which is a new trusted role-based access control (RBAC) model. It could give a solution to cope with the problem on when many malicious users who want to launch insider threats (InTs) are assigned to an RBAC system. In the other words, the untrusted case is a type of InTs. The approach takes the advantages via soft computing approaches which are chosen by the system to evaluate each user in same interactive session. Upon finding some malicious access content, the user will be denied access to the role as well as the role-based RSA key. The main contributions are described as the following: first, this scheme designs a user-to-role assignment utilizing content awareness via soft computing techniques. Second, a novel generalization model of trusted RBAC is defined in this paper, which adds a new role-to-key assignment into the trusted RBAC model. Third, both the RSA algorithm and AKL approach are combined together into the role hierarchy structure in the TURA-RBAC model. Fourth, the dynamic change in role-to-key assignment in the role hierarchy is designed in this paper. In addition, the scheme provides a scheme that could achieve not only reduce the damage from InTs, but also easy implementation for trusted RBAC. In the end, the discussions, comparisons and security analyses are also presented in this paper.
引用
收藏
页码:1721 / 1733
页数:13
相关论文
共 25 条
[1]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[2]  
[Anonymous], 1992, 15 NAT COMP SEC C
[3]  
[Anonymous], 2013, EFF INC MAN INS SEC
[4]   Enhanced Role-Based Access Control for Cloud Security [J].
Balamurugan, B. ;
Krishna, P. Venkata .
ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 :837-852
[5]  
Cao J, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P719
[6]  
Chang Chin-Chen, 2004, P 18 INT C ADV INF N, V2, P123
[7]   A Role-based RSA Key Management Approach in a Hierarchy Scheme [J].
Chen, Hsing-Chung ;
Christiana, Anita .
2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, :258-264
[8]   Adaptive Access Control Scheme Utilizing Context Awareness in Pervasive Computing Environments [J].
Choi, Jung Hwan ;
Kang, Dong Hyun ;
Jang, Hyunsu ;
Eom, Young Ik .
2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, :491-498
[9]   ABAC and RBAC: Scalable, Flexible, and Auditable Access Management [J].
Coyne, Ed ;
Weil, Timothy R. .
IT PROFESSIONAL, 2013, 15 (03) :14-16
[10]  
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P120