Explore chapters and articles related to this topic
Security Challenges and Mitigation Approaches for Smart Cities
Published in Naveen Chilamkurti, T. Poongodi, Balamurugan Balusamy, Blockchain, Internet of Things, and Artificial Intelligence, 2021
S. Ponmaniraj, Tapas Kumar, V. Gokul Rajan, Sanjay Sharma
Nowadays, all smart devices have an advanced security mechanism to authenticate functions. Even human identification and recognition using sclera also was developed for authenticating the legal user [20]. Once authentication is verified and validated at the edge network’s devices such as gateways, sensor networks, or at the local access control network the user is verified with an assigned role for accessing any functions. In a ubiquitous networks structure, every function is consigned with roles. To access those specific applications, each user is verified with role-based access control. Based on the activity, access control is split into three broad areas as listed next [21].Discretionary access control (DAC): In which roles are assigned by an administrator to users in order to access resources.Role-based access control (RBAC): In which roles are assigned to perform the specific task-based role activities.Attribute-based access control (ABAC): In which rights are sanctioned to evaluate user rights attributes, handle resources requested, and identify that from where the request is made.
Foundations of Attribute-Based Encryption
Published in Dijiang Huang, Qiuxiang Dong, Yan Zhu, Attribute-Based Encryption and Access Control, 2020
Dijiang Huang, Qiuxiang Dong, Yan Zhu
Attribute-Based Access Control (ABAC) is an emerging form of access control that is starting to garner interest in both recent academic literature and industry applications [86]. While there is currently no single agreed-upon model or standardization of ABAC, there are commonly accepted high-level definitions and descriptions of its functions. One such high-level description is given in National Institute of Standards and Technology (NIST)’s publication, Guide to Attribute Based Access Control (ABAC) Definition and Considerations [107]. Attribute-Based Access Control: An access control method where subject requests to perform operations on objects are granted or denied based on assigned attributes of the subject, assigned attributes of the object, environmental conditions, and a set of policies that are specified in terms of those attributes and conditions.
Securing Cloud Data
Published in Olivier Terzo, Lorenzo Mossucca, Cloud Computing with e-Science Applications, 2017
Access control techniques are mainly of three types: user-based access control (UBAC), role-based access control (RBAC), and attribute-based access control (ABAC). In UBAC, the access control list (ACL) contains the list of authorized users. This is not feasible in clouds where there are many users. Sometimes, the list of users is unknown. In RBAC (introduced in [11]), users are classified based on their individual roles. Data can be accessed by users who have matching roles, which are defined by the system. For example, in the case of medical records, the personal information regarding insurance and address might be available only to the hospital staff but not to the doctors and nurses. ABAC is wider in scope; users are given attributes, and the data have an attached access policy. Only users with a valid set of attributes, satisfying the access policy, can access the data. For instance, in the example, medical records are accessed by only the neurologist or psychiatrist in only one hospital but no others. Some advantages and disadvantages of RBAC and ABAC have been discussed [22]. Most of the work in ABAC makes use of a cryptographic primitive known as the ABE.
Ethereum Blockchain-Based Authentication Approach for Data Sharing in Cloud Storage Model
Published in Cybernetics and Systems, 2023
Geethu Mary George, L. S. Jayashree
Access Control models (Rouhani and Deters 2019) are utilized in the security of computer systems for regulating the access to adapt precious resources like computational models, data, space for storage, and services. In (Wang, Zhang, and Zhang 2018), Attribute-based Access Control (ABAC) is devised that contains a set of policies for describing the features, resources, environment, and subjects contained in access requests. Amongst subject parameters, other attributes are included like company ID, project name and count of resources, and so on (Maesa, Mori, and Ricci 2017). The block records accumulate reception for linking the previous blocks and the new block is linked with the ledger for messages that pass authentication by different participants (Liu, Zhang, and Yang 2018). The attribute-based encryption (Sahai and Waters 2005; ABE) was devised for providing mutual authentication based on the encryption strategies. With this method, the data owner identifies the data access policies using attributes and user identities for attaining effective access control over datasets. Approximately, ABE encryption methods need a trusted private key generator (PKG; Bai and Hao 2020) for setting the system and for distributing consequent secret keys to the users (Wang, Zhang, and Zhang 2018).
Crowd review and attribute-based credit computation for an access control mechanism in cloud data centers
Published in International Journal of Computers and Applications, 2023
Ajay Kumar Dubey, Vimal Mishra
The basic idea of ABAC is that the subject (e.g. user, application, services, etc.) request any object or resources (e.g. file, printer, network devices, database, etc.) in a system. The accession of that object depends on the attributes or characteristics of the subject. The access control decision is taken on the basis of authorization policy. The ABAC authorization policies are a set of rules defined, on the basis of subject, object, and contextual attributes. The subject attributes represent the properties of the subject, namely name, age, address, title, date of birth, etc., and object attributes represent the properties of object, namely type, owner, etc. The contextual attributes are dynamic factors, independent of subject and object attributes, namely time, location, temperature, etc.
Flexible, decentralised access control for smart buildings with smart contracts
Published in Cyber-Physical Systems, 2022
Leepakshi Bindra, Kalvin Eng, Omid Ardakanian, Eleni Stroulia
Attribute-based access control grants access rights to users through the use of policies that combine together (with logical operators) different user, resource, object, and environment attributes [10]. In our work, we adopt this paradigm to develop a cost function that represents the sensitivity of building spaces based on their function and equipment they contain. A room with many control points, occupied by an employee in a position of authority in the organisation, is more sensitive (and is, therefore, associated with a higher cost) than the building’s reception for example. In principle, this cost function enables access-control policies to be defined based on sensitivity ranges. It also enables one to reason about the relative sensitivity of spaces and rationalise the access-granting process.