Skip to main content

Advertisement

Log in

OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Access control is used to prevent data from access of unauthorized users. Over the years, several access control models have been proposed to meet requirements of various applications and domains. Role-based access control model is one such model which enforces security based on the roles. However, role-based access control model is static in nature and does not provide the dynamism of collaboration required in the multi-domain environment. This paper presents an Ontology-Based Access Control (OBAC) model, which provides a solution by using an ontology-based approach. In OBAC model, agents are used for the identification and classification of Roles, Objects and Permissions (ROP) in distributed environment. The proposed method exploits the ontology-based approach, where agent learns and adapts changes to identify roles, objects and permissions from a given dataset and classify them into ontology according to rules and policies. The proposed ontology also provides extensibility and reusability. Moreover, we simulated our technique on datasets of two different domains. The first dataset is related to the university environment and the second one is about hospital domain. The promising experimental results indicates the effectiveness of proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. Protégé is a free, open source ontology editor. Https://www.w3.org/2001/sw/wiki/Protege

  2. https://www.maynoothuniversity.ie

  3. https://www.ox.ac.uk

  4. https://www.comsats.edu.pk

  5. https://www.uams.edu

  6. https://www.stjosephshospice.com.pk

  7. HermiT is conformant OWL 2 DL reasoner that uses direct semantics. Https://www.w3.org/2001/sw/wiki/Hermit

References

  1. Ahmad A, Paul A, Rathore M (2016) An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication. Neurocomputing 174(Part A):439–453. https://doi.org/10.1016/j.neucom.2015.04.109

    Article  Google Scholar 

  2. Ahmad A, Paul A, Rathore M, Chang H (2016) Smart cyber society: Integration of capillary devices with high usability based on Cyber–Physical System. Futur Gener Comput Syst 56:493–503

    Article  Google Scholar 

  3. Ahmad A, Khan M, Paul A, Din S, Rathore M, Jeon G, Chio GS (2018) Toward modeling and optimization of features selection in Big Data based social Internet of Things. Futur Gener Comput Syst 82:715–726

    Article  Google Scholar 

  4. Ahmad A, Babar M, Din S, Khalid S, Rathore M, Paul A, Reddy G, Min-Allah N (2019) Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics. Futur Gener Comput Syst 92:868–878

    Article  Google Scholar 

  5. Anisetti M, Ardagna CA, Damiani E (2011) Fine-Grained Modeling of Web Services for Test-Based Security Certification. In: 2011 IEEE international conference on services computing, Washington, DC, pp 456–463. https://doi.org/10.1109/SCC.2011.27

  6. Anisetti M, Ardagna CA, Damiani E (2013) Security Certification of Composite Services: A Test-Based Approach. 2013 IEEE 20th international conference on web services. Santa Clara, CA,p 475–482. https://doi.org/10.1109/ICWS.2013.70.

  7. Anisetti M et al (2014) E-Auctions for Multi-Cloud Service Provisioning. In: 2014 IEEE international conference on services computing, Anchorage, pp 35–42. https://doi.org/10.1109/SCC.2014.14

  8. Arshad H, Khattak HA, Shah MA, Abbas A, Ameer Z (2018) Evaluation and analysis of bio-inspired optimization techniques for bill estimation in fog computing. Int J Adv Comput Sci Appl 9(7)

  9. Balakrishnan SM, Sangaiah AK (2016) MIFIM—middleware solution for service centric anomaly in future internet models. Futur Gener Comput Syst, Elsevier Publishers. https://doi.org/10.1016/j.future.2016.08.006

  10. Belchior M, Schwabe D, Parreiras FS (2012) "Role-based access control for model-driven web applications". In International Conference on Web Engineering. Springer, Berlin Heidelberg, p 106–120

  11. Blois M, Escobar M, Choren R (2007) Using agents and ontologies for application development on the semantic web. J Braz Comput Soc 13(2):35–44

    Article  Google Scholar 

  12. Charanya R, Aramudhan M, Saravananaguru RK (2016) A Review on Access Control Issues in E-Health Application in Cloud Computing. Indian J Sci Technol 9(42)

  13. De Giacomo G, Lembo D, Lenzerini M, Poggi A, Rosati R (2018) Using ontologies for semantic data integration. In: A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years. Springer, Cham, pp 187–202

    Chapter  Google Scholar 

  14. Hadjar K (2016) University Ontology: A Case Study at Ahlia University. In: Semantic Web. Springer International Publishing, p 173–183

  15. Heilili N, et al (2006) "An OWL-based approach for RBAC with negative authorization." International Conference on Knowledge Science, Engineering and Management. Springer, Berlin Heidelberg, p 164–175.

  16. Hussain M, Ahmed M, Khattak HA, Imran M, Khan A, Din S, Ahmad A, Jeon G, Reddy AG (2018) Towards ontology-based multilingual URL filtering: a big data problem. J Supercomput:119

  17. Jiong Q, Chen-hua M (2011) Detecting and resolving constraint conflicts in role-based access control. In: 2011 International conference on electrical and control engineering (ICECE). IEEE, pp 5845–5848

  18. Katal A, Gupta P, Wazid M, Goudar RH, Mittal A, Panwar S, Joshi S (2013) Authentication and authorization: Domain specific role based access control using ontology. In: Intelligent Systems and Control (ISCO), 2013 7th International Conference on. IEEE, p 439–444

  19. Kozaki K, Sunagawa E, Kitamura Y, Mizoguchi R (2006) Fundamental consideration of role concepts for ontology evaluation. Proc. of EON2006 Edinburgh, United Kingdom.

  20. Kozaki K, Kitamura Y, Mizoguchi R (2012) A model of derived roles. In: International Conference on Knowledge Engineering and Knowledge Management. Springer, Berlin Heidelberg, p 227–236

  21. Medhane DV, Sangaiah AK (2017) ESCAPE: effective scalable clustering approach for parallel execution of continuous position-based queries in position monitoring applications. IEEE Transactions on Sustainable Computing. https://doi.org/10.1109/TSUSC.2017.2690378.

  22. Medhane DV, Sangaiah AK (2017) Search space-based multi-objective optimization evolutionary algorithm. Comput Electr Eng, Elsevier Publishers 58:126–143

    Article  Google Scholar 

  23. Medhane DV, Sangaiah AK (2018) PCCA: position confidentiality conserving algorithm for content-protection in e-governance services and applications. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(3), 194–203.

  24. Mivule K, Josyula D, Turner C (2013) "An Overview of Data Privacy in Multi-Agent Learning Systems". In The Fifth International Conference on Advanced Cognitive Technologies and Applications, p 14–20

  25. Mohan K, Aramudhan M (2015) Ontology based access control model for healthcare system in cloud computing. Indian J Sci Technol 8(S9):218–222

    Article  Google Scholar 

  26. Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Inter-domain role based access control using ontology. In: Advances in Computing, Communications and Informatics (ICACCI), 2015 International Conference on. IEEE, p 2027–2032

  27. Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Representation of multiple domain role based access control using FCA. In: Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on. IEEE, p 1–6

  28. Ni Q, Trombetta A, Bertino E, Lobo J (2007) "Privacy-aware Role Based Access Control". In 2007 ACM SACMAT, Sophia Antipolis, France.

  29. Paul A, Ahmad A, Rathore M, Jababr S (2016) Smartbuddy: defining human behaviors using big data analytics in social internet of things. IEEE Wirel Commun

  30. Raje S, Davuluri C, Freitas M, Ramnath R, Ramanathan J (2012) Using ontology-based methods for implementing role-based access control in cooperative systems. In: Proceedings of the 27th Annual ACM Symposium on Applied Computing. ACM, p 763–764

  31. Sahafizadeh E, Parsa S (2010) "Survey on access control models". In: 2010 2nd International Conference on Future Computer and Communication.

  32. Tsai WT, Shao Q (2011) Role-based access-control using reference ontology in clouds. In 2011 Tenth International Symposium on Autonomous Decentralized Systems. IEEE. 2011 Tenth International Symposium on Autonomous Decentralized Systems. IEEE, p 121–128

  33. Wang Z, Zhao X, Wan B, Xie J, Bai P (2013) A workflow-based RBAC model for web services in multiple autonomous domains. J Networks 8(3):723–730

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Awais Ahmad.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Aslam, S., Ahmed, M., Ahmed, I. et al. OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment. Multimed Tools Appl 79, 34363–34384 (2020). https://doi.org/10.1007/s11042-020-08764-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-020-08764-2

Keywords

Navigation