A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing

Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as intelligent transportation, smart city, and real-time bi...

Full description

Bibliographic Details
Main Authors: Yichen Hou, Sahil Garg, Lin Hui, Dushantha Nalin K. Jayakody, Rui Jin, M. Shamim Hossain
Format: Article
Language:English
Published: IEEE 2020-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/9146646/
_version_ 1818731985679417344
author Yichen Hou
Sahil Garg
Lin Hui
Dushantha Nalin K. Jayakody
Rui Jin
M. Shamim Hossain
author_facet Yichen Hou
Sahil Garg
Lin Hui
Dushantha Nalin K. Jayakody
Rui Jin
M. Shamim Hossain
author_sort Yichen Hou
collection DOAJ
description Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as intelligent transportation, smart city, and real-time big data analysis. However, it also brings the new security threats, especially data security threats during data access that leads to unauthorized/unauthorized access, alteration and disclosure of data, affecting the confidentiality and integrity of the data. Therefore, access control, as an important method to ensure the security of user data during data access, began to be applied to mobile edge computing. However, the existing access control has the disadvantages of coarse-grain, poor flexibility and accuracy, lack of internal attack considerations, etc., which cannot meet the needs of data security in practical applications of mobile edge computing. In this paper, a data security enhanced Fine-Grained Access Control mechanism (FGAC) is proposed to ensure data security during data access in mobile edge computing. In FGAC, a dynamic fine-grained trusted user grouping scheme based on attributes and metagraphs theory was first designed. Secondly, the scheme was combined with the traditional role-based access control mechanism to assign roles to users based on user group credibility. And then, based on attribute matching the user authentication further verifies whether the user is allowed to perform the access operations to achieve fine-grained data protection. Experimental results show that FGAC can effectively identify malicious users and make group adjustments, while achieving fine-grained access control and assure the data security during the data access process in mobile edge computing.
first_indexed 2024-12-17T23:26:23Z
format Article
id doaj.art-93f09e523a114bd4bb79b25cec261986
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-17T23:26:23Z
publishDate 2020-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-93f09e523a114bd4bb79b25cec2619862022-12-21T21:28:45ZengIEEEIEEE Access2169-35362020-01-01813611913613010.1109/ACCESS.2020.30114779146646A Data Security Enhanced Access Control Mechanism in Mobile Edge ComputingYichen Hou0https://orcid.org/0000-0001-8174-2732Sahil Garg1https://orcid.org/0000-0003-0229-608XLin Hui2https://orcid.org/0000-0003-1716-1399Dushantha Nalin K. Jayakody3Rui Jin4M. Shamim Hossain5https://orcid.org/0000-0001-5906-9422College of Mathematics and Informatics, Fujian Normal University, Fuzhou, ChinaCollege of Mathematics and Informatics, Fujian Normal University, Fuzhou, ChinaCollege of Mathematics and Informatics, Fujian Normal University, Fuzhou, ChinaSchool of Computer Science and Robotics, Tomsk Polytechnic University, Tomsk, RussiaCollege of Engineering, Mathematics, and Physical Sciences, University of Exeter, Exeter, U.K.Department of Software Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi ArabiaMobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as intelligent transportation, smart city, and real-time big data analysis. However, it also brings the new security threats, especially data security threats during data access that leads to unauthorized/unauthorized access, alteration and disclosure of data, affecting the confidentiality and integrity of the data. Therefore, access control, as an important method to ensure the security of user data during data access, began to be applied to mobile edge computing. However, the existing access control has the disadvantages of coarse-grain, poor flexibility and accuracy, lack of internal attack considerations, etc., which cannot meet the needs of data security in practical applications of mobile edge computing. In this paper, a data security enhanced Fine-Grained Access Control mechanism (FGAC) is proposed to ensure data security during data access in mobile edge computing. In FGAC, a dynamic fine-grained trusted user grouping scheme based on attributes and metagraphs theory was first designed. Secondly, the scheme was combined with the traditional role-based access control mechanism to assign roles to users based on user group credibility. And then, based on attribute matching the user authentication further verifies whether the user is allowed to perform the access operations to achieve fine-grained data protection. Experimental results show that FGAC can effectively identify malicious users and make group adjustments, while achieving fine-grained access control and assure the data security during the data access process in mobile edge computing.https://ieeexplore.ieee.org/document/9146646/Mobile edge computingaccess controldata securitydata confidentialitydata integritymetagraph theory
spellingShingle Yichen Hou
Sahil Garg
Lin Hui
Dushantha Nalin K. Jayakody
Rui Jin
M. Shamim Hossain
A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
IEEE Access
Mobile edge computing
access control
data security
data confidentiality
data integrity
metagraph theory
title A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
title_full A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
title_fullStr A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
title_full_unstemmed A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
title_short A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
title_sort data security enhanced access control mechanism in mobile edge computing
topic Mobile edge computing
access control
data security
data confidentiality
data integrity
metagraph theory
url https://ieeexplore.ieee.org/document/9146646/
work_keys_str_mv AT yichenhou adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT sahilgarg adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT linhui adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT dushanthanalinkjayakody adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT ruijin adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT mshamimhossain adatasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT yichenhou datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT sahilgarg datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT linhui datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT dushanthanalinkjayakody datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT ruijin datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing
AT mshamimhossain datasecurityenhancedaccesscontrolmechanisminmobileedgecomputing