2019
DOI: 10.14569/ijacsa.2019.0100265
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Fine-Grained Access Control Mechanism for Privacy Protection and Policy Conflict Resolution

Abstract: Access control is a security technique that specifies access rights to resources in a computing environment. As information systems nowadays become more complex, it plays an important role in authenticating and authorizing users and preventing an attacker from targeting sensitive information. However, no proper consideration has been fully investigated so far in privacy protection. While many studies have acknowledged this issue, recent studies have not provided a fine-grained access control system for data pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
5

Relationship

3
7

Authors

Journals

citations
Cited by 28 publications
(12 citation statements)
references
References 19 publications
0
12
0
Order By: Relevance
“…Moreover, instead of dealing with security requirements such as collecting data from IoT devices, defining roles for each data user, this paper focuses on data management in the Microsoft’s Azure cloud. These above solutions did not solve the key problems of access control in the IoT platform; it merely introduced the traditional solution for data protection based on the RBAC model ( Son & Chen, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, instead of dealing with security requirements such as collecting data from IoT devices, defining roles for each data user, this paper focuses on data management in the Microsoft’s Azure cloud. These above solutions did not solve the key problems of access control in the IoT platform; it merely introduced the traditional solution for data protection based on the RBAC model ( Son & Chen, 2019 ).…”
Section: Related Workmentioning
confidence: 99%
“…To develop a larger scenario and increase the number of devices/users authorized quickly, other security issues such as security, privacy, availability for objects are still the challenges. For the security aspect, further works will be deployed in different scenarios like healthcare environment [25], [26], [27], cash on delivery [28], [29]. For the privacy aspect, we will exploit attribute-based access control (ABAC) [30], [31] to manage the authorization process of the SIP-MBA Platform via the dynamic policy approach [32], [33], [34].…”
Section: Future Workmentioning
confidence: 99%
“…To develop a larger scenario and increase the number of devices/users authorized quickly, other security issues such as security, privacy, availability for objects are still the challenges. For the security aspect, further works will be deployed in different scenarios like healthcare environment [26], [27], [28], cash on delivery [29], [30]. For the privacy aspect, we will exploit attribute-based access control (ABAC) [31], [32] to manage the authorization process of the IoT Platform via the dynamic policy approach [33], [34], [35].…”
Section: E Future Workmentioning
confidence: 99%