Next Article in Journal
Automatic Emotion Recognition for the Calibration of Autonomous Driving Functions
Previous Article in Journal
A Machine Learning and Integration Based Architecture for Cognitive Disorder Detection Used for Early Autism Screening
Open AccessArticle

Access Control Role Evolution Mechanism for Open Computing Environment

by Aodi Liu 1,2, Xuehui Du 1,2,* and Na Wang 1,2
1
Information Engineering University, Zhengzhou 450000, China
2
He’nan Province Key Laboratory of Information Security, Zhengzhou 450000, China
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(3), 517; https://doi.org/10.3390/electronics9030517
Received: 16 February 2020 / Revised: 12 March 2020 / Accepted: 19 March 2020 / Published: 21 March 2020
(This article belongs to the Section Computer Science & Engineering)
Data resources in open computing environments (including big data, internet of things and cloud computing) are characterized by large scale, wide source, and strong dynamics. Therefore, the user-permission relationship of open computing environments has a huge scale and will be dynamically adjusted over time, which enables effective permission management in the role based access control (RBAC) model to become a challenging problem. In this paper, we design an evolution mechanism of access control roles for open computing environments. The mechanism utilizes the existing user-permission relationship in the current system to mine the access control role and generate the user-role and role-permission relationship. When the user-permission relationship changes, the roles are constantly tuned and evolved to provide role support for access control of open computing environments. We propose a novel genetic-based role evolution algorithm that can effectively mine and optimize roles while preserving the core permissions of the system. In addition, a role relationship aggregation algorithm is proposed to realize the clustering of roles, which provides a supplementary reference for the security administrator to give the role real semantic information. Experimental evaluations in real-world data sets show that the proposed mechanism is effective and reliable. View Full-Text
Keywords: data security; access control; role evolution; role mining; genetic algorithm data security; access control; role evolution; role mining; genetic algorithm
Show Figures

Figure 1

MDPI and ACS Style

Liu, A.; Du, X.; Wang, N. Access Control Role Evolution Mechanism for Open Computing Environment. Electronics 2020, 9, 517.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop