Back to Search Start Over

Multi-domain authorization and decision-making method of access control in the edge environment

Authors :
Sun, Yongxia
Jiang, Weijin
Yang, Ying
Zhu, Haoran
Jiang, Yirong
Source :
Computer Networks The International Journal of Computer and Telecommunications Networking. June, 2023, Vol. 228
Publication Year :
2023

Abstract

Keywords Access control; Multi-domain Authorization; Mutual trust mechanism Abstract The problem of mutual trust between users and edge nodes in an edge computing environment is a sufficient guarantee for the double security of edge computing service users and service providers. How to achieve the user's security and credibility and ensure the trust of the edge service nodes is a serious challenge facing the security of edge computing. Therefore, the research target of this paper is to establish the mutual trust relationship between users and edge service nodes and to formulate dynamic access control strategies. While realizing user security and trustworthiness in the edge environment, it also ensures the trustworthiness of service nodes. The research content of this paper is the access control model of mutual trust between nodes and users in the edge computing environment. This model closely combines trust management with the RBAC (Role Based Access Control) model. Given the multi-domain characteristics of the edge computing environment, the intra-domain access control and cross-domain access control strategies based on mutual trust are implemented, which realizes the improvement and expansion of the RBAC model in the edge computing environment. The performance of EUSMTM is compared and analyzed through simulation experiments, and the validity of the trust model between users and edge servers is verified. Then through the comparative experiment of two-way trust and one-way trust between edge users and edge servers, the advantages of access control based on two-way trust in the EUSMTM model are analyzed. Author Affiliation: (a) School of Computer Science, Hunan University or Technology and Business, Changsha, 410205, China (b) Xiangtan Institute of Technology, Xiangtan University, Xiangtan City, Hunan Province, China * Corresponding author. Article History: Received 28 March 2022; Revised 6 September 2022; Accepted 15 March 2023 Byline: Yongxia Sun (a), Weijin Jiang [jwj3666@163.com] (a,*), Ying Yang (a), Haoran Zhu (a), Yirong Jiang (b)

Details

Language :
English
ISSN :
13891286
Volume :
228
Database :
Gale General OneFile
Journal :
Computer Networks The International Journal of Computer and Telecommunications Networking
Publication Type :
Academic Journal
Accession number :
edsgcl.746418231
Full Text :
https://doi.org/10.1016/j.comnet.2023.109721