| Literature DB >> 34084919 |
Muhammad Umar Aftab1,2, Ariyo Oluwasanmi3, Abdullah Alharbi4, Osama Sohaib5, Xuyun Nie1,3, Zhiguang Qin1,3, Son Tung Ngo6.
Abstract
Today, the trend of the Internet of Things (IoT) is increasing through the use of smart devices, vehicular networks, and household devices with internet-based networks. Specifically, the IoT smart devices and gadgets used in government and military are crucial to operational success. Communication and data sharing between these devices have increased in several ways. Similarly, the threats of information breaches between communication channels have also surged significantly, making data security a challenging task. In this context, access control is an approach that can secure data by restricting unauthorized users. Various access control models exist that can effectively implement access control yet, and there is no single state-of-the-art model that can provide dynamicity, security, ease of administration, and rapid execution all at once. In combating this loophole, we propose a novel secure and dynamic access control (SDAC) model for the IoT networks (smart traffic control and roadside parking management). Our proposed model allows IoT devices to communicate and share information through a secure means by using wired and wireless networks (Cellular Networks or Wi-Fi). The effectiveness and efficiency of the proposed model are demonstrated using mathematical models and discussed with many example implementations.Entities:
Keywords: Attributed RBAC; Dynamic access control; Machine learning; Secure IoT; Social computing
Year: 2021 PMID: 34084919 PMCID: PMC8157252 DOI: 10.7717/peerj-cs.471
Source DB: PubMed Journal: PeerJ Comput Sci ISSN: 2376-5992
Figure 1Different devices connected through internet in IoT based systems.
Figure 2Multiple permission creation process by using object containers and action levels.
Figure 3A glimpse of the traffic signal attack and traffic jam.
Figure 4Customize attributed permissions.
Figure 5Secure and dynamic access control.
Figure 6A view of attributed-permissions to attributed-roles assignment.
Figure 7Flow chart of the SDAC model.
Object containers and action levels.
| Object name | Attribute | Object container | Action name | Attribute | Action level |
|---|---|---|---|---|---|
| File1.txt | Location | Container1 | Read, Write, Edit | Time & Username | Level1 |
| File2.exe | Location | Container2 | Read, Download, Delete | Username & Date | Level2 |
| File3.ppt | Location | Container3 | Delete, Write, Submit | Location & Designation | Level3 |
| File4.doc | Date & Time | Container3 | Delete, Write, Submit | Location & Designation | Level3 |
| File5.xlsx | Date & Time | Container3 | Delete, Write, Submit | Location & Designation | Level3 |
Permissions assignment to roles and roles to users.
| Permission name | Permission description | Permissions attributes | Role name | Role attributes | Users | Attributes of users |
|---|---|---|---|---|---|---|
| Prms1 | Read, File1.txt | Location | Role1 | Location | User1,…User7 | Location |
| Prms2 | Write, File1.txt | Location | Role1 | Location | User1,…User7 | Location |
| Prms3 | Edit, File1.txt | Location | Role1 | Location | User1,…User7 | Location |
| Prms4 | Read, File2.exe | Location | Role1 | Location | User1,…User7 | Location |
| Prms5 | Download, File2.exe | Location | Role1 | Location | User1,…User7 | Location |
| Prms6 | Delete, File2.exe | Location | Role1 | Location | User1,…User7 | Location |
| Prms7 | Delete, File3.ppt | Location | Role1 | Location | User1,…User7 | Location |
| Prms8 | Write, File3.ppt | Location | Role1 | Location | User1,…User7 | Location |
| Prms9 | Submit, File3.ppt | Location | Role1 | Location | User1,…User7 | Location |
| Prms10 | Delete, File4.doc | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
| Prms11 | Write, File4.doc | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
| Prms12 | Submit, File4.doc | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
| Prms13 | Delete, File5.xlsx | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
| Prms14 | Write, File5.xlsx | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
| Prms15 | Submit, File5.xlsx | Date & Time | Role2 | Date & Time | User8,…User15 | Date & Time |
Another view of permissions assignment to roles and roles to users in TCS.
| Permission name | Action, object | Permissions attributes | Role name | Role attributes | Users | Attributes of users |
|---|---|---|---|---|---|---|
| Prms1 | View, Timers.txt | Location | Role1 | Location | User1,…User6 | Location |
| Prms2 | Write, Timer.txt | Location | Role1 | Location | User1,…User6 | Location |
| Prms3 | Edit, Timer.txt | Location | Role1 | Location | User1,…User6 | Location |
| Prms4 | Submit, Timers.txt | Location | Role1 | Location | User1,…User6 | Location |
| Prms5 | View, Blockroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms6 | Write, Blockroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms7 | Edit, Blockroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms8 | Submit, Blockroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms9 | View, Openroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms10 | Write, Openroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms11 | Edit, Openroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms12 | Submit, Openroute.txt | Username | Role2 | Username | User7,…User10 | Username |
| Prms13 | Approve, Blockroute.txt | Designation | Role3 | Designation | User11,…User15 | Designation |
| Prms13 | Deny, Blockroute.txt | Designation | Role3 | Designation | User11,…User15 | Designation |
| Prms14 | Approve, Openroute.txt | Designation | Role3 | Designation | User11,…User15 | Designation |
| Prms15 | Deny, Openroute.txt | Designation | Role3 | Designation | User11,…User15 | Designation |
Figure 8(A) Multiple permission creation (B) roles and permission view.
Figure 9Analysis of SDAC model with respect to various aspects.
(A) Administrator efforts for permission creation. (B) Average memory consumption of each entity. (C) Variable permission assignment time. (D) Variable role assignment time.
Create attributed-objects (attributed-roles or attributed-actions) entities.
| 1: |
| 2: |
| 3: |
| 4: |
User creation and user login process.
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
| 9: |
| 10: |
| 11: |
| 12: |
Multiple permissions creation.
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
| 9: |
| 10: |
| 11: |
| 12: |
| 13: |
| 14: |
Customize-attributed-permissions automatically assigned to user with the help of attributes.
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |
Attributed-roles automatically assigned to attributed-user with the help of attributes.
| 1: |
| 2: |
| 3: |
| 4: |
| 5: |
| 6: |
| 7: |
| 8: |