Thursday, April 4, 2019

Risk-based Access Control Model for the Internet of Things

find of exposure- found entrance fee Control Model for the mesh of Things growing an adaptative Risk- found appendage come across archetype for the Internet of ThingsH apiece F. Atlam a, c Gary B. Wills a, Robert J. Walters a, Joshua Daniel ca electronic and calculator Science Dept., University of Southampton, UKb Security Futures Practice, BT Research Innovation, Ipswich, UKc Computer Science and Engineering Dept., Faculty of Electronic Engineering, Menoufia University, EgyptAbstract The Internet of Things (IoT) is creating a revolution in the number of connected devices. Cisco reported that on that point were 25 billion IoT devices in 2015 and modest estimation that this number leave al close to double by 2020. Society has become dependent on these billions of devices, devices that argon connected and communicating with individually other all(prenominal) the measure with reading constantly shargon between drug drug drug users, services, and meshwork proffer rs.The emergent IoT devices as a technology be creating a huge credentials rift between users and usability, sacrificing usability for hostage created a number of major answers. First, IoT devices are classified under Bring Your Own Device (BYOD) that blows any organization credentials limitation and project them a target for espionage or tracking. Second, the size of the selective knowledge generated from IoT makes big information problems pale in comparison not to mention IoT devices lead a real-time response. Third, is incorporating secure feeler and sway for IoT devices ranging from adjoin nodes devices to industriousness take (business intelligence reporting tools) is a challenge because it has to account for several hardware and application levels. Establishing a secure gravelion realise mock up between different IoT devices and services is a major milestone for the IoT. This is authorised because entropy leakage and illegitimate ingress to data conc ord a utmost strike on our IoT devices. However, traditional entre work models with the static and rigid infrastructure potbellynot run the undeniable security for the IoT infrastructure.Therefore, this paper notifys a jeopardize-establish rile control model for IoT technology that takes into account real-time data information prayer for IoT devices and gives propulsive feedback. The proposed model uses IoT environs features to estimate the security jeopardize associated with individually rag quest apply user stage setting, election sensitivity, fulfill severity and put on the line archives as arousals for security run a take chances estimation algorithm that is responsible for plan of attack decision. Then the proposed model uses pain contracts to provide reconciling features in which the user deportment is monitored to take note any abnormal actions from important users.Keywords Security, Internet of Things, Risk, ingress control, Adaptive, circ umstance.The Internet of Things (IoT) is growing in different ways. The adoption rate of the IoT is at least five times fast-paced than the adoption of electricity and telephony 1. Moreover, it is becoming the backbone of the future of the Internet that encompasses various applications and devices. The IoT devices are link employ different communication technologies such(prenominal) as wireless, wired and mobile networks 2.The concept of the IoT was first mentioned by Kevin Ashton in 1999 3. He has said, The Internet of Things has the potential to change the world, just as the Internet did. Maybe dismantle more so. Later, the IoT was formally pre displaceed by the International Telecommunication Union (ITU) in 2005 4. The ITU defines the IoT as a ball-shaped infrastructure for the Information Society, enabling advanced services by interconnecting (physical and virtual) things based on, existing and evolving, interoperable information and communication technologies5.The IoT face s many challenges that stand as a barrier to the successful execution of instrument of IoT applications. The security is considered the most difficult challenge that postulate to be addressed. This challenge is more complicated due to the dynamic and complex nature of the IoT system 6, 7. Authentication and main course control models are the essential elements to address the security issue in the IoT. They can prevent un clear users from gaining entre to system preferences, prevent authorized users from entrying resources in an unauthorized manner and allow authorized users to admission price resources in an authorized manner 8, 9.The briny purpose of the access control is to reject unauthorized users and limit summonss of authorized users using a certain device. In addition, it tries to prevent the activity that could cause a security br for each one 7. A powerful access control model should satisfy security requirements of confidentiality, integrity, and availability 10. T raditional access control addresses are static in nature as they depend on preoutlined policies that always give the same payoff regardless of the event. They are context insensitive. Furthermore, they require a rigid authentication infrastructure 11, 12. So they cannot provide for distributed and dynamic environment as the IoT systems 13. propellant access control appeales are more appropriate to the IoT. This is because they are characterized by using not only the policies but also environment features that are estimated in real-time to determine access decisions. The dynamic features can include trust, endangerment, context, level and operational need 14, 15.This paper presents an reconciling attempt-based access control model for the IoT. This model can dynamically estimate the security guess associated with each access request to make the access decision. It uses real-time user context attributes, resource sensitivity, action severity and fortune record as inputs to estimate the security try value of each access request. In addition, the user appearance is monitored to detect any abnormal misuse.This paper will start by discussing concepts of access control in the IoT in section II function III presents access control challenges in the IoT Section IV introduces different access control models Section V discusses the concept of seek-based access control model Section VI presents the proposed model Section VII illustrates the subroutine flow of the proposed model Section VIII presents the colligate to works, and Section IX is the conclusionThe IoT devices send and receive a variety of information about possessors sort. Therefore, it is important to protect not only the communication process between IoT devices but also authentication and access control of IoT devices 16. The access control process works with many layers of the IoT reference model that is shown in determine 1. The control process flows from top to down. Therefore, the access control works with different data whether at storage, at motion, or at IoT device itself. Therefore, the access control is a big issue in the IoT that need addressing.Fig. 1. The IoT reference model 16The main function of access control is to grant access rights only to authorized users. Also, it prevents authorized users from accessing system resources in an unauthorized manner 7. A powerful access control model should fulfill security demands of confidentiality, integrity, and availability 10. In the IoT, the access control is required to ensure that only authorized users can update device software, access sensor data or command the actuators to perform an operation 17. There are three ways to implement access control in the IoT systems centralized, centralized and contextual, and distributed 18.In the centralized approach, the access control logic is enforced at a central entity. This entity could be a server with direct communication to IoT devices that it commands or another entity in a different location. Therefore, IoT devices send their data to the central entity that is responsible for make access control decisions 18.In the centralized and contextual approach, IoT devices are not completely passive entities this is because they participate in the access control decisions. The access control logic is implemented at a central entity as in centralized approach, but the contextual features from IoT devices are sent to the central entity. These features are utilize to make access decisions 18.In the distributed approach, all the access control logic is embedded into IoT devices. These devices are being provided with necessary resources to process and send information to other services and devices. Therefore, IoT devices take over to shed the ability to perform the authorization process without the need for a central entity 18.Due to the distributed and dynamic nature of the IoT, on that point are many challenges that should be addressed wh en implementing an access control model. These requirements includeInteroperability with six-fold users Access control policies should be designed to support multiple organizations. For instance, each organization creates its own policies and compliments other collaborating organizations policies 24.Dynamic interaction Access control policies should be predictable and specified in a dynamic and continuous way by considering context changing during the access control process 25.Context awareness The context is considered one of the core features since it enables intelligent interactions between users and IoT devices. Using the context will make access decisions dynamically determined based on surrounding environment features 17.Usability The access control model should be easily administrated, expressed and modified. It also should provide suitable easy to use interfaces for both(prenominal) consumers and devices postulate 26.Limited resources The resources associated with IoT de vices such as energy, memory, and processing power are limited due to devices lightweight. Therefore, the access control model designed for the loT should support efficient solutions 17.Scalability The IoT connects billions of devices. The access control model should be protrusible in size, structure, and number of devices 17.Delegation of authority In many IoT scenarios, there are many devices that are operating on behalf of a user and other scenarios where a device may operate on a third partys behalf for a specific period of time. The access control model should implement commission of authority to provide more usability and flexibility to the IoT system 24.Auditability Any and every access control take to be auditable. Hence, collection and storage of evidence necessary for context awareness. This becomes a challenge when utilizing a distributed approach 17.To ensure confidentiality and integrity of system resources, the access control is apply to guarantee that only authori zed users minded(p) the appropriate access permissions. There are several access control models which can be change integrity into two classes traditional and dynamic access control models 19.Traditional access control approaches are based on policies that are static and rigid in nature. These policies are predefined and always give the same outcome regardless of the situation. Therefore, this static approach fails to adapt to varied and changing conditions during making access decisions 20. There are three main traditional access control models Discretionary Access Control (DAC), Mandatory Access Control (mackintosh) and Role-based Access Control (RBAC).DAC model was designed for multi-user databases and systems with a few previously known users. entirely the system resources are under full control from the user. DAC grants access depending on the user identity and authorization, which is defined for open policies. The owner of the resource can grant the access to any user 19. W hile MAC model is concerned with confidentiality and integrity of information, so it chiefly used in military and government applications. In MAC, the security policy is controlled by a security policy executive and the user does not prepare the capability to override it 19. RBAC model is consists of three elements users ( looses requesting access), roles (collection of permission) and operations (actions on target resource). Access permissions are related to roles and the appropriate role is granted to the user. A single user can be associated with one or more roles, and a single role can include one or more user. RBAC provides a classification of users based on their roles 21.Dynamic access control models are characterized by using not only the access policies but also dynamic contextual features which are estimated in real-time at the time of the request 22. These real-time features can include trust, take a chance, context, history and operational need 23, 14. In this paper, we propose a run a find-based access control model that uses the security endangerment as the main criterion for making the access permissions.The risk can be defined as the possibility of loss or injury. Generally, the risk is about some event that may occur in the future and cause losses. One such risk is the leakage of sensitive information by users. The access control is one of the approaches used to moderate against the security risk 27. Risk-based access control model permits or denies access requests dynamically based on the estimated risk of each access request 20. This model performs a risk analysis on each user access request to make the access decision 7. Mathematically, the most common formula to match the risk in quantitative terms is (1)Where likelihood represents the opportunity of an incident to happen season impact represents the estimation of the value of the damage regarding that incident 20.Quantified risk-based access control models are divided into two types non- reconciling and adaptational. The implicit in(p) distinction between adaptive and non-adaptive approaches is that the adaptive model requires a system monitoring process and the risk estimation module adaptively adjusts user permissions based on the users activities during access sessions. While non-adaptive approach only calculates the risk during each session creation and does not have run-time monitoring and abnormality detection capability 11.Dynamic access control approaches use real-time environment features to make the access decision. One of these features is the security risk associated with the access request, which will be used in our proposed model to make the access decision. The proposed model is shown in figure 2.The proposed model has four inputs user/ performer context, resource sensitivity, action severity and risk history. These inputs/risk factors are used to estimate the security risk value associated with each access request. The final risk value i s then compared with risk policies to make the access decision. To make the model adaptive, the user bearing is monitored to detect any abnormal actions from authorized users. This model can provide an appropriate security level while ensuring flexibility and scalability to the IoT system.Fig. 2. The proposed adaptive risk-based access control modelAs shown in figure 2, the user/agent context represents the environmental features that are embedded with the user/agent at the time of making the access request. These contexts are used to determine the security risk value associated with the user requesting the access to the system. Location and time are the most common user contexts 28. Resource sensitivity represents how valuable the resource/data is to the owner or to the service provider. Data is assigned a level of sensitivity based on who should have access to it and how much damage would be done if it were disclosed. A risk metric is assigned to each resource in the IoT system d epending on how valuable the resource data is to the owner. For instance, the higher(prenominal) the data sensitivity, the higher the risk metric associated with the resource. Action severity represents the consequences of a certain action on a forged-tempered resource in terms of security requirements of confidentiality, integrity, and availability. Different operations have different impacts and so have different risk determine. For instance, the risk of a view operation is lower than the risk of a delete operation. The user risk history is used to estimate the risk value of each access request. This is because the risk history reflects previous users behavior patterns. Moreover, it is used to identify good and bad authorized users and predict the user future behavior. Risk estimation module is responsible for taking the input features to quantify the risk value that is associated with the access request. The ultimate goal is to develop an efficient risk estimation process. Th e access decision determines whether access is granted or denied according to the risk policies. Risk policies or access control policies are mainly used by the risk estimation module to make the access decisions. These policies are created by the resource owner to identify terms and conditions of granting or denying the access. The overall risk value is examined with the risk policies to determine the access decision.The proposed model is trying to improve the flexibility of access control by monitoring the user behavior during the access session. In current access control models, if the decision is to grant access to the user, then there is no way to prevent any abnormal and unusual data access from the authorized user. So a monitoring module is needed to adaptively adjust the risk value based on the user behavior during the access session. Applying chichi contracts to accomplish this process is a big challenge especially it will be the first time to use the smart contracts in th is context. Smart contracts are treated as a software code that runs on a blockchain 29. It can force a functional implementation of particular demands and can confirm that certain conditions or terms were met or not 30. Hence, the monitored user behavior information will be compared with the smart contract to ensure that the user acts according to the terms of the smart contract so as to prevent any potential security breach during the access sessions.The process flow of the proposed model is shown in figure 3. The flow starts when the access control manager receives an access request from a user. After that, the access control manager asks for the system contexts (user/agent, resource, and action) of the requested user in addition to the user risk history. The risk estimation module uses these contexts with the risk history to estimate the overall access risk value related to the requested user, then the estimated risk value is compared with risk policies to determine the access d ecision. At this point, we have two decisionsa) If the access is granted, then the monitoring module will track the user behavior. The smart contract will use the monitored data to determine if the user follows the contract terms or not. If yes, then it will keep monitoring the user behavior, while if not, then it will return to the risk estimation module to reduce user permissions or terminate the access session to stop any security breach.b) If the access is denied, then the system asks the user to provide additional proof of identification so as not to block an authorized user and reduce the false-positive rate. If the user provides the required identification, then the access is granted and the flow continues as in the first decision, while if not, the system denies the access.Fig. 3. The process flow of the adaptive risk-based access control modelThis section provides a brief summary of the models that are related to the proposed model. A number of studies have been conducted t he security risk for dynamic access control models. The JASON report 31 proposed three main elements for a risk-based access control model estimating the risk value associated with each access request, identifying acceptance levels of risk in a certain domain, and controlling information sharing based on the estimated risk and access control policies.Risk Adaptable Access Control (RAdAC) model has been proposed by McGraw 32. It is based on estimating the security risk and operational needs to grant or deny the access. This model estimates the risk associated with each access request then compares it with the access control policy. After that, the system verifies the operational needs if the associated operational needs and the policy are met then access is granted. However, the author did not provide details about how to quantitatively estimate risk and operational needs. Also, Kandala et al. 33 have provided an approach that identifies different risk components of the RAdAC model u sing attribute-based access control approach.A dynamic and flexible risk-based access control model has been proposed by Diep et al. 12. This model uses the risk assessment to estimate the risk value depending on outcomes of actions in term of availability, confidentiality, and integrity. However, this model did not provide a standard about how to evaluate the risk value for each state of the environment and for each outcome of action, did not use user context, and lacked risk adaptive features.A framework proposed by Khambhammettu et al. 34 that based on estimating object sensitivity, pillow slip trustworthiness, and the difference between object sensitivity and egress trustworthiness using a risk assessment. However, the model did not provide how to estimate the risk value for each situation of the environment. Besides, the model requires a system administrator to give a reasonable value for each input feature in the early state of the risk assessment process and lacked risk ada ptive features.A fuzzy Multi-Level Security (MLS) access control model has been proposed to manage risk information flows based on estimating its operational needs, risk possibility and environment features 20. It estimates the risk based on the difference between subject security level and object security level. Similarly, Ni, Bertino, Lobo 35 have proposed a risk-based access control model that based on fuzzy inferences. It showed that fuzzy inference is a good approach for estimating access security risks. However, both models ignored the past behavior of users in the risk estimation process, lacked risk adaptive features and time operating expense of fuzzy inference system is high.A fuzzy-based risk access control model has been proposed by J. Li, Bai, rain tree 27 to estimate the risk of healthcare information access. A risk metric is associated with data sensitivity, action severity, and risk history as a fuzzy value to determine the appropriate control of healthcare infor mation access in a cloud computing. However, this model did not provide how to quantitatively estimate the risk. Also, no clear risk boundaries are defined and lacked risk adaptive features.A dynamic risk-based decision method has been proposed by Shaikh et al. 14. This method is based on using the past behavior to identify good and bad authorized users. It depends on granting reward and penalty points to users after the completion of transactions. However, the past user behavior (reward/penalty) values are not decorous to decide the access decision. Besides, no risk prediction technique is used and lacked risk adaptive features.A risk analysis approach has been proposed by Rajbhandari Snekkenes 36 to provide access decisions dynamically. This approach is based on preferences or values of benefit which subjects can provide rather than subjective opportunity using the game theory. A simple privacy scenario between a user and an online bookstore is introduced to provide an initial perception of the concept. However, using only benefits of the subject to determine the access decision is not enough to develop a flexible and scalable access control model. Also, it lacked risk adaptive features.A task-based access control model has been proposed by Sharma et al. 37 to estimate the risk value using functions that based on the action a user wants to perform. The risk value is computed in terms of different actions and corresponding outcomes. The outcomes and the risk probability are determined along with the level of data sensitivity. The previous users behavior patterns are then used to estimate the overall risk value. The estimated risk value is compared with the risk threshold to determine the access decision. However, it lacked risk adaptive features.A contextual risk-based access control model has been proposed by Lee et al. 13. The model gathers all useful information from the environment and evaluates them from the security perspective. Risk assessment with multifactor evaluation process (MFEP) technique is apply to estimate the associated risk value. The risk value is based on outcomes of actions in term of availability, confidentiality, and integrity. This model is evaluated to manage the access control in a hospital. However, this model ignored the past user behavior and risk adaptive features as well.A risk-based access control model has been proposed by Dos Santos et al. 7. This model active the notion of quantifying risk metrics and aggregating them. It is based on the idea of risk policies, which allow service providers and resource owners to define their own metrics, allowing greater flexibility to the access control system. However, this model requires a system administrator to ensure the minimum security is achieved.Table 1 provides a summary of the related risk-based access control models. It contains the risk estimation technique used to estimate the risk value in each model, risk factors used to estimate the risk value and the limitations of each model regarding our proposed model.In summary, one can plead that the problem of the access control, especially in the IoT, needs more investigation. Current access control models press only on providing access decisions without providing any way to prevent any abnormal and unusual data access from authorized users, whereas our approach is based on providing the access decision and monitoring the user behavior to detect any abnormal actions. The novelty of our approach is based on providing the adaptive features and requesting user context attributes to the risk-based access control in the IoT system. To the best of my knowledge, using smart contracts to monitor the user access behavior will be the first try.Table 1. Some of the risk-based access control modelsPrevious workRisk Estimation methodRisk factorsLimitations20Fuzzy MLS ModelDifference between subject security level and object security levelThe user past behavior has not been used to detect use r future behavior and lacked adaptive features.27Fuzzy ModelData sensitivity, action severity, and user risk historyNo clear risk boundaries are defined and lacked adaptive features.35Fuzzy InferenceObject security level and subject security levelTime overhead of fuzzy inference is high and lacked adaptive features.34Risk AssessmentObject sensitivity, subject trust and difference between themUser risk history has not been used and lacked adaptive features.14Risk AssessmentHistory of reward and penalty pointsLimited risk factors, no risk prediction technique is used and lacked adaptive features.36Game TheoryAccess benefits of the subjectLimited risk factors and lacked adaptive features.37Mathematics FunctionsData Sensitivity, action severity, and risk historyNo risk prediction technique has not been used, lacked adaptive features and user context.13Risk AssessmentOutcomes of actionsLimited risk factors, lacked adaptive features and user context.12Risk AssessmentOutcomes of actionsLim ited risk factors, no risk prediction technique has been used, lacked adaptive features and user context.7Mathematics FunctionsRisk policiesLimited risk factors and lacked adaptive features.The IoT has become a widely examined subject that takes the attention of many researchers, specialists, and experts. Due to the dynamic nature of the IoT, traditional access control approaches cannot provide required security levels as they are based on a static and complex authentication infrastructure. Therefore, the ground of this paper is to develop a dynamic and adaptive risk-based access control model for the IoT. This model can adapt to IoT changing conditions. The proposed model can be realized by estimating the security risk using IoT real-time features at the time of the access request to make the access decision. The model uses user context, resource sensitivity, action severity and risk history as inputs to estimate the overall risk value associated with each access request. The mode l provides adaptive features to monitor user behavior and prevents any misuses from authorized users using smart contracts.The above work is still in the first stage. In future work, choosing the most appropriate risk estimation technique for a specific IoT context is our highest priority to proceed to implement the model as well as creating different IoT access control case studies with data to evaluate the model.AcknowledgmentWe love Egyptian cultural affairs and mission sector and Menoufia University for their scholarship to Hany Atlam that allows the research to be undertaken.References1S. Li, L. Da Xu, and S. Zhao, The internet of things a survey, Inf. Syst. Front., vol. 17, no. 2, pp. 243-259, 2015.2M. Elkhodr, S. Shahrestani, and H. Cheung, The Internet of Things Vision challenges, IEEE 2013 Tencon Spring, TENCONSpring 2013 Conf. Proc., pp. 218-222, 2013.3K. Ashton, That Internet of Things Thing, RFID J., p. 4986, 2

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.