Font Size: a A A

Research On Access Control And Policy Anomaly Detection Technology Of Cross-domain Iot Platform Based On ABAC Model

Posted on:2022-06-17Degree:MasterType:Thesis
Country:ChinaCandidate:G C YouFull Text:PDF
GTID:2518306740994399Subject:Cyberspace security
Abstract/Summary:PDF Full Text Request
With the rapid development of network and information technology,the technology of Internet of Things has been applied on a large scale,which accelerates information exchange and greatly facilitates people's daily life.The rapid development of technology will also bring about new security problems,which provide conditions for criminals to steal resources maliciously.Therefore,ensuring the security of the Internet of Things system has long been the most important goal.In the current increasingly complex Io T environment,Io T systems in different domains are in isolation,which makes Io T data often have the characteristics of crossdomain and heterogeneous.At present,how to ensure the secure interaction of Io T data between different security domains,how to ensure the access security of cross-domain systems and how to efficiently detect abnormal policies are the main Io T security problems.Therefore,in view of the above security issues,the main research work of this paper is as follows:(1)Aiming at the characteristics of inter-domain isolation and intra-domain interconnection of cross-domain Io T system,this paper proposes a TE-ABAC access control model applicable to cross-domain Io T platform on the basis of attribute access control model.Based on the concept of trust in social relations and the ideas of authentication and blacklist in the security field,the cross-security domain access control mechanism is proposed.At the same time,the trust evaluation model is used to calculate the trust degree from multiple dimensions such as direct,indirect and recommendation.Finally,the TE-ABAC access control model is simulated and compared.(2)Based on the TE-ABAC access control model,this paper proposes a policy anomaly detection algorithm to solve the problem of low detection efficiency in the anomaly detection process of access control policies.This algorithm combines the idea of clustering algorithm and trust attribute of TE-ABAC model,takes the rule similarity as clustering index,can detect and classify different types of exception strategies,can detect exception strategies efficiently,and has certain scalability.In addition,the performance of this algorithm is tested and compared,and the computational efficiency of this algorithm is proved.(3)In this paper,the TE-ABAC access control model and the strategy anomaly detection algorithm based on clustering idea are implemented.At the same time,combined with the characteristics of the cross-domain Internet of Things system,the overall design architecture of the Io T cross-domain access control system is given,and the system database and main functional modules are designed.In the actual environment,the access control-related functions and policy anomaly detection functions of the Io T cross-domain access control system are tested to ensure the correctness of the TE-ABAC access control model and system architecture.
Keywords/Search Tags:Internet of Things, cross-domain, attribute-based access control model, trust evaluation, policy anomaly detection
PDF Full Text Request
Related items