OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment

Access control is used to prevent data from access of unauthorized users. Over the years, several access control models have been proposed to meet requirements of various applications and domains. Role-based access control model is one such model which enforces security based on the roles. However, role-based access control model is static in nature and does not provide the dynamism of collaboration required in the multi-domain environment. This paper presents an Ontology-Based Access Control (OBAC) model, which provides a solution by using an ontology-based approach. In OBAC model, agents are used for the identification and classification of Roles, Objects and Permissions (ROP) in distributed environment. The proposed method exploits the ontology-based approach, where agent learns and adapts changes to identify roles, objects and permissions from a given dataset and classify them into ontology according to rules and policies. The proposed ontology also provides extensibility and reusability. Moreover, we simulated our technique on datasets of two different domains. The first dataset is related to the university environment and the second one is about hospital domain. The promising experimental results indicates the effectiveness of proposed approach.

[1]  Jun Xie,et al.  A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains , 2013, J. Networks.

[2]  Awais Ahmad,et al.  Smartbuddy: defining human behaviors using big data analytics in social internet of things , 2016, IEEE Wireless Communications.

[3]  Assad Abbas,et al.  Evaluation and Analysis of Bio-Inspired Optimization Techniques for Bill Estimation in Fog Computing , 2018 .

[4]  Riichiro Mizoguchi,et al.  Fundamental Consideration of Role Concepts for Ontology Evaluation , 2006, EON@WWW.

[5]  C. Chandrasekar,et al.  Representation of multiple domain role based access control using FCA , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[6]  Awais Ahmad,et al.  An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication , 2016, Neurocomputing.

[7]  Wei-Tek Tsai,et al.  Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.

[8]  Darsana P. Josyula,et al.  An Overview of Data Privacy in Multi-Agent Learning Systems , 2013 .

[9]  Arun Kumar Sangaiah,et al.  PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.

[10]  Chen Zhao,et al.  An OWL-Based Approach for RBAC with Negative Authorization , 2006, KSEM.

[11]  Jorge Lobo,et al.  Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.

[12]  Arun Kumar Sangaiah,et al.  MIFIM - Middleware solution for service centric anomaly in future internet models , 2017, Future Gener. Comput. Syst..

[13]  Qiu Jiong,et al.  Detecting and resolving constraint conflicts in role-based access control , 2011, 2011 International Conference on Electrical and Control Engineering.

[14]  Awais Ahmad,et al.  Smart cyber society: Integration of capillary devices with high usability based on Cyber-Physical System , 2016, Future Gener. Comput. Syst..

[15]  R. Charanya,et al.  A Review on Access Control Issues in EHealth Application in Cloud Computing , 2016 .

[16]  Ricardo Choren,et al.  Using agents and ontologies for application development on the semantic web , 2010, Journal of the Brazilian Computer Society.

[17]  Awais Ahmad,et al.  Towards ontology-based multilingual URL filtering: a big data problem , 2018, The Journal of Supercomputing.

[18]  Awais Ahmad,et al.  Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics , 2019, Future Gener. Comput. Syst..

[19]  Jorge Lobo,et al.  Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.

[20]  C. Chandrasekar,et al.  Inter-domain role based access control using ontology , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[21]  Ernesto Damiani,et al.  E-Auctions for Multi-Cloud Service Provisioning , 2014, 2014 IEEE International Conference on Services Computing.

[22]  Rajiv Ramnath,et al.  Using ontology-based methods for implementing role-based access control in cooperative systems , 2012, SAC '12.

[23]  Arun Kumar Sangaiah,et al.  Search space-based multi-objective optimization evolutionary algorithm , 2017, Comput. Electr. Eng..

[24]  Awais Ahmad,et al.  Toward modeling and optimization of features selection in Big Data based social Internet of Things , 2017, Future Gener. Comput. Syst..

[25]  Ernesto Damiani,et al.  Security Certification of Composite Services: A Test-Based Approach , 2013, 2013 IEEE 20th International Conference on Web Services.

[26]  Saeed Parsa,et al.  Survey on access control models , 2010, 2010 2nd International Conference on Future Computer and Communication.

[27]  Arun Kumar Sangaiah,et al.  ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications , 2017, IEEE Transactions on Sustainable Computing.

[28]  Riichiro Mizoguchi,et al.  A Model of Derived Roles , 2012, EKAW.

[29]  Maurizio Lenzerini,et al.  Using Ontologies for Semantic Data Integration , 2018, A Comprehensive Guide Through the Italian Database Research.

[30]  Ernesto Damiani,et al.  Fine-Grained Modeling of Web Services for Test-Based Security Certification , 2011, 2011 IEEE International Conference on Services Computing.

[31]  Karim Hadjar University Ontology: A Case Study at Ahlia University , 2016 .

[32]  M. Aramudhan,et al.  Ontology based Access Control Model for Healthcare System in Cloud Computing , 2015 .

[33]  Marek R. Ogiela,et al.  Multimedia tools and applications , 2005, Multimedia Tools and Applications.

[34]  Fernando Silva Parreiras,et al.  Role-Based Access Control for Model-Driven Web Applications , 2012, ICWE.

[35]  R. H. Goudar,et al.  Authentication and authorization: Domain specific Role Based Access Control using Ontology , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).

[36]  Awais Ahmad,et al.  Defining Human Behaviors Using Big Data Analytics in Social Internet of Things , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).