Trust-based access control model with quantification method for protecting sensitive attributes

The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organization. In enforc-ing the automation of privacy policies and laws, access control has been one of the most devoted subjects. Despite the recent advances in access control frameworks and models, there...

Full description

Saved in:
Bibliographic Details
Main Authors: Salji, Mohd Rafiz, Udzir, Nur Izura, Hafez Ninggal, Mohd Izuan, Mohd Sani, Nor Fazlida, Ibrahim, Hamidah
Format: Article
Published: The Science and Information Organization 2022
Online Access:http://psasir.upm.edu.my/id/eprint/102515/
https://thesai.org/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.102515
record_format eprints
spelling my.upm.eprints.1025152023-06-22T03:04:52Z http://psasir.upm.edu.my/id/eprint/102515/ Trust-based access control model with quantification method for protecting sensitive attributes Salji, Mohd Rafiz Udzir, Nur Izura Hafez Ninggal, Mohd Izuan Mohd Sani, Nor Fazlida Ibrahim, Hamidah The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organization. In enforc-ing the automation of privacy policies and laws, access control has been one of the most devoted subjects. Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. This paper illustrates the problem of the previous model which typically preserves data without explicitly considering the protection of sensitive attributes. This paper also highlights the drawback of the previous works which provides inaccurate calculation to specify user’s trustworthiness. Therefore, a trust-based access control (TBAC) model is proposed to protect sensitive attributes. A quantification method that provides accurate calculation of the two user properties is also proposed, namely: seniority and behaviour to specify user’s trustworthiness. Experiment have been conducted to compare the proposed quantification method and the previous quantification methods. The result shows that the proposed quantification method is stricter and accurate in specifying user’s trustworthiness as compared to the previous works. Therefore, based on the result, this study resolves the issue of specifying the user’s trustworthiness. This study also indicates that the issue of protecting sensitive attributes has been resolved. The Science and Information Organization 2022 Article PeerReviewed Salji, Mohd Rafiz and Udzir, Nur Izura and Hafez Ninggal, Mohd Izuan and Mohd Sani, Nor Fazlida and Ibrahim, Hamidah (2022) Trust-based access control model with quantification method for protecting sensitive attributes. International Journal of Advanced Computer Science and Applications, 13 (2). 695 - 707. ISSN 2158-107X ; ESSN: 2156-5570 https://thesai.org/ 10.14569/IJACSA.2022.0130282
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
description The prevailing trend of the seamless digital collec-tion has prompted privacy concerns to the organization. In enforc-ing the automation of privacy policies and laws, access control has been one of the most devoted subjects. Despite the recent advances in access control frameworks and models, there are still issues that hinder the implementation of successful access control. This paper illustrates the problem of the previous model which typically preserves data without explicitly considering the protection of sensitive attributes. This paper also highlights the drawback of the previous works which provides inaccurate calculation to specify user’s trustworthiness. Therefore, a trust-based access control (TBAC) model is proposed to protect sensitive attributes. A quantification method that provides accurate calculation of the two user properties is also proposed, namely: seniority and behaviour to specify user’s trustworthiness. Experiment have been conducted to compare the proposed quantification method and the previous quantification methods. The result shows that the proposed quantification method is stricter and accurate in specifying user’s trustworthiness as compared to the previous works. Therefore, based on the result, this study resolves the issue of specifying the user’s trustworthiness. This study also indicates that the issue of protecting sensitive attributes has been resolved.
format Article
author Salji, Mohd Rafiz
Udzir, Nur Izura
Hafez Ninggal, Mohd Izuan
Mohd Sani, Nor Fazlida
Ibrahim, Hamidah
spellingShingle Salji, Mohd Rafiz
Udzir, Nur Izura
Hafez Ninggal, Mohd Izuan
Mohd Sani, Nor Fazlida
Ibrahim, Hamidah
Trust-based access control model with quantification method for protecting sensitive attributes
author_facet Salji, Mohd Rafiz
Udzir, Nur Izura
Hafez Ninggal, Mohd Izuan
Mohd Sani, Nor Fazlida
Ibrahim, Hamidah
author_sort Salji, Mohd Rafiz
title Trust-based access control model with quantification method for protecting sensitive attributes
title_short Trust-based access control model with quantification method for protecting sensitive attributes
title_full Trust-based access control model with quantification method for protecting sensitive attributes
title_fullStr Trust-based access control model with quantification method for protecting sensitive attributes
title_full_unstemmed Trust-based access control model with quantification method for protecting sensitive attributes
title_sort trust-based access control model with quantification method for protecting sensitive attributes
publisher The Science and Information Organization
publishDate 2022
url http://psasir.upm.edu.my/id/eprint/102515/
https://thesai.org/
_version_ 1770553009481187328
score 13.211869