[go: up one dir, main page]

Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 407))

Abstract

Pervasive computing is a concept in computer science where computing appear everywhere and anywhere, the devices are heterogeneous and may belong to different domains, and they interact with each other to provide smart services. Traditional access control models such as DAC, MAC and RBAC are not suitable to this environment. Therefore, we need more flexible, dynamic and generic access control models for controlling access to such environments. There have been many proposals proposed to address the new security requirements in the pervasive computing environments. The goal of this paper is to review and analyze the existing proposals seen in literature and to compare the approaches taken in these proposals based on the security requirements. This comparison will lead to the identification of some research gaps that require further investigation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill, Inc., Boston (2007)

    Google Scholar 

  2. Ahmed, A.: Context-Aware Access Control in Ubiquitous Computing (CRAAC), pp. 44–62 (2010)

    Google Scholar 

  3. Zhang, G., Zhang, G., Parashar, M., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Proceedings of the Communication Networks and Distributed Systems Modelling Simulation Conference, pp. 21–30 (2004)

    Google Scholar 

  4. Kim, Y.G., Mon, C.J., Jeong, D.W., Lee, J.O., Song, C.Y., Baik, D.K.: Context-aware access control mechanism for ubiquitous applications. Adv. Web Intell. Proc. 3528, 236–242 (2005)

    Article  Google Scholar 

  5. Diep, N.N., Hung, L.X., Zhung, Y., Lee, S., Lee, Y., Lee, H.: Enforcing access control using risk assessment. In: Fourth European Conference on Universal Multiservice Networks, pp. 419–424 (2007)

    Google Scholar 

  6. Ahmed, A., Zhang, N.Z.N.: A context-risk-aware access control model for Ubiquitous environments. In: 2008 International Multiconference on Computer Science and Information Technology, pp. 775–782 (2008)

    Google Scholar 

  7. Ahmed, A., Zhang, N.Z.N.: An access control architecture for context-risk-aware access control: architectural design and performance evaluation. In: 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) (2010)

    Google Scholar 

  8. Priya, P., Charles, I.I.P.J., Britto, I.I.I.S., Kumar, R.: Context-aware architecture for user access control, vol. 2, no. 3, pp. 201–204 (2014)

    Google Scholar 

  9. Cha, B., Seo, J., Kim, J.: Design of attribute-based access control in cloud computing environment. In: Proceedings of the International Conference on IT Convergence and Security 2011, pp. 41–50 (2012)

    Google Scholar 

  10. Sun, K., Yin, L.: Attribute-Role-Based Hybrid Access Control, no. 61100181, pp. 333–343 (2014)

    Google Scholar 

  11. Ma, S.M.S., He, J.H.J., Shuai, X.S.X., Wang, Z.W.Z.: Access control mechanism based on trust quantification. In: 2010 IEEE Second International Conference on School of Computing (SocialCom) (2010)

    Google Scholar 

  12. Ahmed, A., lnajem, A.: Trust-aware access control: how recent is your transaction history?. In: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 208–213 (2012)

    Google Scholar 

  13. Zerkouk, M., Mhamed, A., Messabih, B.: User behavior and capability based access control model and architecture. In: Computer Networks and Communications (NetCom), pp. 291–299. Springer (2013)

    Google Scholar 

  14. Mhamed, A., Zerkouk, M., El Husseini, A., Messabih, B., El Hassan, B.: Towards a context aware modeling of trust and access control based on the user behavior and capabilities. In: Inclusive Society: Health and Wellbeing in the Community, and Care at Home, pp. 69–76. Springer (2013)

    Google Scholar 

  15. Zerkouk, M., Cavalcante, P., Mhamed, A., Boudy, J., Messabih, B.: Behavior and capability based access control model for personalized telehealthcare assistance. Mob. Netw. Appl. 19(3), 392–403 (2014)

    Article  Google Scholar 

  16. Burnett, C., Chen, L., Edwards, P., Norman, T.J.: TRAAC: Trust and Risk Aware Access Control, pp. 371–378 (2014)

    Google Scholar 

  17. Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Futur. Gener. Comput. Syst. 31, 147–168 (2014)

    Article  Google Scholar 

  18. Li, B., Tian, M., Zhang, Y., Lv, S.: Strategy of domain and cross-domain access control based on trust in cloud computing environment. In: Computer Engineering and Networking, pp. 791–798. Springer (2014)

    Google Scholar 

  19. Zhang, R., Giunchiglia, F., Crispo, B., Song, L.: Relation-based access control: an access control model for context-aware computing environment. Wirel. Pers. Commun. 55(1), 5–17 (2010)

    Article  Google Scholar 

  20. Jung, K., Park, S.: Context-aware role based access control using user relationship. Int. J. Comput. Theory Eng. 5(3), 533–537 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tarek Gaber .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Elsayed, W., Gaber, T., Zhang, N., Ibrahim Moussa, M. (2016). Access Control Models for Pervasive Environments: A Survey. In: Gaber, T., Hassanien, A., El-Bendary, N., Dey, N. (eds) The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2015, Beni Suef, Egypt. Advances in Intelligent Systems and Computing, vol 407. Springer, Cham. https://doi.org/10.1007/978-3-319-26690-9_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26690-9_45

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26688-6

  • Online ISBN: 978-3-319-26690-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics