Adaptive Access Control Model Based on Activity and Trust in Social Internet of Things
DOI: 10.23977/jaip.2025.080204 | Downloads: 18 | Views: 479
Author(s)
Jian Liu 1, Lingkang Kong 1, Huihui Yang 1, Yingchao Wang 1
Affiliation(s)
1 Xinjiang College of Science and Technology, Korla, 841000, China
Corresponding Author
Huihui YangABSTRACT
In the process of secure interaction in the Social Internet of Things (SIoT), there is a lack of dynamic flexibility in user trust and insufficient authorization accuracy. This paper proposes an access control model based on SIoT activity and trust (SA-TBAC).The model introduces social relations for SIoT trust evaluation and adaptive weight function to dynamically adjust user trust. Bayesian decision theory is introduced in the authorization decision process, and the object authorization process is regarded as a binary classification problem for the selection of execution decision results. An access control model combining SIoT trust and user behavior trust is established. The experimental results show that the dynamic adjustment of user trust in the interaction cycle increases the accuracy and flexibility of model authorization, improves the success rate of interaction in the cycle, and optimizes the interaction environment compared with other access control models in SIoT.
KEYWORDS
Social Internet of Things; Trust; Activity; Access control; Bayesian authorization; Fine-grainedCITE THIS PAPER
Jian Liu, Lingkang Kong, Huihui Yang, Yingchao Wang, Adaptive Access Control Model Based on Activity and Trust in Social Internet of Things. Journal of Artificial Intelligence Practice (2025) Vol. 8: 28-38. DOI: http://dx.doi.org/10.23977/jaip.2025.080204.
REFERENCES
[1] Atzori L., Iera A., Morabito G. (2011). SIoT: Giving a social structure to the internet of things. IEEE Communications Letters, 15(11),1193-1195.
[2] Mi B., Liang X., Zhang S. (2018). A Review of Research on Social Internet of Things. Chinese Journal of Computers,41(07,1448-1475.
[3] Kamilaris A., Pitsillides A. (2010). Social networking of the smart home[C]// IEEE International Symposium on Personal Indoor and Mobile Radio Communications. IEEE.
[4] Kang D., Choi J., Jung J. (2016). SDIF : Social device interaction framework for encounter and play in smart home service. IEEE Transactions on Consumer Electronics, 62(1), 85-93.
[5] Diazsanchez D., Marin A., Almenarez F. (2010). Social applications in the home network. IEEE Transactions on Consumer Electronics, 56(1), 220-225.
[6] Atzori L., Iera A., Morabito G. (2012). The social internet of things (SIoT) - when social networks meet the internet of things: concept, architecture and network characterization. Computer networks, (16),56.
[7] Shaji S., Ramesh M., Menon V. (2016). Real-Time processing and analysis for activity classification to enhance wearable wireless ECG. Springer India.
[8] Gupta M., Sandhu R. (2021). Towards activity-centric access control for smart collaborative ecosystems [C] // Proceedings of the 26th ACM Symposium on Access Control Models and Technologies. 155-164.
[9] Alam K., Saini M., Saddik A. (2015). Toward social internet of vehicles: concept, architecture, and applications. IEEE Access, 3,343-357.
[10] Floris A., Nitti M., Girau R., et al. (2014). On adding the social dimension to the internet of vehicles: Friendship and middleware[C]// IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom), IEEE.
[11] Zhao B., He J. (2015). A Risk-Minimization Authorization Mapping Method Based on Bayesian Decision Theory. Chinese Journal of Communications, 36(S1), 157-161.
[12] Wu J., Dong M., Ota K. (2014). A fine-grained cross-domain access control mechanism for social internet of things[C] 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops. IEEE, 666-671.
[13] Chang G., Liu Y., Ye Q. (2017). An attribute-based fine-grained access control scheme in vehicular ad-hoc networks. Wireless Communications, Networking and Applications.
[14] Zhang H., Ma P., Liu B. (2021). Adaptive fine-grained access control method in social internet of things. International Journal of Network Security, 23(1), 42-48.
[15] Deng S., Yuan L., Sun L. (2022). Research on IoT Access Control Model Based on Trust Degree. Computer Engineering and Design, 43(11), 3030-3036
[16] Qiao Y., Xu D., Dai G. (2000). A New Model of Role-Based Access Control (RBAC) and Its Implementation Mechanism. Journal of Computer Research and Development, (01), 37-44.
[17] Liu W., Duan H., Zhang H., Ren P., Wu J. (2011). TRBAC: A Trust-Based Access Control Model. Chinese Journal of Computer Research and Development, 48(08), 1414-1420.
[18] Li X., Feng D., Chen C., Fang Z. (2008). Attribute-Based Access Control Model. Chinese Journal on Communications, (04), 90-98.
[19] Li Y., Guo H., Peng W., Song C. (2016). Synthesis of Access Control Policies Based on Trust Degree Attributes. Chinese Application Research of Computers,33(07), 2175-2180.
[20] Gong A., Liu H. (2015). P2P Access Control Model Based on Trust Fuzzy Evaluation. Chinese Computer Engineering, 41(03), 125-129.
[21] Pan R., Wang G., Huang H. (2021). Attribute-Based Access Control with Dynamic User Trust Degree in Cloud Computing. Computer Science, 48(05), 313-319.
[22] Zhang Y., Tian L., Wu Z., Wu W. (2021). A Game Mechanism for Trust-Oriented Dynamic Access Control in Cloud Services. Mini-Micro Systems, 42(08), 1774-1779.
[23] Subramanian A., K. S. (2016). CTRAC: A combined trust and recommendation based access control approach for cloud computing. Asian Journal of Research in Social Sciences and Humanities, 6(6).
[24] Oliveira G., Souza B., Nogueira M., Santos A. (2021). An access control for IoT based on network community perception and social trust against sybil attacks. International Journal of Network Management, 32(1).
Downloads: | 15023 |
---|---|
Visits: | 473678 |
Sponsors, Associates, and Links
-
Power Systems Computation
-
Internet of Things (IoT) and Engineering Applications
-
Computing, Performance and Communication Systems
-
Advances in Computer, Signals and Systems
-
Journal of Network Computing and Applications
-
Journal of Web Systems and Applications
-
Journal of Electrotechnology, Electrical Engineering and Management
-
Journal of Wireless Sensors and Sensor Networks
-
Journal of Image Processing Theory and Applications
-
Mobile Computing and Networking
-
Vehicle Power and Propulsion
-
Frontiers in Computer Vision and Pattern Recognition
-
Knowledge Discovery and Data Mining Letters
-
Big Data Analysis and Cloud Computing
-
Electrical Insulation and Dielectrics
-
Crypto and Information Security
-
Journal of Neural Information Processing
-
Collaborative and Social Computing
-
International Journal of Network and Communication Technology
-
File and Storage Technologies
-
Frontiers in Genetic and Evolutionary Computation
-
Optical Network Design and Modeling
-
Journal of Virtual Reality and Artificial Intelligence
-
Natural Language Processing and Speech Recognition
-
Journal of High-Voltage
-
Programming Languages and Operating Systems
-
Visual Communications and Image Processing
-
Journal of Systems Analysis and Integration
-
Knowledge Representation and Automated Reasoning
-
Review of Information Display Techniques
-
Data and Knowledge Engineering
-
Journal of Database Systems
-
Journal of Cluster and Grid Computing
-
Cloud and Service-Oriented Computing
-
Journal of Networking, Architecture and Storage
-
Journal of Software Engineering and Metrics
-
Visualization Techniques
-
Journal of Parallel and Distributed Processing
-
Journal of Modeling, Analysis and Simulation
-
Journal of Privacy, Trust and Security
-
Journal of Cognitive Informatics and Cognitive Computing
-
Lecture Notes on Wireless Networks and Communications
-
International Journal of Computer and Communications Security
-
Journal of Multimedia Techniques
-
Automation and Machine Learning
-
Computational Linguistics Letters
-
Journal of Computer Architecture and Design
-
Journal of Ubiquitous and Future Networks