skip to main content
10.1145/3199478.3199494acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

A Role and Node Based Access Control Model for Industrial Control Network

Authors Info & Claims
Published:16 March 2018Publication History

ABSTRACT

A role and node based access control model(RNBAC model) for industrial control network is proposed, which is aimed at satisfying the high-security requirements in the industrial control network by improving the problem of static authorization in a role-based access control model(RBAC model). The RNBAC model utilizes the deterministic characteristics of nodes in the industrial control network and the predictable characteristics of node information, and introduces a series of concepts such as nodes. First, give the formal definition of RNBAC model. Then, discuss the node trust calculation, user access threshold calculation and user trust value. Finally, verify that the RNBAC model can dynamically manage user access behavior in a scenario of the industrial control network, laying a foundation in the use of RNBAC model in the real environment.

References

  1. Ferraiolo D F, Kuhn D R. Role-based access control {C}. In Proceedings of the 15th National Computer Security Conference. Baltimore, USA, 1992, 08. 554--563.Google ScholarGoogle Scholar
  2. Sandhu R, Coyne E, Feinstein H, et al. Role-based access control models {J}. IEEE Computer, 1996, 02, 29(2): 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles {J}. ACM Transactions on Information and System Security, 1997, 2 (1): 105--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ferraiolo D F, Sandhu R, Gavrila S, et al. Proposed NIST standard for role-based access control {J}. ACM Transactions on Information and System Security, 2001, 08, 4(3): 224--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Thomas R, Sandhu R. Task-based authorization controls (TBAC): A Family of models for active and enterprise oriented authorization management {A}. In Proceedings of the 11th IFIP WG11. 3 Conference on Database Security {C}.Lake Tahoe, 1997, 08. 166--181. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Freudenthal E, Pesin T, Port L, et al. dRBAC: Distributed role-based access control for dynamic coalition environments {A}.In Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS 02) {C}. Vienna, Austria, IEEE Computer Society, 2002, 07. 411--420. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Liu S Y, Huang J H. Role-based access control for distributed cooperation environment {A}. In Proceedings of 2009 International Conference on Computational Intelligence and Security{C}. Beijing, China, IEEE Computer Society, 2009, 12. 455--459. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ma M C, Woodhead S. Constraint-enabled distributed RBAC for subscription-based remote network services {A}. In Proceedings of the Sixth IEEE International Conference on Computer and Information Techno logy (CIT 06) {C}. 2006, 09. 01--06. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Bertino E, Bonatti P, Ferrari E. TRBAC: A Temporal Role-Based Access Control Model {J}. ACM Transactions on Information and System Security, 2001, 08, 4(3): 191--223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jo shi J B D, Bertino, Latif U, et al. A generalized temporal Role-based access control model {J}. IEEE Transactions on Knowledge and Data Engineering, 2005, 01, 17(1): 04--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Yu Wanjun, Shen Bin, Zhou Lanfeng. Access control based on role and trust and its implementation on Hadoop{J}. Modern Electronics Technique, 2017, 12, 40(24), 9--14.Google ScholarGoogle Scholar
  12. Wang Yuding, Yang Jiahai. Data access control model based on data's role and attributes for cloud computing{J}. J Tsinghua Univ (Sci & Technol), 2017, Vol.57, No.11, 1150--1158.Google ScholarGoogle Scholar
  13. Xing Xuliang, Tian Xiuxia. A Novel Trust-based Dynamic Access Control Model{J}. Journal of Shanghai University of Electric Power, 2017, 12, Vol.33, No.6, 591--596.Google ScholarGoogle Scholar
  14. Lei Lei, Cai Quanwei, Jing Jiwu, el at. Enforcing access control on encrypted cloud storage with policy hiding{J}. Ruan Jian Xue Bao/Journal of software, 2016, 27(06), 1432--1450.Google ScholarGoogle Scholar
  15. Fang Liang, Yin Lihua, Guo Yunchuan, Fang Binxing. A Survey of Key Technologies in Attribute-Based Access Control Scheme, 2016, Vol.39: Online Publishing No.79.Google ScholarGoogle Scholar
  16. Li Fenghua, Wang Yanchao, Yin Lihua. Novel cyberspace-oriented access control model, Journey on Communications, 2016, Vol37, No5, 9--20.Google ScholarGoogle Scholar

Index Terms

  1. A Role and Node Based Access Control Model for Industrial Control Network

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy
      March 2018
      187 pages
      ISBN:9781450363617
      DOI:10.1145/3199478

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 March 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader