基于信任的动态博弈访问控制

Shunan Ma
{"title":"基于信任的动态博弈访问控制","authors":"Shunan Ma","doi":"10.1109/Trustcom.2015.532","DOIUrl":null,"url":null,"abstract":"Access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, MAC and RBAC, the functionality of these access control models is to make authorization decisions based on established access control policies. When the malicious access is identified, the access control system denies the request. However, the malicious entities may keep issuing more malicious access requests not afraid of punishment from the access control system. Such access control models are not adequate in open networks where the identities of entities may not be known. In this paper, we first apply some principles in game theory to analyze current access control models. With respect to behavior of entities, access control can be treated as a game between the requester and the provider entities. Then we propose a dynamic game access control model based on trust, which can respond to malicious access. The proposed model should follow the principles of bringing interactive entities to a state of Nash Equilibrium to make access control more effective. In the proposed model, we use access behavior trigger strategy along with a constraint mechanism that provides incentives for entities to perform honest access.","PeriodicalId":277092,"journal":{"name":"2015 IEEE Trustcom/BigDataSE/ISPA","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Dynamic Game Access Control Based on Trust\",\"authors\":\"Shunan Ma\",\"doi\":\"10.1109/Trustcom.2015.532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, MAC and RBAC, the functionality of these access control models is to make authorization decisions based on established access control policies. When the malicious access is identified, the access control system denies the request. However, the malicious entities may keep issuing more malicious access requests not afraid of punishment from the access control system. Such access control models are not adequate in open networks where the identities of entities may not be known. In this paper, we first apply some principles in game theory to analyze current access control models. With respect to behavior of entities, access control can be treated as a game between the requester and the provider entities. Then we propose a dynamic game access control model based on trust, which can respond to malicious access. The proposed model should follow the principles of bringing interactive entities to a state of Nash Equilibrium to make access control more effective. In the proposed model, we use access behavior trigger strategy along with a constraint mechanism that provides incentives for entities to perform honest access.\",\"PeriodicalId\":277092,\"journal\":{\"name\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"volume\":\"78 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-08-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE Trustcom/BigDataSE/ISPA\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/Trustcom.2015.532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE Trustcom/BigDataSE/ISPA","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Trustcom.2015.532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

访问控制是指一整套用于管理用户通过网络访问计算机系统提供的资源的机制。尽管已经提出了许多访问控制模型,如DAC、MAC和RBAC,但这些访问控制模型的功能是基于已建立的访问控制策略做出授权决策。当识别出恶意访问时,门禁系统会拒绝该请求。然而,恶意实体可能会不断发出更多的恶意访问请求,而不怕访问控制系统的惩罚。这种访问控制模型不适用于可能不知道实体身份的开放网络。本文首先运用博弈论的一些原理对现有的访问控制模型进行分析。对于实体的行为,访问控制可以看作是请求者和提供者实体之间的博弈。在此基础上,提出了一种基于信任的动态博弈访问控制模型,该模型能够有效应对恶意访问。所提出的模型应遵循使交互实体达到纳什均衡状态的原则,以使访问控制更加有效。在提出的模型中,我们使用访问行为触发策略和约束机制,为实体执行诚实访问提供激励。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Dynamic Game Access Control Based on Trust
Access control refers to the whole suite of mechanisms that are used to govern user access to resources provided by computer systems over networks. Although many access control models have been proposed, such as DAC, MAC and RBAC, the functionality of these access control models is to make authorization decisions based on established access control policies. When the malicious access is identified, the access control system denies the request. However, the malicious entities may keep issuing more malicious access requests not afraid of punishment from the access control system. Such access control models are not adequate in open networks where the identities of entities may not be known. In this paper, we first apply some principles in game theory to analyze current access control models. With respect to behavior of entities, access control can be treated as a game between the requester and the provider entities. Then we propose a dynamic game access control model based on trust, which can respond to malicious access. The proposed model should follow the principles of bringing interactive entities to a state of Nash Equilibrium to make access control more effective. In the proposed model, we use access behavior trigger strategy along with a constraint mechanism that provides incentives for entities to perform honest access.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor Networks Study on the Coverage of Adaptive Wireless Sensor Network Based on Trust A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy Aware WAVE: Secure Wireless Pairing Exploiting Human Body Movements Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor Networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1