scholarly journals AACS: Attribute-Based Access Control Mechanism for Smart Locks

Symmetry ◽  
2020 ◽  
Vol 12 (6) ◽  
pp. 1050
Author(s):  
Zhenghao Xin ◽  
Liang Liu ◽  
Gerhard Hancke

This article researched the security and application of smart locks in Internet of Things environments in the domain of computer and engineer science and symmetry. Smart locks bring much convenience for users. However, most smart lock systems are cloud-based and it is problematic managing and enforcing the permissions of an authorized device if the device is offline. Moreover, most smart lock systems lack fine-grained access control and cascading removal of permissions. In this paper, we leverage attribute-based access control mechanisms to manage the access of visitors with different identities. We use identity-based encryption to verify the identity of the visitor. In our proposed system, the administrator uses the policy set in the smart lock to implement access control on the device side, which reduces the dependence of access control on the server. We set attributes such as role, time, date, and location to have fine-grained control over access to different permissions and roles that might appear in the house. And the scheme provides the cascading delete function while providing the group access function. Our solution considers multiple roles in the home as well as hierarchical management issues, and improves the applicability of the smart lock system in complex residential and commercial situations. In the experimental section, we show that our system can be applied to premises with many different inhabitant identities.

Author(s):  
M Meneka ◽  
K. Meenakshisundaram

To be able to leverage big data to achieve enhanced strategic insight and make informed decision, an efficient access control mechanism is needed for ensuring end to end security of such information asset. Attribute Based Access Control (ABAC), Role Based Access Control (RBAC) and Event Based Access Control (EBAC) are widely used access control mechanisms. The ABAC system is much more complex in terms of policy reviews, hence analyzing the policy and reviewing or changing user permission are quite complex task. RBAC system is labor intensive and time consuming to build a model instance and it lacks flexibility to efficiently adapt to changing user’s, objects and security policies. EBAC model considered only the events to allocate access controls. Yet these mechanisms have limitations and offer feature complimentary to each other. So in this paper, Event-Role-Attribute based fine grained Access Control mechanism is proposed, it provide a flexible boundary which effectively adapt to changing user’s, objects and security policies based on the event. The flexible boundary is achieved by using temporal and environment state of an event. It improves the big data security and overcomes the disadvantages of the ABAC and RBAC mechanisms. The experiments are conducted to prove the effectiveness of the proposed Event-Role-Attribute based Access Control mechanism over ABAC and RBAC in terms of computational overhead.


Author(s):  
С.В. Шевелев ◽  
А.Б. Семенов

Рассмотрены принципы обеспечения заданного уровня качества обслуживания QoS в беспроводных сетях, позволяющие достигнуть устойчивого функционирования программных приложений реального времени за счет тонкой настройки приоритезации генерируемого ими трафика. Основное внимание уделяется механизму управления доступом на основе конкуренции и контролируемого доступа, а также их расширениям. Затронуты вопросы инкапсуляции базовых механизмов управления в решения более высоких уровней EDCA и TXOP. Приведены расчетные значения соответствующих параметров. The principles of ensuring a given level of quality of QoS service in wireless networks are considered, which allow achieving the stable functioning of real-time software applications by fine-tuning the prioritization of the traffic generated by them. The main focus is on the competition-based access control mechanism and controlled access, as well as their extensions. The issues of encapsulation of basic control mechanisms in solutions of higher levels of EDCA and TXOP are touched upon. The calculated values of the corresponding parameters are given.


2014 ◽  
Vol 2014 ◽  
pp. 1-13 ◽  
Author(s):  
Mang Su ◽  
Fenghua Li ◽  
Zhi Tang ◽  
Yinyan Yu ◽  
Bo Zhou

This paper presents an action-based fine-grained access control mechanism for structured documents. Firstly, we define a describing model for structured documents and analyze the application scenarios. The describing model could support the permission management on chapters, pages, sections, words, and pictures of structured documents. Secondly, based on the action-based access control (ABAC) model, we propose a fine-grained control protocol for structured documents by introducing temporal state and environmental state. The protocol covering different stages from document creation, to permission specification and usage control are given by using the Z-notation. Finally, we give the implementation of our mechanism and make the comparisons between the existing methods and our mechanism. The result shows that our mechanism could provide the better solution of fine-grained access control for structured documents in complicated networks. Moreover, it is more flexible and practical.


2019 ◽  
Vol 8 (3) ◽  
pp. 6217-6225

Now-a-days the cloud is very useful for providing many IT services. These services are delivered over the internet and accessed globally with the help of internet. The cloud service provider ensures flexibility in provisioning and scaling of resources. The cloud services are completely managed by cloud service provider (CSP), which ensures the end to end availability, reliability and security of the cloud resources. The exponential growth of cloud services has provided many opportunities but has also perplexed severe security concerns. The popularity of cloud service based applications is rapidly increasing due to which many security and legal issues are arising. In this paper we describe the existing access control method and framework for securing cloud services. The concept of modified reputation and attribute based access control system has been discussed. In this approach the concept of crowd reviewing has been used to compute the credit value of users. The simulation experiment has been shown to protect the consistent users and to restrict the access of inconsistent users in cloud environment. It is an access control approach to mitigate the challenges in security concerns. This access control mechanism is helpful for cloud application services, which automatically restrict the malicious users from the access of resources. It is also helpful in authorization of users to access the cloud resources.


Sign in / Sign up

Export Citation Format

Share Document