ZOU Junwei, LAN Jiewei, WANG Xiaoke, et al., “Multi-attribute-Based Access Control Policy for Supply Chain Data Service,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1283-1290, 2018, doi: 10.1049/cje.2018.08.004
Citation: ZOU Junwei, LAN Jiewei, WANG Xiaoke, et al., “Multi-attribute-Based Access Control Policy for Supply Chain Data Service,” Chinese Journal of Electronics, vol. 27, no. 6, pp. 1283-1290, 2018, doi: 10.1049/cje.2018.08.004

Multi-attribute-Based Access Control Policy for Supply Chain Data Service

doi: 10.1049/cje.2018.08.004
Funds:  This work is supported by the National Natural Science Foundation of China (No.61672109, No.61370196, No.61532012).
  • Received Date: 2016-07-28
  • Rev Recd Date: 2017-06-15
  • Publish Date: 2018-11-10
  • The Electronic product code (EPC) network is established and maintained in worldwide-scale based on the EPC standard framework to guarantee the real-time information recognition, and provide efficient management for supply chain. In EPC network, a series of data services can be provided due to the requirements of users. Aiming to guarantee the security of data services, we propose a dynamic access control model for data services based on multiple attributes. We extract specific attribute sets from user, and calculate security level of user using certainty and uncertainty theories based on the attribute sets. The data can be provided to users according to the security level of user and data. The security of data in the supply chain can be guaranteed, and data acquisition can be dynamic and fine-grained. We deploy the proposed model to real supply chain management system we built to verify effectiveness and feasibility of the solution.
  • loading
  • Till Quack, Herbert Bay and Luc Van Gool, “Object recognition for the internet of things”, First International Conference of the Internet of Things, Springer, Berlin, Heidelberg, pp.230-246, 2008.
    Benjamin Fabian and Oliver Günther,“Security challenges of the EPCglobal network”,Communications of the ACM, Vol.52, No.7, pp.121-125, 2009.
    Hua Lan,“The change of supply chain mode”, Logistic and Supply Chain, Vol.12, pp.52-54, 2010.
    Ping Xia and Kai Liu,“A study and discussion of emergency supply chain”, Logistic Technology, Vol.10, pp.111-113, 2009.
    Gilvan C. Souza, “Supply chain analytics”, Business Horizons, Vol.57, No.5, pp.595-605, 2014.
    Ales Groznik and Peter Trkman, “Current issues and challenges of supply chain management”, Economic researchEkonomskaistraživanja, Vol.25, No.4, pp.1101-1112, 2012.
    JunbeomHur and Dong Kun Noh, “Attribute-based access control with efficient revocation in data outsourcing systems”, IEEE Transactions on Parallel and Distributed Systems, Vol.22, No.7, pp.1214-1221, 2011.
    Fan Hong, Xueming Tnag, Yongquan Cui and Tao Long, The Conception of Access Control, Huazhong University of Science and Technology Press, 2010.
    Ed Coyne and Timothy R. Weil, “ABAC and RBAC: Scalable, flexible and auditable access management”, IT Professional, Vol.15, No.3, pp.14-16, 2013.
    JunbeomHur, “Improving security and efficiency in attributebased data sharing”, IEEE Transactions on Knowledge and Data Engineering, Vol.25, No.10, pp.2271-2282, 2013.
    Lo-Yao Yeh, Yen-Cheng Chen and Jiun-Long Huang, “ABACS: An attribute-based access control system for emergency services over vehicular ad hoc networks”, IEEE Journal on Selected Areas in Communications, Vol.29, No.3, pp.630-643, 2011.
    Jie Shi, Yingjiu Li and Robert H. Deng, “A secure and efficient discovery service system in EPCglobal network”, Computers and Security, Vol.31, No.8, pp.870-885, 2012.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (450) PDF downloads(172) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return