scispace - formally typeset
Open AccessJournal ArticleDOI

An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things

TLDR
The proposed access control model provides a quick and efficient authorization decision support for administrators in collaborative domain and ensures a secure access in resource sharing in MIoT.
Abstract
Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration. Access control in resource sharing is very important for MIoT operation safety. This paper presents an access control model for resource sharing based on the role-based access control intended for multidomain MIoT. In multidomain systems, in order to response on the assigning request for permission for the certain role from the certain user, an authority action sequence named the authorization route is employed to determine an appropriate authorization state. In this paper, the best authorization route with the least spread of permissions is defined as an optimal authorization route. We employed an intelligent planning theory to model the authorization route problem and to develop a solution algorithm called PGAO*, which can support external evaluation of both single-goal-role authorization routes and multi-goal-role authorization routes. In addition, some simple policies for solving the authorization route problem are presented. The proposed access control model provides a quick and efficient authorization decision support for administrators in collaborative domain and ensures a secure access in resource sharing in MIoT.

read more

Citations
More filters
Journal ArticleDOI

Digital Twin Shop-Floor: A New Shop-Floor Paradigm Towards Smart Manufacturing

TL;DR: A novel concept of digital twin shop-floor (DTS) based on digital twin is explored and its four key components are discussed, including physicalShop-floor, virtual shop- Floor, shop- floor service system, and shop-ground digital twin data.
Journal ArticleDOI

Smart Contract-Based Access Control for the Internet of Things

TL;DR: A smart contract-based framework, which consists of multiple access control contracts, one judge contract (JC), and one register contract (RC), to achieve distributed and trustworthy access control for IoT systems is proposed.
Journal ArticleDOI

Machine Learning in IoT Security: Current Solutions and Future Challenges

TL;DR: This paper systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks, and sheds light on the gaps in these security solutions that call for ML and DL approaches.
Journal ArticleDOI

Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks

TL;DR: This paper proposes a model permissioned blockchain edge model for smart grid network (PBEM-SGN) to address the two significant issues in smart grid, privacy protections, and energy security, by means of combining blockchain and edge computing techniques.
Journal ArticleDOI

A Survey on Access Control in the Age of Internet of Things

TL;DR: This article aims to provide theoretical, methodological, and technical guidance for IoT search access control mechanisms in large-scale dynamic heterogeneous environments based on a literature review and analyzed the future development direction of access control in the age of IoT.
References
More filters
Journal ArticleDOI

Role-based access control models

TL;DR: Why RBAC is receiving renewed attention as a method of security administration and review is explained, a framework of four reference models developed to better understandRBAC is described, and the use of RBAC to manage itself is discussed.
Proceedings Article

Fast planning through planning graph analysis

TL;DR: A new approach to planning in STRIPS-like domains based on constructing and analyzing a compact structure the authors call a Planning Graph is introduced, and a new planner, Graphplan, is described that uses this paradigm.
Journal ArticleDOI

Protection in operating systems

TL;DR: A model of protection mechanisms in computing systems is presented and its appropriateness is argued and it can be shown that this problem is decidable, i.e. there is an algorithm to determine whether a system in a particular configuration is safe.
Journal ArticleDOI

Towards smart factory for industry 4.0

TL;DR: A smart factory framework that incorporates industrial network, cloud, and supervisory control terminals with smart shop-floor objects such as machines, conveyers, and products is presented and an intelligent negotiation mechanism for agents to cooperate with each other is proposed.
Journal ArticleDOI

Security of the Internet of Things: perspectives and challenges

TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail and discusses the security issues as a whole.
Related Papers (5)