Next Article in Journal
Assessing Lisbon Trees’ Carbon Storage Quantity, Density, and Value Using Open Data and Allometric Equations
Previous Article in Journal
Es-Tacotron2: Multi-Task Tacotron 2 with Pre-Trained Estimated Network for Reducing the Over-Smoothness Problem
Previous Article in Special Issue
An Efficient Robust Multiple Watermarking Algorithm for Vector Geographic Data
Open AccessArticle

Game Analysis of Access Control Based on User Behavior Trust

by Yan Wang 1,2,*, Liqin Tian 3 and Zhenguo Chen 3
1
Department of Computer, QingHai Normal University, Xining 810008, China
2
College of Physics and Electronic Information Engineering, Qinghai Nationalities University, Xining 810007, China
3
Department of Computer, North China Institute of Science and Technology, Beijing 101601, China
*
Author to whom correspondence should be addressed.
Information 2019, 10(4), 132; https://doi.org/10.3390/info10040132
Received: 13 February 2019 / Revised: 2 April 2019 / Accepted: 3 April 2019 / Published: 9 April 2019
(This article belongs to the Special Issue The Security and Digital Forensics of Cloud Computing)
Due to the dynamics and uncertainty of the current network environment, access control is one of the most important factors in guaranteeing network information security. How to construct a scientific and accurate access control model is a current research focus. In actual access control mechanisms, users with high trust values bring better benefits, but the losses will also be greater once cheating access is adopted. A general access control game model that can reflect both trust and risk is established in this paper. First, we construct an access control game model with user behavior trust between the user and the service provider, in which the benefits and losses are quantified by using adaptive regulatory factors and the user’s trust level, which enhances the rationality of the policy making. Meanwhile, we present two kinds of solutions for the prisoner’s dilemma in the traditional access control game model without user behavior trust. Then, due to the vulnerability of trust, the user’s trust value is updated according to the interaction situation in the previous stage, which ensures that the updating of the user’s trust value can satisfy the “slow rising-fast falling” principle. Theoretical analysis and the simulation experiment both show that this model has a better performance than a traditional game model and can guarantee scientific decision-making in the access control mechanism. View Full-Text
Keywords: access control; user behavior trust; game theory; prisoner’s dilemma access control; user behavior trust; game theory; prisoner’s dilemma
Show Figures

Figure 1

MDPI and ACS Style

Wang, Y.; Tian, L.; Chen, Z. Game Analysis of Access Control Based on User Behavior Trust. Information 2019, 10, 132.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop