skip to main content
research-article

CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures

Published:01 January 2014Publication History
Skip Abstract Section

Abstract

The article presents an access control model called Criticality Aware Access Control (CAAC) for criticality (emergency) management in smart infrastructures. Criticalities are consequences of events which take a system (in our case, a smart infrastructure) into an unstable state. They require the execution of specific response actions in order to bring them under control. The principal aim of CAAC is to grant the right set of access privileges (to facilitate response action execution), at the right time, to the right set of subjects, for the right duration, in order to control the criticalities within the system. In this regard, the CAAC model uses a stochastic model called the Action Generation Model to determine the required response actions for the combination of criticalities present within the system. It then facilitates response actions by adaptively altering the privileges to specific subjects, in a proactive manner, without the need for any explicit access requests. In this article, we formalize the CAAC model and validate it based on two design goals - proactivity and adaptiveness. Finally, we present a case study demonstrating CAAC’s operation on an oil-rig platform in order to aid in the response to health- and fire-related criticalities.

References

  1. Adelstein, F., Gupta, S. K. S., Richard, G., and Schwiebert, L. 2005. Fundamentals of Mobile and Pervasive Computing. McGraw-Hill.Google ScholarGoogle Scholar
  2. Ardagna, C. A., di Vimercati, S. D. C., Grandison, T., Jajodia, S., and Samarati, P. 2008. Regulating exceptions in healthcare using policy spaces. In Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. 254--267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bettini, C., Jajodia, S., Wang, X., and Wijesekera, D. 2002. Obligation monitoring in policy management. In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks. Springer-Verlag, 2--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bhargav-Spantzel, A., Squicciarini, A., and Bertino, E. 2006. Privacy preserving multi-factor authentication with biometrics. In Proceedings of the 2nd ACM Workshop on Digital Identity Management. ACM, 63--72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chan, P. S., Krumholz, H. M., Nichol, G., and Nallamothu, B. K. 2008. Delayed time to defibrillation after in-hospital cardiac arrest. The New England J. Med. 358, 1, 9--17.Google ScholarGoogle ScholarCross RefCross Ref
  6. Corradi, A., Montanari, R., and Tibaldi, D. 2004. Context-based access control management in ubiquitous environments. In Proceedings of the 3rd International Symposium on Network Computing and Applications. IEEE, 253--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Covington, M. J., Long, W., and Srinivasan, S. 2001. Secure context-aware applications using environmental roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technology. ACM, 10--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Denning, T., Fu, K., and Kohno, T. 2008. Absence makes the heart grow fonder: New directions for implantable medical device security. In Proceedings of the 3rd Conference on Hot Topics in Security (HOTSEC’08). USENIX Association, Berkeley, CA, 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. DiMattia, G. D., Faisal, I. K., and Amyotte, P. R. 2005. Determination of human error probabilities for offshore platform musters. J. Loss Prev. Process Indust. 18, 488--501.Google ScholarGoogle ScholarCross RefCross Ref
  10. Gupta, S. K. S. 2008. Towards formal framework for modeling and evaluation of high-confidence criticality-aware software for distributed CPS: A white paper. In National Workshop for Research on High Confidence Transportation Cyber Physical Systems: Automotive, Avaition, and Rail.Google ScholarGoogle Scholar
  11. Gupta, S. K. S., Mukherjee, T., and Venkatasubramanian, K. 2006. Criticality aware access control model for pervasive applications. In Proceedings of the 4th Conference on Pervasive Computing. IEEE, 251--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Hendrix, K., Mayhan, S., Lackland, D., and Egan, B. 2004. Prevalence, treatment, and control of chest pain syndromes and associated risk factors in hypertensive patients. Amer. J. Hyperten. 18, 8, 1026--1032.Google ScholarGoogle ScholarCross RefCross Ref
  13. Hu, J. and Weaver, A. C. 2003. A dynamic, context-aware security infrastructure for distributed healthcare applications. In Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust. ICST.Google ScholarGoogle Scholar
  14. Joshi, J. B. D., Bertino, E., and Ghafoor, A. 2005. Analysis of expressiveness and design issues for a temporal role based access control model. Trans. Depend. Sec. Comput. 2, 2, 157--175. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Kagal, L., Finin, T., and Joshi, A. 2003. A policy language for a pervasive computing environment. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks. Springer-Verlag, 63--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Khot, U. N., Khot, M. B., Bajzer, C. T., Sapp, S. K., Ohman, E. M., Brener, S. J., Ellis, S. G., Lincodd, A. M., and Topol, E. J. 2003. Prevalence of conventional risk factors in patients with coronary heart disease. J. AMA 290, 7, 898--904.Google ScholarGoogle Scholar
  17. Liu, H., Motoda, H., and Yu, L. 2004. A selective sampling approach to active feature selection. Artif. Intell. 159, 1--2, 49--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mehrotra, S., Butts, C., Kalashnikov, D., Venkatasubramanian, N., Rao, R., Chockalingam, G., Eguchi, R., Adams, B., and Huyck, C. 2004. Project RESCUE: Challenges in responding to the unexpected. In Proceedings of the 16th Annual Symposium on Electronic Imaging Science and Technology. SPIE, 179--192.Google ScholarGoogle Scholar
  19. Moyer, M. J. and Ahamad, M. 2001. Generalized role based access control. In Proceedings of the 21st International Conference Distributed Computing System. IEEE, 391--398. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Mukherjee, T. and Gupta, S. K. S. 2009. CRET: A crisis response evaluation tool to improve crisis preparednesss. In Proceedings of the International Conference on Technologies for Homeland Security. IEEE.Google ScholarGoogle Scholar
  21. Mukherjee, T., Venkatasubramanian, K., and Gupta, S. K. S. 2006. Performance modeling of critical event management for ubiquitous computing applications. In Proceedings of the International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. ACM/IEEE, 12--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Oil Spill. 2010. Gulf of Mexico Oil Spill (2010). NY Times, http://topics.nytimes.com/top/reference/timestopics/subjects/o/oil_spills/index.html.Google ScholarGoogle Scholar
  23. Pope, J. H., Aufderheide, T. P., Ruthazer, R., Woolard, R. H., Feldman, J. A., Beshansky, J. R., Griffith, J. L., and Selker, H. P. 2000. Missed diagnoses of acute cardiac ischemia in the emergency department. New Engl. J. Med. 342, 16, 1163--1170.Google ScholarGoogle ScholarCross RefCross Ref
  24. Povey, D. 2000. Optimistic security: A new access control paradigm. In Proceedings of the Workshop on New Security Paradigms. ACM, 40--45. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Sampemane, G., Naldurg, P., and Campbell, R. H. 2002. Access control for active spaces. In Proceedings of the 18th Annual Computer Security Applications Conference. IEEE, 343--352. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role based access control models. IEEE Comput. 29, 2, 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Sloman, M. and Lupu, E. 2002. Security and management policy specification. IEEE Net. 16, 2, 10--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Venkatasubramanian, K., Deng, G., Mukherjee, T., Quintero, J., Annamalai, V., and Gupta, S. K. S. 2005. Ayushman: A wireless sensor network based health monitoring infrastructure and testbed. In Proceedings of the International Conference on Distributed Computing in Sensor Systems. IEEE, 406--407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Wang, H., Zhang, Y., and Cao, J. 2006. Ubiquitous computing environments and its usage access control. In Proceedings of the 1st International Conference on Scalable Information Systems. ACM, 6. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!