DYNAMIC AUTHORIZATION BASED ON THE HISTORY OF EVENTS
Read the full article ';
For citation: Baklanovsky M.V., Khanov A.R. Dynamic authorization based on the history of events. Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2016, vol. 16, no. 6, pp. 1091–1095. doi: 10.17586/2226-1494-2016-16-6-1091-1095
The new paradigm in the field of access control systems with fuzzy authorization is proposed. Let there is a set of objects in a single data transmissionnetwork. The goal is to develop dynamic authorization protocol based on correctness of presentation of events (news) occurred earlier in the network. We propose mathematical method that keeps compactly the history of events, neglects more distant and least-significant events, composes and verifies authorization data. The history of events is represented as vectors of numbers. Each vector is multiplied by several stochastic vectors. The result is known that if vectors of events are sparse, then by solving the problem of -optimization they can be restored with high accuracy. Results of experiments for vectors restoring have shown that the greater the number of stochastic vectors is, the better accuracy of restored vectors is observed. It has been established that the largest absolute components are restored earlier. Access control system with the proposed dynamic authorization method enables to compute fuzzy confidence coefficients in networks with frequently changing set of participants, mesh-networks, multi-agent systems.
Acknowledgements. We enclose our gratitude for Prof. O.N. Granichin for consultations about randomized algorithms.
1. Sandhu R.S., Coyne E.J., Feinstein H. L., Youman C.E. Computer role-based access control models // Computer. 1996. V. 29. N 2. P. 38–47. doi: 10.1109/2.485845
2. Sudip C., Indrajit R. TrustBAC – integrating trust relationships into the RBAC model for access control in open systems // Proc. ACM Symposium on Access Control Models and Technologies (SACMAT '06). Lake Tahoe, USA, 2006. P. 49–58.
3. Su R., Zhang Y., He Z., Fan S. Trust-based fuzzy access control model research // Lecture Notes in Computer Science. 2009. V. 5854. P. 393–399. doi: 10.1007/978-3-642-05250-7_42
4. IEEE 802.11s Mesh Networking. Network standard. IEEE, 2011.
5. Akyildiz I.F., Wang X., Wang W. Wireless mesh networks: a survey // Computer Networks. 2005. V. 47. P. 445–487. doi: 10.1016/j.comnet.2004.12.001
6. Lou W., Ren K. Security, privacy, and accountability in wireless access networks // IEEE Wireless Communications. 2009. V. 16. N 4. P. 80–87. doi: 10.1109/MWC.2009.5281259
7. Wang X. A Systematic Security Approach in Wireless Mesh Networks. PhD in Computer Science. Iowa State University, 2009.
8. Lin H. Hu J., Ma J., Xu L., Nagar A. A role based privacy-aware secure routing protocol for wireless mesh networks // Wireless Personal Communications. 2014. V. 75. N 3. P. 1611–1633. doi: 10.1007/s11277-013-1171-3
9. Mahalle P.N., Thakre P.A., Prasad N.R., Prasad R. A fuzzy approach to trust based access control in internet of things // Proc. 3rd Int. Conf. on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE 2013. Atlantic City, USA, 2013. doi: 10.1109/VITAE.2013.6617083
10. Ben Saied Y., Olivereau A., Zeghlache D., Laurent M. Trust management system design for the Internet of Things: a context-aware and multiservice approach // Computers and Security. 2013. V. 39. P. 351–365. doi: 10.1016/j.cose.2013.09.001
11. Chen D., Chang G., Sun D., Li J., Jia J., Wang X. TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things // Computer Science and Information Systems. 2011. V. 8. P. 1207–1228. doi: 10.2298/CSIS110303056C
12. Bao F., Chen I.-R. Dynamic trust management for Internet of Things applications // Proc. Int. Workshop on Self-Aware Internet of Things. San Jose, USA, 2012. doi: 10.1145/2378023.2378025
13. Granichin O., Volkovich V., Toledano-Kitai D. Randomized Algorithms in Automatic Control and Data Mining. NY: Springer-Verlag, 2015. 251 p. doi: 10.1007/978-3-642-54786-7
14. Granichin O.N., Pavlenko D.V. Randomization of data acquisition and ℓ1-optimization (recognition with compression). Automation and Remote Control, 2010, vol. 71, no. 11, pp. 2259–2282. doi: 10.1134/S0005117910110019
15. Baklanovsky M.V., Khanov A.R. Identification of programs based on the behavior. Modeling and Analysis of Information Systems, 2014, vol. 21, no. 6, pp. 120–130.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License