Education, Science, Technology, Innovation and Life
Open Access
Sign In

Adaptive Access Control Model Based on Activity and Trust in Social Internet of Things

Download as PDF

DOI: 10.23977/jaip.2025.080204 | Downloads: 18 | Views: 479

Author(s)

Jian Liu 1, Lingkang Kong 1, Huihui Yang 1, Yingchao Wang 1

Affiliation(s)

1 Xinjiang College of Science and Technology, Korla, 841000, China

Corresponding Author

Huihui Yang

ABSTRACT

In the process of secure interaction in the Social Internet of Things (SIoT), there is a lack of dynamic flexibility in user trust and insufficient authorization accuracy. This paper proposes an access control model based on SIoT activity and trust (SA-TBAC).The model introduces social relations for SIoT trust evaluation and adaptive weight function to dynamically adjust user trust. Bayesian decision theory is introduced in the authorization decision process, and the object authorization process is regarded as a binary classification problem for the selection of execution decision results. An access control model combining SIoT trust and user behavior trust is established. The experimental results show that the dynamic adjustment of user trust in the interaction cycle increases the accuracy and flexibility of model authorization, improves the success rate of interaction in the cycle, and optimizes the interaction environment  compared with other access control models in SIoT.

KEYWORDS

Social Internet of Things; Trust; Activity; Access control; Bayesian authorization; Fine-grained

CITE THIS PAPER

Jian Liu, Lingkang Kong, Huihui Yang, Yingchao Wang, Adaptive Access Control Model Based on Activity and Trust in Social Internet of Things. Journal of Artificial Intelligence Practice (2025) Vol. 8: 28-38. DOI: http://dx.doi.org/10.23977/jaip.2025.080204.

REFERENCES

[1] Atzori L., Iera A., Morabito G. (2011). SIoT: Giving a social structure to the internet of things. IEEE Communications Letters,  15(11),1193-1195.
[2] Mi B., Liang X., Zhang S. (2018). A Review of Research on Social Internet of Things. Chinese Journal of Computers,41(07,1448-1475.
[3] Kamilaris A., Pitsillides A. (2010). Social networking of the smart home[C]// IEEE International Symposium on Personal Indoor and  Mobile Radio Communications. IEEE.
[4] Kang D.,  Choi J., Jung J. (2016). SDIF : Social device interaction framework for encounter and play in smart home service. IEEE Transactions on Consumer Electronics, 62(1), 85-93.
[5] Diazsanchez D., Marin A.,  Almenarez F. (2010). Social applications in the home network. IEEE Transactions on Consumer Electronics,  56(1), 220-225. 
[6] Atzori L., Iera A., Morabito G. (2012). The social internet of things (SIoT) - when social networks meet the internet of things: concept, architecture and network characterization. Computer networks, (16),56.
[7] Shaji S., Ramesh M., Menon V. (2016). Real-Time processing and analysis for activity classification to enhance wearable wireless ECG. Springer India.
[8] Gupta M., Sandhu R. (2021). Towards activity-centric access control for smart collaborative ecosystems [C] // Proceedings of the 26th ACM Symposium on Access Control Models and Technologies. 155-164.
[9] Alam K., Saini M., Saddik A. (2015). Toward social internet of vehicles: concept, architecture, and applications. IEEE Access, 3,343-357.
[10] Floris A., Nitti M.,  Girau R., et al.  (2014). On adding the social dimension to the internet of vehicles: Friendship and middleware[C]// IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom),  IEEE.
[11] Zhao B., He J. (2015). A Risk-Minimization Authorization Mapping Method Based on Bayesian Decision Theory. Chinese Journal of Communications, 36(S1), 157-161.
[12] Wu J.,  Dong M.,  Ota K. (2014). A fine-grained cross-domain access control mechanism for social internet of things[C] 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops. IEEE,  666-671.
[13] Chang G., Liu Y., Ye Q. (2017). An attribute-based fine-grained access control scheme in vehicular ad-hoc networks. Wireless Communications, Networking and Applications.
[14] Zhang H., Ma P., Liu  B. (2021). Adaptive fine-grained access control method in social internet of things. International Journal of Network Security, 23(1), 42-48.
[15] Deng  S., Yuan  L., Sun L. (2022). Research on IoT Access Control Model Based on Trust Degree. Computer Engineering and Design, 43(11), 3030-3036
[16] Qiao  Y., Xu  D., Dai G. (2000). A New Model of Role-Based Access Control (RBAC) and Its Implementation Mechanism. Journal of Computer Research and Development, (01), 37-44.
[17] Liu  W., Duan  H., Zhang  H., Ren  P., Wu  J. (2011). TRBAC: A Trust-Based Access Control Model.  Chinese Journal of Computer Research and Development, 48(08), 1414-1420.
[18] Li X., Feng D., Chen C., Fang Z. (2008). Attribute-Based Access Control Model. Chinese Journal on Communications, (04), 90-98.
[19] Li  Y., Guo  H., Peng  W., Song C. (2016). Synthesis of Access Control Policies Based on Trust Degree Attributes. Chinese Application Research of Computers,33(07), 2175-2180.
[20] Gong  A., Liu  H. (2015). P2P Access Control Model Based on Trust Fuzzy Evaluation. Chinese Computer Engineering, 41(03), 125-129. 
[21] Pan  R., Wang  G., Huang  H. (2021). Attribute-Based Access Control with Dynamic User Trust Degree in Cloud Computing. Computer Science, 48(05), 313-319.
[22] Zhang Y., Tian L., Wu  Z., Wu  W. (2021). A Game Mechanism for Trust-Oriented Dynamic Access Control in Cloud Services. Mini-Micro Systems, 42(08), 1774-1779.
[23] Subramanian  A., K.  S. (2016). CTRAC: A combined trust and recommendation based access control approach for cloud computing. Asian Journal of Research in Social Sciences and Humanities, 6(6). 
[24] Oliveira G., Souza B., Nogueira M., Santos A. (2021). An access control for IoT based on network community perception and social trust against sybil attacks. International Journal of Network Management, 32(1). 

Downloads: 15023
Visits: 473678

Sponsors, Associates, and Links


All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.