Access Control Security Models Review
Access Control Security Models Review
net/publication/346021492
CITATIONS READS
0 383
5 authors, including:
Shaima Ibrahem
Imam Abdul Rahman bin Faisal University
4 PUBLICATIONS 25 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sajaa G. Mohammed on 19 November 2020.
Haneen S.Ibrahem5
Abstract- Access control refers to that controls objects' ability to connect via the Law on
Authorization. An important requirement of any computer system is to protect its data
and resources against unauthorized disclosure (secrecy) and unauthorized or illegal
alteration (integrity), while at the same time ensuring that it is available to legitimate
users (no denials of service), attempting to limit access to digital resources is one of the
main problems found in Secure Computers. This review presents an overview of access
control general concepts, principles. In addition, the access control functions which
provide protection to the information and resources of the system, and specify access
control models such as traditional models and other models that used in the modern
domains of (Internet, network, Cloud computing, mobile applications and operating
system) to clarify its benefits and disadvantages, if any and Demonstrate how traditional
models are used for access control management in modern models.
I.INTRODUCTION
Access is the ability to use, alter, or display something through a computer resource. Access
controls guarantee all complete access to objects is allowed, by managing data and programs
such as reading, modifying and deleting, Access control protects against malicious attacks to
privacy, authenticity and availability of the system. Computer security and the associated
subjects have been, and continue to be, the biggest issue in the IT (Information technology)
world[1]. Access control has continued to adapt to growing IT-system applications. Access
control was initially developed in multi-user and multi-level protected systems to protect
sensitive data. This is to avoid unauthorized usage by unlawful users of machine resources
and protect legal use the resources of the system[2]. Access control is intended to monitor
technical and technological tools in order to avoid unauthorized (confidential) and improper
disclosure of malicious (integrity) changes, thus preserving access to controlled (availability)
entities[3] Access control is defined as an essential security requirement in the IT sector.
Company has its own information management system that determines a collection of
6609
policies based on circumstances where customers are able to access all or some of the
program’s resources. Achieving these Resources security policies are important[3]. Access
In general there are many aims of access control to protect objects (resources) of the
computer system[5]:
1. Do not allow unauthorized users to access resources.
2. Prevents legal users from unauthorized access to services.
3. Allow legitimate users to have allowed access to resources.
4. Subjects, objects, freedom of access.
5. Authentication, permission, audits.
An efficient access control system must satisfy key safety features that can be represented in
the illustration in Figure 1[6].
Confidentiality
The privacy of users should always be protected so that movement and use profiles are not
generated and protect the identity of its users. Users should encrypt the messages to avoid
outsiders from gathering value-added service information. One confidentiality difficulty is
the presentation and implementation of access management procedures, typically
6610
Integrity
Availability
To meet all needed recipients, who may even be unknown an effective routing protocol for
the sender is needed. A few messages should be saved at a given position for a specified
time[7].
Authentication
6611
The authentication process deals with maintaining a reliable contact. In the case of a single
message, including an alert or alarm signal, the authentication service purpose is to ensure the
receiver that the message originates from the source it claims to be created. Two factors are
involved when linking a terminal to a host, first: the service guarantees, at the time of the
implementation of the relation that the two entities are legitimate, that is, that each is the
entity stated to be, second: The service needs to ensure that the communication is not
interfered with in such a way that a third party can, for the purpose of unauthorized
transmission or receipt, masquerade as one of the two legitimate parties[8].
Authorization
After a client is authenticated, it is important to test whether that client is allowed to perform
the requested action. Authorization includes the following stages: establishment of a security
plan (set of rules), selection of an access control model to encompass the specified plan,
implementation of the model and application of access rules. Any phase needs different tools
to be deployed [30].
Accountability
Accountability has been described as the "security objective that generates the demand for an
action person to be connected to the individual in its own special way. It promotes non-
repudiation, deterrence, isolation of errors, detection and prevention of intrusion, and
recuperation and legal recourse following action. This description encourages psychological
studies to discover what makes for an effective deterrent, Research into legal matters to
verify the standard of proof required by the Court of Justice; And specialized inquiries into
evidence collection, security and study[9].
Literature Review
Practical researches:
Khaing Zar et al. [2005] proposed a system aims to protect, the online shopping system,
database attacks are protected using the role-based access control model for permission and
access right mostly on database. This approach enables users to migrate from one service to
another easily, and transparently[10].
Klaus Pl¨oßl et al. [2006] proposed VANETs Security Architecture that aims to meet the
requirements, also identify privacy and security specifications and describe a robust security
framework that allows for a range of applications and meets key needs [8].
J.Lach et al. [2006] introduced a definition of mechanisms which provide access control in
various operating systems, access control list (ACL) method used to provide a safe, protected
6612
Gail-Joon Ahn and Hongxin Hu [2007] propose the Model Driven Development (MDD)
approach has been re-centered to tackle a crucial problem for software systems to establish-in
high assurance, this approach is based on High-Level Design Models for device
implementation modules [21].
A.Kayem et al. [2010] introduced the developments in access controls, analyze possible
approaches, Comparison and review of each in turn with the objective. Usually, the
mechanisms for access control are configured for fairly static [22].
Mihaela Ion et al. [2013] designed a content-centered Information-Centric Networking (ICN)
privacy scheme. And improve the ability of ICN to enable confidential data by introducing
attribute-based encryption in to the ICN and attempting to make it unique to the attribute
values and proposed a routing scheme based on attributes which offers confidentiality of
interest[11].
M.Qiu et al. [2015] introduced a new attribute-based access control (ABAC) model to allow
cloud (IaaS) tenants to collaborate, and more broadly. This strategy allows for the assignment
of cross-tenant attributes to provide access to common resources through tenants, also
proposed expanding this model to cover different types of confidence[12].
G.Ahn [2016] proposed collection of protection domains for operating system by using
discretionary Access Control model that contain different methods to satisfy the right access
to ( Linux , Unix) operating systems[6] .
Yaira K. Rivera Sánchez et al. [2017] presented (RBAC) model was applied to the business
layer of phone applications, in particular to the API(s) used by a phone app to manage data. It
also proposed an API-based approach to RBAC to define and enforce permissions to
intercept API service calls to modify the information provided / saved to the application [17].
Michael Aminzade [2018] presented away to Identifying gaps in the infrastructure; and
creating security measures and plans. There are two variants of OCTAVE, with OCTAVE-S,
offering a simpler version targeted at smaller, flat hierarchical organizations. OCTAVE
Allegro, meanwhile, is a more detailed edition intended for broad multi-layered
companies[13].
C.Diekmann et al. [2019] submitted Tools (topoS and fffuu), showed how this collection of
tools assists in both system design and regular activity. The theory underlying both
instruments is formally confirmed and their code is created directly by Isabelle / HOL, which
provides strong guarantees of correctness regarding their performance, also shown how our
tools boost state-of-the-art output and how various tools can communicate with that
abstractions[14].
The table below has been classified according to the type of method (solving applied research
problems using scientific methods or tools) or model (pictorial representation of basic
concepts that illustrates the relationship between different types of variables) or the general
approach to research(This is a plan and procedure composed of steps of broad assumptions
6613
for detailed data collection , analysis and interpretation methods and, therefore, depending on
the nature of the research problem being addressed)to give a comprehensive idea of the
applied research on which this research is based in general, with an explanation of the
benefits of using these methods, models, or the general approach in the presented research.
a bit.
-This approach
used to reduce the
difference
between models
protection and
system
Towards Model
Gail-Joon NIST/ANSI (RAE) advancement.
realizing a Driven
Ahn and RBAC A - (RAE) method
formal RBAC Developme
Hongxin standard systematic Including
model in real nt (MDD)
Hu model method important features
systems.[17] approach
such as validation
and Roll-Based
Systems Code
Creation.
Introduce the
(ACMs) important of using
A presentation
Access access control
of access A.Kayem
/ control / models in
control et al.
matrixes distributed
methods.[18]
method system.
Protect individual
Toward
privacy by
content-centric
(ABE) encrypting the
privacy in
Attribute- best interest in
ICN: Mihaela
/ based / subscribing while
Attribute- Ion et al.
Encryption still allowing
based
method routers to send
encryption and
encoded data to
routing.[11]
subscribers.
Present the (MT-
(MT- ABAC) model,
ABAC) where
Let's Get
multi-tenant Collaboration
Mobile: Secure
M.Qiu et attribute- shall be permitted
FOTA for / /
al. based by cross-tenant
Automotive
access attribute value
System.[12]
control assignments made
6615
-Users should
control rights of
access by
themselves.
- The workload of
security managers
is significantly
reduced as
resource users and
(DAS)
(ACL) administrators
Discretionar
Discretionary ,(ACMs) collectively
y Access
Access G.Ahn and / manage the
Control
Control[5]. capability authorization.
model
list methods - It allows
granularity per
user for personal
decisions about
access as well as
some coarse-
grained access for
teams.
- Changing
privileges is fast.
- Role-based
API-Based access control
approach (RBAC) is really
a candidate for the
An protection of
intercepting sensitive data
(RBAC)
api-based Yaira K. from applications.
Role based
access control Rivera - Verified how to
access /
approach for Sánchez et incorporate
control
mobile al. RBAC into an
model
applications.[1 interceptor (API)
9] that wraps the
actual mobile app
API to handle the
data displayed in
a mobile app.
Confidentiality The OCTAVE
Michael OCTAVE
6616
Lazouski et al. [2010] presented a novel and truly competitive to access control approach
called Usage control used in computer environments that are open, distributed,
heterogeneous, and networked. It encompasses and improves traditional models of access
control, trust management (TM) and digital rights management (DRM), and its main
novelties are attribute mutability and continuity of access decision assessment, this approach
created the development of computing systems for new safety requirements[20].
Dieter and Nanyang [2016] Presented user authentication modes and how they are deployed,
web authentication protocols, and how new usage cases have resulted in a shift from
authentication to authorization protocols, and authentication properties formalization. As
regards transparency, the emphasis is on maintaining and preserving audit reports, these
Privacy rules can place limits on documented events, and the existence of recorded events
can minimize privacy in ways not expected[9].
Ouaddah et al. [2017] proposed Mechanisms (OM-AM) method to provide an analysis of
data privacy and security criteria is performed for the most prevalent (IoT) internet of things
application areas, including personal & home, government and services, and business and
industry. This discusses the benefits and drawbacks of conventional, as well as recent models
and protocols of access control from an (IoT) point of view, the proposed Mechanisms
Implemented the privacy-controlled access control system in order to formulate an ad-equate
( IoT) access control system[6].
N.mehra et al. [2018] presented Cloud computing's main security issues and problems are
explained. Specified the need for multiple changes in existing technologies as well as more
advanced and newer technologies to ensure that the advantages of cloud computing are fully
appreciated as its acceptance accelerates[21].
C.Tan et al. [2018] presented modern Proof of Retrievability (PoR) and consequently to
identify the problems of using PoR on cloud storage and propose solutions, but cloud storage
also required special concern about the quality of the outsourced data. To this end,
6617
researchers have proposed many data integrity schemes, particularly PoR schemes, to ensure
data availability & data integrity[22].
S.Singh and P.verma [2018] introduced the general principles of the distributed firewalls, its
Parameters and consequences and the adaptability of these to Common Internet Threats, also
introducing Clarification how distributed firewall provides complete network protection[23].
Zhengtao Liu et al. [2019] introduced an overview of system requirement to allow access
control were mentioned in three aspects: traditional models, access control models in the
internet and access control models in the cloud computing environment, also, for the sake of
adapting to the application development, the traditional model requires ever more
reconstruction and proposed to integrates access control encryption technology & semantic
technology to provide stronger & secure information support[2].
Bhatti et al. [2019] introduced Knowledge of data protection and data security needs for
everyday computer users can also provide users with information on various data encryption
algorithms that are more effective in providing software designers with a helpful platform for
implementing the best encryption algorithms for various applications[4].
K.Kaur and A.Kaur [2019] presented a detailed study of the Virtual Private networks (VPN)
.VPN, the architecture and the protocols used. A VPN protects that private network, using
encryption and some other authentication measures to ensure that the device can only be
accessed by approved users, and data can be collected[24].
Abu Kamruzzaman Alhwaiti et al. [2020] Presented metamodel explanations and descriptions
of the access controls, also create a metamodel that is sufficiently generic to enable all current
access control models and can also allow organizations to switch easily from one access
control model to the other[3].
new opportunities[6]
Objectives, Models, challenges, and testing of
Architecture and Internet protocols that are
Mechanisms (OM-AM) widely used cannot be
manner. extended to restricted
-Analysis of protection environments in any situation.
and privacy criteria for -Addressed the major benefits
the most prevalent (IoT) and disadvantages of
applications. implementing a distributed or
-The advantages and centralized management access
drawbacks of control in IoT.
conventional, as well as
modern access control
models & (IoT)
protocols are
highlighted.
AUTHENTICATION -Present general access Privacy rules can impose limits
, AUTHORISATION control structures and on documented events, and the
& some important existence of recorded events
ACCOUNTABILITY instantiations that have can minimize privacy in ways
( AAA )[9] arisen as IT continues not expected.
to expand into new
areas of operation. 40
-Present survey about
user authentication
modes and how they are
actually implemented
and Web authentication
protocols.
Analyzing cloud -Introduces the Cloud There is an important need for
computing security computing history & multiple changes in current
issues and service model. technologies as well as more
challenges[21] -highlight some security advanced and newer
14
concerns and technologies to ensure that the
challenges. advantages of cloud computing
are fully appreciated as its
growth accelerates.
6619
operating systems.
Access control is a security feature that protects against unauthorized access to shared
resources. The difference between authorized and unauthorized accesses is created according
to models of access control, seen in figure3:
Traditional access control models are based on several of access controls in the form of
(subject, object, and process) named authorizations, specified by rules. Identify the resources
(object) that can be achieved for each entity (subject) and the activities (process) provided by
the entity allowed to execute on them [29].
Discretionary Access Control (DAC) policy means that every entity has an owner in this form
of access control. The owner (issue) grants access to the resources to other users and/or
groups (objects). The way Matrix access rights used in this context and represented as: the
matrix determines the entire device policy relating to the interests of individual users. There
are two methods of having the matrix applied[10]:
The system gives the objects or the subjects the rights. That is, either the object stores
the matrix column, or the subject stores the matrix row. The matrix row lists of
access controls are used to store the rights with Object.
6622
Capability matrices are used to store rights Along with subjects, it deals with
biometrics, so that access is available in every operating system the checklists are
used for arbitrary access management.
The (DAC) model helps users to make easy changes to the access strategy. Even,
however, it has some drawbacks, such as Trojan horse security door[2].
Mandatory Access Control (MAC) policy means that the central authority makes access
control policy decisions, not the single owner of an entity, and the owner cannot change the
right of access. It is a mechanism for secure access control at multilevel. It defines a Security
Level Hierarchy. A Security Policy describes rules that control access. The Department uses
the out of defense. The model successfully solves Trojan horse protection problems in the
DAC model[16].
Role Based Access Control requires control over a number of users, a flat selection of
positions for users, a collection of resources and a system of access permits. The idea is
encapsulate access rights subsets within the named roles. Assign a user to the specific role
implies that it has access to the resources that it has they are within the confines of that
role[25]. The RBAC overcomes the problem of fully automated access control allocates the
right of access to subjects. The RBAC model contains: First, the authorization is connected to
the roles and then the user function is established. The User authorization is obtained by user
positions, and services (objects) are obtained[17].
unnecessary coarse granularity of the concept of access control. It adapts to the Internet's
open and diverse technologies, and displays remarkable expansibility and versatility. Work
on ABAC model focuses mainly on solid ABAC attributes, definition and semantic
interoperability of ABAC methods, analysis and conflict offset of ABAC methods, which
formalized ABAC model, interaction between ABAC attribute and strategic protection[12].
Usage Control is the access control model for ambient computers in open, distributed,
heterogeneous, and linked networks. It covers and strengthens conventional access control,
trust management (TM) and digital rights management (DRM) models and its major novelties
are feature mutability and continuity of access decision analysis. The key advantage of usage
control is its ability to clarify the relation in different circumstances. It can reflect, and go
beyond, the DAC, MAC, RBAC, TM, DRM models. Clearly the transition from access to
usage control is particularly useful for versatile, open environments (e.g. Internet, Grid,
Cloud, etc.)[3].
Network Security (NW) is an integral part of IS, too. Different issues must be taken into
account in this domain which are:
NW Security and Budgetary specifications are defined based on the design of the NW. In
designing NWs, various factors need to be taken into account, such as: Availability, price,
efficiency, user numbers etc. It is critical in security Allow Efficient and secure connections
to other NWs, and provides a useful platform for protecting sensitive NW information, and
recognizing and knowing essential controls of security and the effects of the failure of such
inspections[3].
protection in the NW. Internet development the existing protocol is known as the
Transmission Control Protocol / Internet Protocol (TCP / IP). It is a suite of applications and
services with distinct functions Open System Interconnection (OSI) map. Every device
connected to one NW has two NW addresses: the MAC address and the IP address. There are
however Different configurations measures for the system to be installed (router, Switch ...)
to increase safety. The different steps are: switching the safety practices, ACLs,
administrative practices, Internet Communications Management Protocol (ICMP), signing to
routers[3].
Firewalls
The firewalls are the Internet's first line of protection between the Internal NW and other
unconfident NWs. They play a major role in regulating communication between applications
and other features such as: network address translation (NAT), antivirus, e-mail (spam), IDPS
filtering. A distributed firewall is a network-enforcement mechanism domain security
regulation, using the terminology of government, Policy delivery scheme allowing policy
control via Key point and certificates helping to recognize any member of the policy domain
of a network. Distributed firewalls secure by securing vital network Endpoints, exactly during
which hackers want to get in. Distributed firewalls are depend on three major points: Policy
Language, System management tools and IPsec[23].
complex, attribute- or credential-based access: The key SLAs should also be capable of
capturing specific aspects of control models. Service providers in clouds generally don't
know their Users in ahead of time, so roles can hardly be assigned directly to users.
Accordingly, to improve the flexibility, qualification or attribute-based policies may be used.
Security Assertion of markup language (SAML), extensible markup language for access
control (XACML), and specifications for Web services can be used to define safe access Rule
of Command. Role-based access is one of several methods proposed. Control (RBAC) was
generally recognized for its simplicity, its versatility in Capturing complex criteria, and
upholding the least privilege and effective privilege management theory[21].
The User permissions are presented as Access permissions matrix, where columns
contain files / folders, and rows contain Customers. In this side, a file proprietor
defines the permissions granted to others Users that need access to files. Only these
users can however have those permissions (Privileges), read, write and execute on the
register. Use an (ACM) to demonstrate the access privileges of users to a program and
6626
its files. While (ACMs) can be used to enforce security mechanisms, many users do
not scale well [22].
Access control lists (ACL) are beginning to be used widely in Unix-like operating
systems and therefore the holes are likely to close up a bit. Even so additional features
are integrated, and it becomes increasingly difficult to compare operating systems. All
of them have a secure, healthy climate, but they are all different[16].
REFERENCES
[1] P. Samarati and S. De Capitani, “Access Control : Policies , Models , and,” pp. 137–
196, 2001.
[2] Z. Liu, W. Gu, and J. Xia, “Review of Access Control Model,” Comput. Mater.
Contin., vol. 61, no. 3, pp. 43–50, 2019, doi: 10.32604/jcs.2019.06070.
[3] A. K. B, Y. Alhwaiti, A. Leider, and C. C. Tappert, Advances in Information and
Communication, vol. 70, no. January. Springer International Publishing, 2020.
[4] M. Y. Bhatti, A. Samejo, and S. Danwar, “A Review Of Security Levels of Data
Encryption Algorithms,” vol. 3, no. June, pp. 31–35, 2019.
[5] G.-J. Ahn, “Discretionary Access Control,” Encycl. Database Syst., pp. 1–4, 2016, doi:
10.1007/978-1-4899-7993-3_135-2.
[6] A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A. Ait Ouahman, “Access control
in the Internet of Things: Big challenges and new opportunities,” Comput. Networks,
vol. 112, pp. 237–262, 2017, doi: 10.1016/j.comnet.2016.11.007.
[7] Q. Sun and H. Garcia-molina, “Using Ad-hoc Inter-vehicle Networks For Regional
Alerts,” Communication.
6627
[8] D. Boyle and T. Newe, “A survey of authentication mechanisms authentication for ad-
hoc wireless sensor networks,” Proc. 2007 IEEE Sensors Appl. Symp. SAS, no.
[23] S. Singh and P. R. Verma, “Data Security in Local Network through Distributed
Firewalls : A Review,” pp. 1044–1047, 2018.
[24] K. Kaur and A. Kaur, “a Survey of Working on Virtual Private Networks,” pp. 1340–
1343, 2019.
[25] R. A. Control, “Role-Based Access Control,” Access Control Syst., pp. 190–251, 2006,
doi: 10.1007/0-387-27716-1_8.
[26] S. Jose, “( 12 ) United States Patent ( 10 ) Patent No .:,” vol. 2, no. 3, 2016.
[27] S. S. Abdul-Jabbar, A. Aldujaili, S. G. Mohammed, and H. S. Saeed, “西 南 交 通 大
学 学 报 Integrity and Security in Cloud Computing Environment: a Review 云计算环
境中的完整性和安全性:回顾,” J. Southwest Jiaotong Univ., vol. 55, no. 1, pp. 1–
15, 2020, doi: 10.35741/issn.0258-2724.55.1.11.
[28] T. Grance and P. Mell, “The NIST Definition of Cloud Computing version 15,” Natl.
Inst. Stand. Technol. (NIST), Inf. Technol. Lab., 2009.
[29] P. C. van Oorschot, “Operating System Security and Access Control,” Inf. Secur.
Cryptogr., pp. 125–154, 2020, doi: 10.1007/978-3-030-33649-3_5.
[30] R. Dotson, “Access control,” Compr. Handb. Sch. Saf., pp. 17–24, 2016.
6629