Design of Secure Access Control Model for Internet of Vehicles Big Data

Li Kuanrong, Niu Zhijie, Gao Yu, Zhang Haijun

Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (4) : 29-33.

PDF(1120 KB)
PDF(1120 KB)
Integrated Circuits and Embedded Systems ›› 2022, Vol. 22 ›› Issue (4) : 29-33.
TOPICAL DISCUSS

Design of Secure Access Control Model for Internet of Vehicles Big Data

  • Li Kuanrong, Niu Zhijie, Gao Yu, Zhang Haijun
Author information +
History +

Abstract

In the paper,a secure access control model for big data in the internet of vehicles is designed.The data of the internet of vehicles are collected through the data awareness layer and encrypted with the data encryption standard algorithm.The encrypted data is transmitted to the secure access control center through the network communication layer,and then users are granted or restricted access rights through the security authentication module.In the abnormal data monitoring module,the isolated forest algorithm is applied to detect users with access permission,identify abnormal data,and store the recognized abnormal data in the anomaly monitoring storage database.Based on this,the secure access terminal rejects or allows users to access the big data of the internet of vehicles.The experiment results show that the model can effectively identify abnormal data in the big data of the internet of vehicles,prevent the access operations of customers without access permission,and the communication and time cost of secure access control is low.

Key words

Internet of vehicles / big data / secure access control / isolated forest algorithm / anomaly detection

Cite this article

Download Citations
Li Kuanrong, Niu Zhijie, Gao Yu, Zhang Haijun. Design of Secure Access Control Model for Internet of Vehicles Big Data[J]. Integrated Circuits and Embedded Systems. 2022, 22(4): 29-33

References

[1] 顾荣杰,吴治平,石焕.基于TFR模型的公安云平台数据分级分类安全访问控制模型研究[J].计算机科学,2020,47(S1):400-403.
[2] 刘敖迪,杜学绘,王娜,等.基于区块链的大数据访问控制机制[J].软件学报,2019,30(9):2636-2654.
[3] 刘晓威,周雷,王国军.基于环境属性的访问控制系统设计与实现[J].计算机工程,2018,44(2):171-176.
[4] 贾民政,朱云飞.基于改进CP-ABE算法的移动云计算数据安全访问控制方法(英文)[J].机床与液压,2018,46(24):108-113.
[5] 王静宇,栾俊清,谭跃生.基于数据敏感性的大数据访问控制模型研究[J].计算机工程与应用,2019,55(23):70-77.
[6] 尹学渊,陈兴蜀,陈林.虚拟化IaaS环境安全域与访问控制模型研究[J].小型微型计算机系统,2019,40(1):111-116.
[7] 黄辰,曹建农,王时绘,等.基于协作反馈控制算法的车联网行车安全动态强化模型[J].计算机应用,2020,40(4):1209-1214.
[8] 范运东,吴晓平.基于密文策略属性加密的云存储访问控制方案[J].计算机应用研究,2018,35(8):2412-2416.
[9] 史锦山,李茹,松婷婷.基于区块链的物联网访问控制框架[J].计算机应用,2020,40(4):931-941.
[10] 周静,陈琛.基于异构网的一种数据安全模型设计[J].计算机工程与科学,2019,41(12):2160-2165.
[11] 刘晓威,周雷,王国军.基于环境属性的访问控制系统设计与实现[J].计算机工程,2018,44(2):171-176.
[12] 王秀利,江晓舟,李洋.应用区块链的数据访问控制与共享模型[J].软件学报,2019,30(6):1661-1669.
[13] 杨霞,杨姗,郭文生,等.针对RTOS的轻量级强制访问控制技术的研究与实现[J].计算机科学,2018,45(3):140-145.
[14] 郑良汉,何亨,童潜,等.云环境中的多授权机构访问控制方案[J].计算机科学与探索,2020,14(11):1865-1878.
[15] 杨宏宇,宁宇光.一种云平台动态风险访问控制模型[J].西安电子科技大学学报,2018,45(5):80-88.
PDF(1120 KB)

Accesses

Citation

Detail

Sections
Recommended

/