Skip to main content
Log in

Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation

  • Published:
Computing Aims and scope Submit manuscript

Abstract

New opportunities have been created for the management of critical situations utilizing the Internet of Things (IoT). However, one of the difficulties in providing services for critical situation management using IoT is that access will often be needed by users at the critical events, where access to data and resources is usually restricted by means of their normal roles. In Role-Based Access Control, these roles are organized in static hierarchies and users are authorized to play such roles in order to exercise their organizational functions. However, some of these roles cannot be organized in the same way in static hierarchies as the authorizations granted to such roles directly correspond to the dynamic contextual conditions (e.g., body sensors data). Users need to satisfy these conditions to exercise the functions of such dynamic contextual roles. These dynamic conditions can be effectively derived from the IoT devices in order to manage the critical situations. However, a large number of static roles and contextual conditions has led to the high administrative and processing overheads. In this paper, we present a formal approach to CAAC for dynamically specifying the contextual roles based on the relevant contextual conditions derived from information provided through IoT. We also introduce an ontology-based approach which models the dynamic contextual roles and its associated access control policies. We demonstrate the feasibility of our proposal by providing a walkthrough of the whole mechanism. We also carry out an experimental study on the performance of our approach compared to our previous approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Dillon TS, Zhuge H, Wu C, Singh J, Chang E (2011) Web-of-things framework for cyber-physical systems. Concurr Comput Pract Exp 23(9):905–923

    Article  Google Scholar 

  2. Dillon TS, Talevski A, Potdar V, Chang E (2009) Web of things as a framework for ubiquitous intelligence and computing. In: International conference on ubiquitous intelligence and computing. Springer, Berlin, pp 2–13

  3. Kayes ASM, Han J, Colman A (2015) OntCAAC: an ontology-based approach to context-aware access control for software services. Comput J 58(11):3000–3034

    Article  Google Scholar 

  4. Kayes A, Rahayu W, Dillon T (2018) An ontology-based approach to dynamic contextual role for pervasive access control. In: AINA 2018. IEEE Computer Society

  5. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. IEEE Comput 29:38–47

    Article  Google Scholar 

  6. Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. TISSEC 4(3):224–274

    Article  Google Scholar 

  7. Gravina R, Ma C, Pace P, Aloi G, Russo W, Li W, Fortino G (2017) Cloud-based activity-aaservice cyber-physical framework for human activity monitoring in mobility. Future Gener Comput Syst 75:158–171

    Article  Google Scholar 

  8. Chandran SM, Joshi JBD (2005) LoT-RBAC: a location and time-based RBAC model. In: WISE, pp 361–375

  9. Bhatti R, Ghafoor A, Bertino E, Joshi J (2005) X-gtrbac: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans Inf Syst Secur 8(2):187–227

    Article  Google Scholar 

  10. Bertino E, Bonatti PA, Ferrari E (2001) Trbac: a temporal role-based access control model. ACM Trans Inf Syst Secur 4(3):191–233

    Article  Google Scholar 

  11. Zhang H, He Y, Shi Z (2006) Spatial context in role-based access control. In: ICISC, pp 166–178

  12. Bijon KZ, Krishnan R, Sandhu R (2012) Risk-aware RBAC sessions. In: ICISS. Springer, Berlin, pp 59–74

  13. Servos D, Osborn SL (2017) Current research and open problems in attribute-based access control. ACM Comput Surv 49(4):65:1–65:45

    Article  Google Scholar 

  14. Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):14–16

    Article  Google Scholar 

  15. Jin X, Sandhu RS, Krishnan R (2012) RABAC: role-centric attribute-based access control. In: Computer network security—6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17–19, 2012. Proceedings, pp 84–96

  16. Kim YG, Lim J (2007) Dynamic activation of role on rbac for ubiquitous applications. In: ICCIT. IEEE, pp 1148–1153

  17. Strembeck M, Neumann G (2004) An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans Inf Syst Secur (TISSEC) 7(3):392–427

    Article  Google Scholar 

  18. Kulkarni D, Tripathi A (2008) Context-aware role-based access control in pervasive computing systems. In: Proceedings of the 13th ACM symposium on access control models and technologies. ACM, pp 113–122

  19. Hosseinzadeh S, Virtanen S, Díaz-Rodríguez N, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. SBD, ACM 8(1–8):6

    Google Scholar 

  20. Kayes ASM, Han J, Colman AW (2015) An ontological framework for situation-aware access control of software services. Inf Syst 53:253–277

    Article  Google Scholar 

  21. Kayes ASM, Han J, Colman A, Islam MS (2014) Relboss: a relationship-aware access control framework for software services. In: CoopIS, pp 258–276

  22. Kayes ASM, Han J, Colman A (2014) PO-SAAC: a purpose-oriented situation-aware access control framework for software services. In: CAiSE, pp 58–74

  23. Kayes A, Rahayu W, Dillon T, Chang E, Han J (2017) Context-aware access control with imprecise context characterization through a combined fuzzy logic and ontology-based approach. In: CoopIS 2017. Springer, Berlin, pp 132–153

  24. Oksama L, Hyönä J (2008) Dynamic binding of identity and location information: a serial model of multiple identity tracking. Cogn Psychol 56(4):237–283

    Article  Google Scholar 

  25. OWL: Web Ontology Language (2017). http://www.w3.org/2007/owl/

  26. SWRL: Semantic Web Rule Language (2017). http://www.w3.org/submission/swrl/

  27. SWRL-Built-Ins: SWRL Built-Ins for comparisons, Boolean values and Math Built-Ins (2017). http://www.daml.org/2004/04/swrl/builtins.html

  28. Riboni D, Bettini C (2011) Owl 2 modeling and reasoning with complex human activities. Pervasive Mob Comput 7:379–395

    Article  Google Scholar 

  29. Protégé: Protégé-OWL API (2017). http://protege.stanford.edu/

  30. Protégé-OWLSWRLTab (2017). https://protegewiki.stanford.edu/wiki/swrltab

  31. Jess: Jess rule engine (2017). http://herzberg.ca.sandia.gov/

  32. ASCO: Australian Standard Classification of Occupations: Health Professionals (2017). http://www.abs.gov.au/

  33. HL7: Health Level Seven Standard (2017). http://www.hl7.org.au/

  34. Bertino E, Catania B, Damiani ML, Perlasca P (2005) GEO-RBAC: a spatially aware RBAC. In: SACMAT, pp 29–37

  35. Joshi J, Bertino E, Latif U, Ghafoor A (2005) A generalized temporal role-based access control model. IEEE Trans Knowl Data Eng 17(1):4–23

    Article  Google Scholar 

  36. Bonatti P, Galdi C, Torres D (2015) Event-driven RBAC. J Comput Secur 23(6):709–757

    Article  Google Scholar 

  37. Trnka M, Cerný T (2016) On security level usage in context-aware role-based access control. In: SAC, pp 1192–1195

  38. Hosseinzadeh S, Virtanen S, Rodríguez ND, Lilius J (2016) A semantic security framework and context-aware role-based access control ontology for smart spaces. In: SBD@SIGMOD, pp 1–6

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. S. M. Kayes.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kayes, A.S.M., Rahayu, W. & Dillon, T. Critical situation management utilizing IoT-based data resources through dynamic contextual role modeling and activation. Computing 101, 743–772 (2019). https://doi.org/10.1007/s00607-018-0654-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00607-018-0654-1

Keywords

Mathematics Subject Classification

Navigation