Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies
With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices (e.g., mobile phones or laptops) to publish social messages, facilitate remote e-health diagnosis, or monitor a variety of surveillance. Howe...
Saved in:
Published in | IEEE internet of things journal Vol. 6; no. 2; pp. 1471 - 1483 |
---|---|
Main Authors | , , , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
01.04.2019
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices (e.g., mobile phones or laptops) to publish social messages, facilitate remote e-health diagnosis, or monitor a variety of surveillance. However, security insurance for these activities remains as a significant challenge. Representation of security purposes and their enforcement are two main issues in security of cyberspace. To address these challenging issues, we propose a cyberspace-oriented access control model (CoAC) for cyberspace whose typical usage scenario is as follows. Users leverage devices via network of networks to access sensitive objects with temporal and spatial limitations. We generalize subjects and objects in cyberspace and propose scene-based access control. To enforce security purposes, we argue that all operations on information in cyberspace are combinations of atomic operations. If every single atomic operation is secure, then the cyberspace is secure. Taking applications in the browser-server architecture as an example, we present seven atomic operations for these applications. A number of cases demonstrate that operations in these applications are combinations of introduced atomic operations. We also design a series of security policies for each atomic operation. Finally, we demonstrate both feasibility and flexibility of our CoAC model by examples. |
---|---|
AbstractList | With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices (e.g., mobile phones or laptops) to publish social messages, facilitate remote e-health diagnosis, or monitor a variety of surveillance. However, security insurance for these activities remains as a significant challenge. Representation of security purposes and their enforcement are two main issues in security of cyberspace. To address these challenging issues, we propose a cyberspace-oriented access control model (CoAC) for cyberspace whose typical usage scenario is as follows. Users leverage devices via network of networks to access sensitive objects with temporal and spatial limitations. We generalize subjects and objects in cyberspace and propose scene-based access control. To enforce security purposes, we argue that all operations on information in cyberspace are combinations of atomic operations. If every single atomic operation is secure, then the cyberspace is secure. Taking applications in the browser-server architecture as an example, we present seven atomic operations for these applications. A number of cases demonstrate that operations in these applications are combinations of introduced atomic operations. We also design a series of security policies for each atomic operation. Finally, we demonstrate both feasibility and flexibility of our CoAC model by examples. |
Author | Li, Fenghua Han, Weili Chen, Jinjun Li, Zifu Guo, Yunchuan Chen, Lihua Wu, Ting |
Author_xml | – sequence: 1 givenname: Fenghua surname: Li fullname: Li, Fenghua email: lfh@iie.ac.cn organization: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China – sequence: 2 givenname: Zifu orcidid: 0000-0002-2879-9980 surname: Li fullname: Li, Zifu email: lizifu@iie.ac.cn organization: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China – sequence: 3 givenname: Weili orcidid: 0000-0001-8663-436X surname: Han fullname: Han, Weili email: wlhan@fudan.edu.cn organization: School of Computer Science, Fudan University, Shanghai, China – sequence: 4 givenname: Ting surname: Wu fullname: Wu, Ting email: wuting@hdu.edu.cn organization: School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China – sequence: 5 givenname: Lihua surname: Chen fullname: Chen, Lihua email: chenlihua29@163.com organization: Department of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China – sequence: 6 givenname: Yunchuan orcidid: 0000-0002-9611-5368 surname: Guo fullname: Guo, Yunchuan email: guoyunchuan@iie.ac.cn organization: State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China – sequence: 7 givenname: Jinjun surname: Chen fullname: Chen, Jinjun email: jchen@swin.edu.au organization: School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne, VIC, Australia |
BookMark | eNp9kD1PwzAQhi1UJAr0ByAWS8wp_siHw1YiPoqKylBGFDn2WbgKcbHdof-eRK0AMXDL3fA-d7rnFI061wFCF5RMKSXl9dN8uZoyQsWUCV6SPDtCY8ZZkaR5zka_5hM0CWFNCOmxjJb5GL1VuwZ82EgFydJb6CJoPFMKQsCV66J37Q2e4Z8Urt6llyqCtyFaFZJbGXrk2Wlosew0tjHgF9daZSGco2Mj2wCTQz9Dr_d3q-oxWSwf5tVskShW8pg0JOXapESD0aLggpQcSsmZyDQwATyTVDaNSZnJtKHKpHmZF4aJRilDCkj5Gbra791497mFEOu12_quP1mzoQgnNOtTdJ9S3oXgwdQbbz-k39WU1IPIehBZDyLrg8ieKf4wykYZ7aBG2vZf8nJPWgD4viR4TtP-vy_gG4KK |
CODEN | IITJAU |
CitedBy_id | crossref_primary_10_3390_s21206832 crossref_primary_10_1109_JIOT_2020_3016961 crossref_primary_10_1080_19393555_2023_2284761 crossref_primary_10_1109_ACCESS_2020_2969715 crossref_primary_10_1016_j_eng_2019_09_002 crossref_primary_10_1177_1550147719875653 crossref_primary_10_1109_TDSC_2022_3208934 crossref_primary_10_1109_JIOT_2021_3110142 |
Cites_doi | 10.1145/1952982.1952991 10.1016/j.cose.2013.08.012 10.1145/1128817.1128850 10.1109/TIFS.2015.2493983 10.1145/2613087.2613098 10.1109/TCC.2015.2469662 10.1007/s00607-013-0340-2 10.1049/iet-ifs.2016.0258 10.1109/TDSC.2015.2406705 10.1016/j.jnca.2016.11.016 10.1016/j.cose.2017.07.005 10.1145/2133601.2133616 10.1145/2752952.2752973 10.1145/1210263.1210265 10.1007/978-3-642-22365-5_18 10.1016/j.cose.2010.08.003 10.1145/2799979.2800034 10.1109/DSC.2017.100 10.1145/1533057.1533097 10.1145/2752952.2752962 10.1109/TC.2014.2366741 10.1145/2875491.2875495 10.1007/978-3-642-35743-5_13 10.1109/TDSC.2017.2786247 10.1016/j.cose.2015.04.013 10.1109/ICDCS.2002.1022279 10.1016/j.cose.2013.03.010 10.1109/CIS.2009.206 10.1007/978-3-319-26961-0_6 10.1155/2014/232708 10.1111/jcc4.12162 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2019 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/JIOT.2018.2839065 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE/IET Electronic Library CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2327-4662 |
EndPage | 1483 |
ExternalDocumentID | 10_1109_JIOT_2018_2839065 8361409 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61672515 funderid: 10.13039/501100001809 – fundername: National Basic Research Program of China (973 Program); National Key Research and Development Program of China grantid: 2016YFB0800303 funderid: 10.13039/501100012166 |
GroupedDBID | 0R~ 4.4 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABJNI ABQJQ ABVLG AGQYO AGSQL AHBIQ AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD IFIPE IPLJI JAVBF M43 OCL PQQKQ RIA RIE AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c293t-b043df40defd8738093e9a3285de28e35a1abbf42f5df1cf46967f28bccf07e43 |
IEDL.DBID | RIE |
ISSN | 2327-4662 |
IngestDate | Sun Jun 29 12:53:44 EDT 2025 Tue Jul 01 04:07:55 EDT 2025 Thu Apr 24 23:07:19 EDT 2025 Wed Aug 27 06:30:01 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 2 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-b043df40defd8738093e9a3285de28e35a1abbf42f5df1cf46967f28bccf07e43 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-2879-9980 0000-0002-9611-5368 0000-0001-8663-436X |
PQID | 2222203015 |
PQPubID | 2040421 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1109_JIOT_2018_2839065 crossref_citationtrail_10_1109_JIOT_2018_2839065 proquest_journals_2222203015 ieee_primary_8361409 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-04-01 |
PublicationDateYYYYMMDD | 2019-04-01 |
PublicationDate_xml | – month: 04 year: 2019 text: 2019-04-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE internet of things journal |
PublicationTitleAbbrev | JIoT |
PublicationYear | 2019 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref34 ref12 ref15 ref36 ref14 ref31 ref30 aktoudianakis (ref18) 2015 ref33 ref11 ref10 ref2 ref17 ref16 ref19 li (ref28) 2016; 37 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref27 karjoth (ref32) 2002 ref29 ref8 ref7 li (ref1) 2015 bishop (ref35) 2003 ref9 ref4 ref3 ref6 ref5 |
References_xml | – start-page: 69 year: 2002 ident: ref32 article-title: Platform for enterprise privacy practices: Privacy-enabled management of customer data publication-title: Proc Privacy Enhancing Technol Workshop – year: 2015 ident: ref1 publication-title: Access Control Technologies for Complex Network Envirnment – ident: ref29 doi: 10.1145/1952982.1952991 – ident: ref2 doi: 10.1016/j.cose.2013.08.012 – ident: ref10 doi: 10.1145/1128817.1128850 – ident: ref11 doi: 10.1109/TIFS.2015.2493983 – ident: ref14 doi: 10.1145/2613087.2613098 – ident: ref20 doi: 10.1109/TCC.2015.2469662 – ident: ref4 doi: 10.1007/s00607-013-0340-2 – ident: ref19 doi: 10.1049/iet-ifs.2016.0258 – ident: ref26 doi: 10.1109/TDSC.2015.2406705 – ident: ref22 doi: 10.1016/j.jnca.2016.11.016 – ident: ref34 doi: 10.1016/j.cose.2017.07.005 – ident: ref25 doi: 10.1145/2133601.2133616 – ident: ref15 doi: 10.1145/2752952.2752973 – ident: ref9 doi: 10.1145/1210263.1210265 – ident: ref33 doi: 10.1007/978-3-642-22365-5_18 – year: 2003 ident: ref35 publication-title: Computer Security Art and Science – volume: 37 start-page: 9 year: 2016 ident: ref28 article-title: Novel cyberspace-oriented access control model publication-title: J Commun – ident: ref27 doi: 10.1016/j.cose.2010.08.003 – ident: ref3 doi: 10.1145/2799979.2800034 – ident: ref6 doi: 10.1109/DSC.2017.100 – ident: ref31 doi: 10.1145/1533057.1533097 – ident: ref17 doi: 10.1145/2752952.2752962 – ident: ref12 doi: 10.1109/TC.2014.2366741 – ident: ref13 doi: 10.1145/2875491.2875495 – ident: ref30 doi: 10.1007/978-3-642-35743-5_13 – ident: ref21 doi: 10.1109/TDSC.2017.2786247 – ident: ref23 doi: 10.1016/j.cose.2015.04.013 – ident: ref7 doi: 10.1109/ICDCS.2002.1022279 – ident: ref36 doi: 10.1016/j.cose.2013.03.010 – ident: ref8 doi: 10.1109/CIS.2009.206 – year: 2015 ident: ref18 article-title: Relationship based access control – ident: ref16 doi: 10.1007/978-3-319-26961-0_6 – ident: ref5 doi: 10.1155/2014/232708 – ident: ref24 doi: 10.1111/jcc4.12162 |
SSID | ssj0001105196 |
Score | 2.187571 |
Snippet | With wide development of various information technologies, our daily activities are becoming deeply dependent on cyberspace. People often use handheld devices... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 1471 |
SubjectTerms | <italic xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">Z specification Access control Atomic properties Authorization Cloud computing Computer architecture Cyberspace Cyberspace-oriented access control (CoAC) Electronic devices Internet Object recognition Policies Remote monitoring security policy Social network services |
Title | Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies |
URI | https://ieeexplore.ieee.org/document/8361409 https://www.proquest.com/docview/2222203015 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwED2VTiwUKIhCQR6YEClObCcOW6mooFLp0kosKPKnhEAtoukAvx47SVu-hMiU4RxZenbenX33DuBUYm6oZDQIuZIuQCE4SJnkgUiYozcSKxz5eufhXXwzoYN7dl-D81UtjDGmSD4zHf9a3OXrmVr4o7ILTmKvz7QBGy5wK2u11ucpoXdG4uriMsTpxeB2NPa5W7zjKDTFnj4-UU_RS-XHD7hglX4Dhsv5lMkkT51FLjvq_ZtU438nvA1blXuJuuV62IGame5CY9m6AVU7uQkPvTfpyyyFMsHISx07xxN1i-aJqFdmr1-iLlpbod5XZefgytGfRr6V2jMSU40e8zkqRIZd6L0Hk_71uHcTVJ0WAuXoPg8kpkRbirWxmieE45SYVJCIM20ibggToZDS0sgybUNlXUwdJzbiUimLE0PJPtSns6k5ABSnobAsERExhLKECi0Zd1QZUy10yGQL8BKETFUy5L4bxnNWhCM4zTxumcctq3BrwdlqyEupwfGXcdPjsDKsIGhBe4l0Vu3SeRb5x8eE7PD3UUew6b6dlpk6bajnrwtz7JyQXJ4Uq-8DXMDZcg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED7xGGChQEEUCnhgQqQ4sZ04bKUClUfbpZVYUOSnhEAFQTrAr8dO0vIUIlOGs2Lps_Pd2XffARxIzA2VjAYhV9IFKAQHKZM8EAlz9EZihSNf79zrx90RvbxhN3NwNKuFMcYUyWem5V-Lu3z9qCb-qOyYk9jrM83DouN9FpbVWh8nKqF3R-Lq6jLE6fHlxWDos7d4y5Foij2BfCKfopvKj19wwSvnNehNZ1Smk9y3JrlsqbdvYo3_nfIqrFQOJmqXK2IN5sx4HWrT5g2o2st1uO28Sl9oKZQJBl7s2LmeqF20T0SdMn_9BLXRhxXqfNV2Dk4dAWrkm6k9IDHW6C5_QYXMsAu-N2B0fjbsdIOq10KgHOHngcSUaEuxNlbzhHCcEpMKEnGmTcQNYSIUUloaWaZtqKyLquPERlwqZXFiKNmEhfHj2GwBitNQWJaIiBhCWUKFlow7soypFjpksgF4CkKmKiFy3w_jISsCEpxmHrfM45ZVuDXgcDbkqVTh-Mu47nGYGVYQNKA5RTqr9ulLFvnHR4Vs-_dR-7DUHfaus-uL_tUOLLvvpGXeThMW8ueJ2XUuSS73ipX4DtuB3Ls |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyberspace-Oriented+Access+Control%3A+A+Cyberspace+Characteristics-Based+Model+and+its+Policies&rft.jtitle=IEEE+internet+of+things+journal&rft.au=Li%2C+Fenghua&rft.au=Li%2C+Zifu&rft.au=Han%2C+Weili&rft.au=Wu%2C+Ting&rft.date=2019-04-01&rft.issn=2327-4662&rft.eissn=2327-4662&rft.volume=6&rft.issue=2&rft.spage=1471&rft.epage=1483&rft_id=info:doi/10.1109%2FJIOT.2018.2839065&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_JIOT_2018_2839065 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2327-4662&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2327-4662&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2327-4662&client=summon |