A Survey of Key Technologies in Attribute-Based Access Control Scheme
Liang FANG,Li-Hua YIN,Yun-Chuan GUO,Bin-Xing FANG
DOI: https://doi.org/10.11897/SP.J.1016.2017.01680
2017-01-01
Abstract:New computing paradigms, including Cloud Computing and Internet of Things(IOTs) provide us convenient services such as data sharing and effective computing.It greatly improves the efficiency of data processing and makes full use of the computing and storage resources.However, huge number of data with specific ownership also stored in these new computing paradigms.If they don't obtain efficient protection, it will bring serious risks of data leakage, thus causing tremendous loses for users.Therefore, measures should be taken to make sure that the data only can be accessed by users with appropriate permissions.Access control, which can be used to prevent unauthorized access, attracts extensive attention from both academia and industry.Among the access control schemes, Attribute-Based Access Control(ABAC), which takes attributes as the key element to build up the whole access control system, is the most suitable scheme to achieve fine-grained access control for the new computing paradigms which have features such as large scale, dynamicity and strong privacy need etc.With the help of ABAC, we can provide an ideal access control system for computing paradigms like Cloud Computing and Internet of Things.In this paper, we discuss and analyze the existing problem, current research situation and development trend in the preparation and executing stage of ABAC.In particular, we elaborate the researches including the entity attributes mining, permission allocate mining, access control policy specification, multi-authorities research, user identity and access permission management.Finally, possible future work and some conclusions are pointed out.