Kashmar Nadine, Adda Mehdi, Ibrahim Hussein
Département de Mathématiques, Informatique et Génie, Université du Québec à Rimouski, 300 Allée des Ursulines, Rimouski, QC G5L 3A1, Canada.
Institut Technologique de Maintenance Industrielle, 175 Rue de la Vérendrye, Sept-Îles, QC G4R 5B7, Canada.
Sensors (Basel). 2021 Sep 29;21(19):6507. doi: 10.3390/s21196507.
The substantial advancements in information technologies have brought unprecedented concepts and challenges to provide solutions and integrate advanced and self-ruling systems in critical and heterogeneous structures. The new generation of networking environments (e.g., the Internet of Things (IoT), cloud computing, etc.) are dynamic and ever-evolving environments. They are composed of various private and public networks, where all resources are distributed and accessed from everywhere. Protecting resources by controlling access to them is a complicated task, especially with the presence of cybercriminals and cyberattacks. What makes this reality also challenging is the diversity and the heterogeneity of access control (AC) models, which are implemented and integrated with a countless number of information systems. The evolution of ubiquitous computing, especially the concept of Industry 4.0 and IoT applications, imposes the need to enhance AC methods since the traditional methods are not able to answer the increasing demand for privacy and security standards. To address this issue, we propose a Hierarchical, Extensible, Advanced, and Dynamic (HEAD) AC metamodel for dynamic and heterogeneous structures that is able to encompass the heterogeneity of the existing AC models. Various AC models can be derived, and different static and dynamic AC policies can be generated using its components. We use Eclipse (xtext) to define the grammar of our AC metamodel. We illustrate our approach with several successful instantiations for various models and hybrid models. Additionally, we provide some examples to show how some of the derived models can be implemented to generate AC policies.
信息技术的重大进步带来了前所未有的概念和挑战,即在关键的异构结构中提供解决方案并集成先进的自治系统。新一代网络环境(如物联网(IoT)、云计算等)是动态且不断发展的环境。它们由各种私有和公共网络组成,所有资源都分布在各处并可从任何地方访问。通过控制对资源的访问来保护资源是一项复杂的任务,尤其是在存在网络犯罪分子和网络攻击的情况下。使这一现实更具挑战性的是访问控制(AC)模型的多样性和异构性,这些模型与无数信息系统一起实施和集成。普适计算的发展,尤其是工业4.0概念和物联网应用,使得增强AC方法成为必要,因为传统方法无法满足对隐私和安全标准日益增长的需求。为了解决这个问题,我们为动态异构结构提出了一种分层、可扩展、先进且动态的(HEAD)AC元模型,该模型能够涵盖现有AC模型的异构性。可以从该元模型导出各种AC模型,并使用其组件生成不同的静态和动态AC策略。我们使用Eclipse(xtext)来定义AC元模型的语法。我们通过针对各种模型和混合模型的几个成功实例来说明我们的方法。此外,我们提供一些示例来说明如何实现一些导出模型以生成AC策略。