CBR-based negotiation RBAC model for enhancing ubiquitous resources management

The ubiquitous RBAC (Role-based Access Control) with CBR (case-based reasoning) based negotiation technique which is a new technology for information management is first proposed in this paper.The CBR-N (CBR-based Negotiation) RBAC model uses spiral negotiating process to meet the requirements of negotiating role assignment (NRA) task and cooperative role assignment (CRA) task in URM-platform in order to solve the difficulties of information management in reducing the costs of ubiquitous computing resources.It is depending on using the similar characteristics to fast retrieve appropriate case record in information management system as its initial case record in order to gain the advantages of processing both NRA and CRA tasks.It also a novel negotiation RBAC scheme by using a spiral negotiating process.It is a highly powerful approach of information management that the ubiquitous RBAC scheme is designed by an innovative approach. With the progress of new technologies of information management, Ubiquitous Resource Management (URM) is a dominant areas of research which requires efficient access management approaches. There have been huge challenges of controlling access to ubiquitous resources among collaborative multi-servers based on the negotiating security policies on URMs. However, the traditional access control mechanisms were insufficient to meet the requirements of role assignment management for URMs that allow accessing services via huge clients. Therefore, Ubiquitous RBAC (Role-based Access Control) with CBR (case-based reasoning) based negotiation technique is proposed in this paper. The novel RBAC scheme could efficiently manage not only one ubiquitous server, but also multiple ubiquitous servers on the cooperation domain through supporting both negotiating role assignment (NRA) task and cooperative role assignment (CRA) task in URM-platform by using a spiral negotiating process. Furthermore, it solves the difficulties in reducing the costs of ubiquitous computing resources, e.g., the role reassigned rate, handover rate, bandwidth, and power consumption, etc. Due to the ease of use and its efficiency in negotiating and managing the user-to-role as well as virtual role assignment by applying CBR approach, it is a highly powerful strategy of information management for conducting the innovative research and design for ubiquitous RBAC scheme.

[1]  Hsing-Chung Chen,et al.  A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.

[2]  Chien-Erh Weng,et al.  Cognitive RBAC in mobile heterogeneous networks , 2013, Comput. Sci. Inf. Syst..

[3]  Shiuh-Jeng Wang,et al.  A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy , 2008 .

[4]  Hsing-Chung Chen,et al.  A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..

[5]  Marek R. Ogiela,et al.  Cognitive systems for intelligent business information management in cognitive economy , 2014, Int. J. Inf. Manag..

[6]  Hsing-Chung Chen,et al.  Contract RBAC in cloud computing , 2013, The Journal of Supercomputing.

[7]  Shiuh-Jeng Wang,et al.  Role-based proactive scheme in an access control hierarchy , 2007 .

[8]  Hsing-Chung Chen,et al.  A Role-Based RSA Key Management Approach in a Hierarchy Scheme , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[9]  Shiuh-Jeng Wang,et al.  A Generalized Temporal and Spatial Role-Based Access Control Model , 2010, J. Networks.

[10]  Hsing-Chung Chen A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks , 2015, 2015 18th International Conference on Network-Based Information Systems.

[11]  Agnar Aamodt,et al.  Case-Based Reasoning: Foundational Issues, Methodological Variations, and System Approaches , 1994, AI Commun..

[12]  Hsing-Chung Chen A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme , 2015, 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA).

[13]  Hsing-Chung Chen,et al.  A mobile location-based with time-constraint RBAC associated database management model , 2012, Comput. Syst. Sci. Eng..

[14]  Marek R. Ogiela,et al.  Shadow Generation Protocol in Linguistic Threshold Schemes , 2009, FGIT-SecTech.

[15]  Marek R. Ogiela,et al.  Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.