Authentication-enabled attribute-based access control for smart homes

被引:1
|
作者
Burakgazi Bilgen, Melike [1 ]
Abul, Osman [1 ]
Bicakci, Kemal [2 ]
机构
[1] TOBB Univ Econ & Technol, Dept Comp Engn, Ankara, Turkey
[2] Istanbul Tech Univ, Informat Inst, Istanbul, Turkey
基金
欧盟地平线“2020”;
关键词
Access control; Attribute-based access control; Internet of Things; False matching rate; Smart home security; INTERNET; THINGS;
D O I
10.1007/s10207-022-00639-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart home technologies constantly bring significant convenience to our daily lives. Unfortunately, increased security risks accompany this convenience. There can be severe consequences when unauthorized or malicious users gain access to smart home devices. Therefore, dependable and comprehensive access control models are needed to address the security concerns. To this end, the attribute-based access control (ABAC) model is usually considered the most satisfactory access control model for running IoT applications. However, the uncertainty left with the authentication stage should be carried to the authorization policy specification. In this work, we extend the ABAC model by carrying the assurance level of user authentication obtained from biometric authentication systems for authorization. The extended ABAC model quantifies how far the authentication matching score is from the predefined threshold. This quantification serves as a regular attribute like others to define authorization policies. The novelty in this quantification is that it consults false matching rate and hence can easily normalize across wide range of biometric authentication devices and algorithms. As a result, the resulting access control policies are concise and easy to comprehend. Moreover, our model is fine-grained in that different access policies can be specified for each smart device functionality. This work also shows, through case studies, that the extended ABAC model is feasible and implementable in XACML language.
引用
收藏
页码:479 / 495
页数:17
相关论文
共 50 条
  • [21] An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare
    Zhong, Hong
    Zhou, Yiyuan
    Zhang, Qingyang
    Xu, Yan
    Cui, Jie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 486 - 496
  • [22] ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities
    Zhang, Runnan
    Liu, Gang
    Li, Shancang
    Wei, Yongheng
    Wang, Quan
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [23] Attribute-Based Access Control for Smart Cities: A Smart-Contract-Driven Framework
    Zhang, Yuanyu
    Yutaka, Mirei
    Sasabe, Masahiro
    Kasahara, Shoji
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (08) : 6372 - 6384
  • [24] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [25] SmartAccess: Attribute-Based Access Control System for Medical Records Based on Smart Contracts
    De Oliveira, Marcela Tuler
    Reis, Lucio Henrik Amorim
    Verginadis, Yiannis
    Mattos, Diogo Menezes Ferrazani
    Olabarriaga, Silvia Delgado
    IEEE ACCESS, 2022, 10 : 117836 - 117854
  • [26] Learning Enabled Adaptive Multiple Attribute-based Physical Layer Authentication
    Fang, Xiaojie
    Yin, Xinyu
    Mei, Lin
    Zhang, Ning
    Sha, Xuejun
    Qiu, Jinghui
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [27] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [28] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [29] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [30] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545