Access Control Models for Pervasive Environments: A Survey

Pervasive computing is a concept in computer science where computing appear everywhere and anywhere, the devices are heterogeneous and may belong to different domains, and they interact with each other to provide smart services. Traditional access control models such as DAC, MAC and RBAC are not suitable to this environment. Therefore, we need more flexible, dynamic and generic access control models for controlling access to such environments. There have been many proposals proposed to address the new security requirements in the pervasive computing environments. The goal of this paper is to review and analyze the existing proposals seen in literature and to compare the approaches taken in these proposals based on the security requirements. This comparison will lead to the identification of some research gaps that require further investigation.

[1]  Seog Park,et al.  Context-Aware Role Based Access Control Using User Relationship , 2013 .

[2]  JongWon Kim,et al.  Design of Attribute-Based Access Control in Cloud Computing Environment , 2011, ICITCS.

[3]  Jérôme Boudy,et al.  Behavior and Capability Based Access Control Model for Personalized TeleHealthCare Assistance , 2014, Mob. Networks Appl..

[4]  Ali Ahmed,et al.  Trust-aware access control: How recent is your transaction history? , 2012, 2012 Second International Conference on Digital Information and Communication Technology and it's Applications (DICTAP).

[5]  Bo Li,et al.  Strategy of Domain and Cross-Domain Access Control Based on Trust in Cloud Computing Environment , 2014 .

[6]  Zhao Wang,et al.  Access Control Mechanism Based on Trust Quantification , 2010, 2010 IEEE Second International Conference on Social Computing.

[7]  Belhadri Messabih,et al.  User Behavior and Capability Based Access Control Model and Architecture , 2013 .

[8]  Ning Zhang,et al.  A Context-Risk-Aware Access Control model for Ubiquitous environments , 2008, 2008 International Multiconference on Computer Science and Information Technology.

[9]  Fausto Giunchiglia,et al.  Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment , 2010, Wirel. Pers. Commun..

[10]  Patrice Clemente,et al.  An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system , 2014, Future Gener. Comput. Syst..

[11]  Ning Zhang,et al.  An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation , 2010, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies.

[12]  Bachar El-Hassan,et al.  Towards a Context Aware Modeling of Trust and Access Control Based on the User Behavior and Capabilities , 2013, ICOST.

[13]  Ramesh Kumar,et al.  Context-Aware Architecture for User Access Control , 2014 .

[14]  Behrouz A. Forouzan,et al.  Cryptography and network security , 1998 .

[15]  Liang Chen,et al.  TRAAC: Trust and risk aware access control , 2014, 2014 Twelfth Annual International Conference on Privacy, Security and Trust.

[16]  Ali Ahmed CONTEXT-AWARE ACCESS CONTROL IN UBIQUITOUS COMPUTING (CRAAC) , 2010 .

[17]  Jeong-Oog Lee,et al.  Context-Aware Access Control Mechanism for Ubiquitous Applications , 2005, AWIC.

[18]  Heejo Lee,et al.  Enforcing Access Control Using Risk Assessment , 2007, Fourth European Conference on Universal Multiservice Networks (ECUMN'07).