Abstract
Pervasive computing is a concept in computer science where computing appear everywhere and anywhere, the devices are heterogeneous and may belong to different domains, and they interact with each other to provide smart services. Traditional access control models such as DAC, MAC and RBAC are not suitable to this environment. Therefore, we need more flexible, dynamic and generic access control models for controlling access to such environments. There have been many proposals proposed to address the new security requirements in the pervasive computing environments. The goal of this paper is to review and analyze the existing proposals seen in literature and to compare the approaches taken in these proposals based on the security requirements. This comparison will lead to the identification of some research gaps that require further investigation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill, Inc., Boston (2007)
Ahmed, A.: Context-Aware Access Control in Ubiquitous Computing (CRAAC), pp. 44–62 (2010)
Zhang, G., Zhang, G., Parashar, M., Parashar, M.: Context-aware dynamic access control for pervasive applications. In: Proceedings of the Communication Networks and Distributed Systems Modelling Simulation Conference, pp. 21–30 (2004)
Kim, Y.G., Mon, C.J., Jeong, D.W., Lee, J.O., Song, C.Y., Baik, D.K.: Context-aware access control mechanism for ubiquitous applications. Adv. Web Intell. Proc. 3528, 236–242 (2005)
Diep, N.N., Hung, L.X., Zhung, Y., Lee, S., Lee, Y., Lee, H.: Enforcing access control using risk assessment. In: Fourth European Conference on Universal Multiservice Networks, pp. 419–424 (2007)
Ahmed, A., Zhang, N.Z.N.: A context-risk-aware access control model for Ubiquitous environments. In: 2008 International Multiconference on Computer Science and Information Technology, pp. 775–782 (2008)
Ahmed, A., Zhang, N.Z.N.: An access control architecture for context-risk-aware access control: architectural design and performance evaluation. In: 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies (SECURWARE) (2010)
Priya, P., Charles, I.I.P.J., Britto, I.I.I.S., Kumar, R.: Context-aware architecture for user access control, vol. 2, no. 3, pp. 201–204 (2014)
Cha, B., Seo, J., Kim, J.: Design of attribute-based access control in cloud computing environment. In: Proceedings of the International Conference on IT Convergence and Security 2011, pp. 41–50 (2012)
Sun, K., Yin, L.: Attribute-Role-Based Hybrid Access Control, no. 61100181, pp. 333–343 (2014)
Ma, S.M.S., He, J.H.J., Shuai, X.S.X., Wang, Z.W.Z.: Access control mechanism based on trust quantification. In: 2010 IEEE Second International Conference on School of Computing (SocialCom) (2010)
Ahmed, A., lnajem, A.: Trust-aware access control: how recent is your transaction history?. In: 2012 Second International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 208–213 (2012)
Zerkouk, M., Mhamed, A., Messabih, B.: User behavior and capability based access control model and architecture. In: Computer Networks and Communications (NetCom), pp. 291–299. Springer (2013)
Mhamed, A., Zerkouk, M., El Husseini, A., Messabih, B., El Hassan, B.: Towards a context aware modeling of trust and access control based on the user behavior and capabilities. In: Inclusive Society: Health and Wellbeing in the Community, and Care at Home, pp. 69–76. Springer (2013)
Zerkouk, M., Cavalcante, P., Mhamed, A., Boudy, J., Messabih, B.: Behavior and capability based access control model for personalized telehealthcare assistance. Mob. Netw. Appl. 19(3), 392–403 (2014)
Burnett, C., Chen, L., Edwards, P., Norman, T.J.: TRAAC: Trust and Risk Aware Access Control, pp. 371–378 (2014)
Smari, W.W., Clemente, P., Lalande, J.-F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Futur. Gener. Comput. Syst. 31, 147–168 (2014)
Li, B., Tian, M., Zhang, Y., Lv, S.: Strategy of domain and cross-domain access control based on trust in cloud computing environment. In: Computer Engineering and Networking, pp. 791–798. Springer (2014)
Zhang, R., Giunchiglia, F., Crispo, B., Song, L.: Relation-based access control: an access control model for context-aware computing environment. Wirel. Pers. Commun. 55(1), 5–17 (2010)
Jung, K., Park, S.: Context-aware role based access control using user relationship. Int. J. Comput. Theory Eng. 5(3), 533–537 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Elsayed, W., Gaber, T., Zhang, N., Ibrahim Moussa, M. (2016). Access Control Models for Pervasive Environments: A Survey. In: Gaber, T., Hassanien, A., El-Bendary, N., Dey, N. (eds) The 1st International Conference on Advanced Intelligent System and Informatics (AISI2015), November 28-30, 2015, Beni Suef, Egypt. Advances in Intelligent Systems and Computing, vol 407. Springer, Cham. https://doi.org/10.1007/978-3-319-26690-9_45
Download citation
DOI: https://doi.org/10.1007/978-3-319-26690-9_45
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26688-6
Online ISBN: 978-3-319-26690-9
eBook Packages: Computer ScienceComputer Science (R0)