An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes
Abstract
:1. Introduction
2. Problem Formulation
2.1. Demand for Collaborative Information in Multilayer Rail Transit System Integration
2.2. Categorical and Hierarchical System for Integrated Data in Multilayer Rail Transit Systems
- A.
- Categorization of Rail Transit Data
- B.
- Hierarchization of Rail Transit Data
- C.
- Lifecycle of Rail Transit Data
2.3. Access Control Framework for Multilayered Railway Systems
3. Access Control Policy Combination Method for Data Fusion in Railway Traffic Systems
3.1. Object Sensitivity
- A.
- Utilization
- B.
- Correlation.
3.2. Subject Trust
- A.
- Direct trust.
- B.
- Recommendation trust.
3.3. Policy of TSABAC
3.4. Policy Composition Algebra
4. Access Control Policy Conflict Detection and Resolution
4.1. Compatible Policy of TSABAC
- modifier exhibits the characteristics of the DAC model. In this case, the permissions possessed by the subject can be divided into private and public permissions. Public permissions can be passed on, while private permissions cannot.
- sa.rank != Δ and oa.rank != Δ represents an MAC model. In this case, the security levels of the subject and object are pre-assigned by administrators, and they are used as identifiers to check whether the information flow in the access control policy is one-way.
- sa.role != Δ represents an RBAC model. In this case, permissions are transferred through roles. The policy conflict detection in RBAC is mainly based on the flow direction of role permissions.
- Ts exhibits the characteristics of the TBAC model. Ts = {t1, t2, …, tn} represents a set of tasks, and ti represents a subset of tasks. In this case, the relationships between tasks can be synchronous, mutually exclusive, sequential, or dependent on delegation of authority.
- State exhibits the characteristics of the UCON model, and it represents a set of states, i.e., State = {state1, state2, …, staten}. In this case, conflicts are determined by checking the obligations of the access subject.
- ea shows the characteristics of the ABAC model, where ea is the attribute set of the environment.
- Other access control models are described using ABAC attributes, which are unified for description.
4.2. Policy Conflict Detection Based on TSABAC
Algorithm 1. Detecting modality conflict |
Input: Access policy set Po |
Output: Access policy set with modality conflict Pm, access policy set passing the detection Po |
1: begin 2: for ∀ pi ∈ Po do 3: for ∀ pj ∈ pi& i ≠ j do 4: read each attribute value of pi and pj 5: if same attribute values exist then 6: compare the next attribute value 7: else if the different value is eff then 8: added pi to Pm, and remove pi from Po 9: end for 10: end for 11: end |
Algorithm 2. Detecting condition conflict |
Input: Access policy set Po |
Output: Access policy set with condition conflict Pc, access policy set passing the detection Po |
1: begin 2: for ∀ pi ∈ Po do 3: for ∀ pj ∈ pi& i ≠ j do 4: read each attribute value of pi and pj in AA = {SA, OA} 5: if pi. AA ⊂ pj. AA | pi. AA ⊃ pj. AA then 6: read each attribute value of pi and pj in CON 7: if pi. CA ⋂ pj. CA ≠ ϕ & pi.eff ≠ pj.eff then 8: added pi to Pm, and remove pi from Po 9: end for 10: end for 11: end |
4.3. Policy Conflict Resolution Based on Joint Priority Principles
- Owner Priority Principle. If the priorities of the policy owners are not equal, select the policy with the higher priority of the policy owner as the result.
- Specialness Priority Principle. A special policy refers to a policy whose subject domain and object domain are included in another one. The special policy is considered to be the resolution result of conflict resolution.
- Model Priority Principle. Within multiple access control models, we first determine the type of access control policy based on the Equation (11). If two access control policies conform to different models, the conflict resolution of access control policy is completed according to the predetermined priority order of {MAC, DAC, UCON, TBAC, RBAC, ABAC}.
- High-level object priority principle. In the MAC model, it focuses on protecting the security of resources. The policy with a higher security level for the object is given priority in conflict resolution.
- New loading priority principle. In the DAC model, to ensure the timeliness of authorization, select the most recently loaded access control policy as the result of conflict resolution.
- Attributes in use priority principle. In the UCON model, subject attributes change during the access process affect the subject’s authorization. Thus, the policy with higher priority for attributes in use is accepted.
- Recent task priority principle. In the TBAC model, the most prominent feature is that a task consists of multiple subtasks, and completing the task is given priority. Among them, the subtask with the latest time is given priority.
- High-level subject priority principle. In the RBAC model, access control policies focus on the permissions obtained by the subject role, so the role of the subject has higher priority, the subject has higher priority. When the subject priority levels of the two access control policies are inconsistent, the policy with the higher priority level is given priority.
- High sensitivity priority principle. In the ABAC model, it focuses on protecting the object resources, so the policy with a higher priority for the object sensitivity has higher priority.
- Negation priority principle. When the authorization results of the two policies are opposite, to protect the security of the object resources, denying authorization is given priority.
5. Application and Analysis
5.1. Application of Cccess Control Architecture in Multilayer Rail Transit Systems
5.2. Access Control Policy Composition in Multilayer Rail Transit System
- A.
- The results of policy composition between trunk rail and intercity railway
- (1)
- If trunk railway agrees that “access not allowed by intercity railway should not be accessed”, the composition result is .
- (2)
- If intercity railway agrees with “access allowed by trunk railway should be accessed “, the composition result is .
- (3)
- If both trunk railway and intercity railway take a step back, the composition result could be realized by fw (Pt, Pi), where fw is the mean operator, and is expressed as:
- B.
- The policy composition result between trunk railway and suburban railway.
- (1)
- If trunk railway agrees that “access allowed by suburban railway is permitted”, the composition result is Pt ∨ Ps ^ obj.quality>0.7 = Ps.
- (2)
- If suburban railway agrees that “access not allowed by trunk railway should not be accessed”. the composition result is Pt ∧ Ps ^ obj.quality≤0.7 = Pt
- C.
- The policy composition result between trunk railway and urban rail transit
- D.
- The policy composition result among trunk railway, intercity railway, suburban railway, and urban rail transit
5.3. Performance Analysis of Access Control Policy Conflict Resolution
6. Conclusions and Future Work
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Pan, Z.; Zhang, T.; Tang, H.; Wang, Y. Research on the “Four-Network Integration” System of Multi-Level Rail Transit. Transp. Eng. 2020, 20, 1–8. [Google Scholar]
- Yu, X.; Zhang, L. Research on the four networks integration development of Beijing rail transit and railway. Mod. Urban Rail Transit 2021, 1, 1–6. [Google Scholar]
- Liu, Y.; Li, L.; Lu, F.; Wang, C.; Wang, L. Key technologies of data governance of “four-network integration” for rail transit. Railw. Comput. Appl. 2023, 32, 82–86. [Google Scholar]
- Li, Q. Railway Data Security Governance System and Privacy Computing Technology Research. Ph.D. Thesis, China Academy of Railway Sciences, Beijing, China, 2023. [Google Scholar]
- Zhu, L. Research and Implementation of the Mandatory Access Control on Gateway Devices in Railway Information System. Ph.D. Thesis, Beijing Jiaotong University, Beijing, China, 2014. [Google Scholar]
- Suo, X.; Qi, S.; Zhang, Y.; Zhu, H. Research on fine-grained access control scheme of railway cloud platform. Railw. Comput. Appl. 2021, 30. [Google Scholar]
- Wang, B. Research on Collaborative Design Application of Subway Comprehensive Pipelines Based on RBAC And Bim. Ph.D. Thesis, Xi’an University of Technology, Xi’an, China, 2018. [Google Scholar]
- Wu, J. Research on Key Technologies of Railway Data Assets Sharing Based on Blockchain. Ph.D. Thesis, China Academy of Railway Sciences, Beijing, China, 2022. [Google Scholar]
- Yu, W.; Zhang, L.; Xu, Q. Real-Time Reliability Access Control Based on Rail Traffic Data Platform. Electronics 2023, 12, 1105. [Google Scholar] [CrossRef]
- Zhang, L. Cloud Computing Based Railway Information Sharing Platform and Key Technologies Research. Ph.D. Thesis, China Academy of Railway Sciences, Beijing China, 2013. [Google Scholar]
- GB/T 37988-2019; Information Security Technology—Data Security Capability Maturity Model. State Administration for Market Regulation: Beijing, China, 2019.
- Wang, J. Study on Technology of Access Control of Attribute-Based Encryption and Emergency Decision of Shared Data of High-Speed Railway. Ph.D. Thesis, Beijing Jiaotong University, Beijing, China, 2017. [Google Scholar]
- Zhou, L.; Zhang, X.; Qiu, Y.; Zhu, Y.; Miao, S.; Jiang, L. Research on Power Data Classification and Grading Method. Electr. Power Inf. Commun. Technol. 2023, 21, 25–30. [Google Scholar]
- Han, D.-J.; Gao, J.; Zhai, H.-L.; Li, L. Research Development of Access Control Model. Comput. Sci. 2010, 137, 29–33+43. [Google Scholar]
- Xing, Y.; Wang, X.; Han, X.; Zhang, C. Influence of network nodes in new media environment based on information entropy—A case study of WeChat public account. Libr. Inf. Work 2018, 62, 76–86. [Google Scholar]
- Wang, J.; Luan, J.; Tan, Y. Research on big data access control model based on data sensitivity. Comput. Eng. Appl. 2019, 55, 70–77. [Google Scholar]
- Zhao, P.; Wu, L.; Hong, Z.; Sun, H. Research on multicloud access control policy integration framework. China Commun. 2019, 16, 222–234. [Google Scholar] [CrossRef]
- Li, N.; Wang, Q.; Qardaji, W.; Bertino, E.; Rao, P.; Lobo, J.; Lin, D. Access control policy combining: Theory meets practice. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT ‘09), Stresa, Italy, 3–5 June 2009; Association for Computing Machinery: New York, NY, USA, 2009; pp. 135–144. [Google Scholar]
- Ma, X.-P.; Li, Z.-Y.; Lu, J.-F. Research on Specification Language and Policy Conflict of Access Control Policy. Comput. Eng. Sci. 2012, 34, 48–52. [Google Scholar]
- Bonatti, P.; De Capitani di Vimercati, S.; Samarati, P. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 2002, 5, 1–35. [Google Scholar] [CrossRef]
- Hu, J. A Privavy-Awaer Access Control Police Composition Research in Cloud Computing Environment. Ph.D. Thesis, Beijing University of Technology, Beijing, China, 2016. [Google Scholar]
Data Item | Category | Hierarchy | Timeliness | ||
---|---|---|---|---|---|
1st-Level Subclass of Business | 2nd-Level Subclass of Business | Subclass of Data | |||
Bridge location | Management | Construction | Bridge construction | 2 | Static |
Tunnel length | Management | Construction | Tunnel construction | 2 | Static |
Slope rate | Management | Construction | Roadbed construction | 2 | Static |
Locomotive inspection and repair | Management | Equipment | Locomotive and vehicle | 4 | periodical |
Operating status of computer-interlocking system | Management | Monitoring | Fixed facility monitoring | 3 | Real-time |
Train operation safety monitoring information | Management | Monitoring | Mobile facility monitoring | 3 | Real-time |
Slope displacement monitoring | Management | Monitoring | Disaster monitoring | 3 | Real-time |
Train electricity consumption | Production | Train | Electric information | 2 | Periodical |
Balise inspection/service logs | Production | Operation and maintenance | Facilities maintenance | 3 | Periodical |
Statistics of ticket reservation | Production | Dispatch | Passenger flow forecast | 1 | Real-time |
Freight train formation plan | Production | Dispatch | Train operation plan | 4 | Real-time |
Train speed and position measurement | Production | Train control | Operational control | 4 | Real-time |
Passenger ID information | External | User | Passenger | 4 | Periodical |
Organization code | External | User | Supplier | 2 | Periodical |
Passenger throughput | External | Network | Network traffic | 2 | Periodical |
Passenger arrivals | External | Passenger flow | Transfer station | 4 | Periodical |
Model | Granularity | Expressiveness | Complexity | Scalability | Compatibility | Flexibility | Security | Assessment |
---|---|---|---|---|---|---|---|---|
DAC | 1 | 1 | 4 | 2 | 1 | 3 | 1 | 2.05 |
MAC | 1 | 1 | 4 | 1 | 1 | 1 | 4 | 2.1 |
RBAC | 3 | 3 | 3 | 3 | 3 | 2 | 2 | 3.05 |
ABAC | 4 | 4 | 1 | 4 | 4 | 4 | 3 | 3.4 |
TABC | 2 | 2 | 2 | 2 | 3 | 4 | 2 | 3.2 |
UCON | 4 | 3 | 1 | 3 | 3 | 2 | 1 | 2.9 |
POL | Deny-Override | Only-One-Applicable | Weak Consensus | Strong Majority | Trust-Based Voting Vm,n |
---|---|---|---|---|---|
1 | Ps > 0 ∧ Ds = 0 ∧ CLs = 0 | Ps = 1 ∧ Ds = 0 ∧ CLs = 0 | Ps > 0 ∧ Ds = 0 ∧ CLs = 0 | Ps > Ds + NAs +CLs | Ps ≥ m ∧ NAs + CLs ≥ Ds ∧ T > Tthd |
0 | Ds > 0 | Ps = 0 ∧ Ds = 1 ∧ CLs = 0 | Ps = 0 ∧ Ds > 0 ∧ CLs = 0 | Ds > Ps + NAs + CLs | Ps < m ∧ T ≥ Tthd |
⊤ | Ds = 0 ∧ CLs > 0 | Ps > 1 ∨ Ds > 1 ∨ IN > 0 | (Ps > 0 ∧ Ds > 0) ∨ CLs > 0 | (Ps ≤ Ds + NAs + CLs) ∧ (Ds ≤ Ps + NAs + CLs) ∧ (Ps + Ds + CLs > 0) | NAs + CLs ≤ Ds ∧ T ≥ Tthd |
⊥ | else |
Pol | SA | OA | CA | T | S | OP |
---|---|---|---|---|---|---|
Pt | sub.level > 5 | obj.level ≤ 2 obj.quality ≤ 0.7 | link = secure date < 2022.12.30 | T > 0.8 | S < 3 | op = read |
Pi | sub.level > 5 | obj.level ≤ 2 obj.quality ≤ 0.8 | link = secure date < 2022.12.30 | T > 0.8 | S < 2 | op = read |
Ps | sub.level > 5 | obj.level ≤ 2 | link = secure date < 2022.12.31 | T > 0.8 | S < 3 | op = read |
Pu | sub.level > 5 sub.quality ≥ 3 | obj.level ≤ 3 obj.quality ≤ 0.8 | date < 2022.12.31 | T > 0.8 | S < 3 | op = read |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Geng, X.; Wen, Y.; Mo, Z.; Liu, Y. An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes. Appl. Sci. 2023, 13, 12904. https://doi.org/10.3390/app132312904
Geng X, Wen Y, Mo Z, Liu Y. An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes. Applied Sciences. 2023; 13(23):12904. https://doi.org/10.3390/app132312904
Chicago/Turabian StyleGeng, Xin, Yinghong Wen, Zhisong Mo, and Yu Liu. 2023. "An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes" Applied Sciences 13, no. 23: 12904. https://doi.org/10.3390/app132312904
APA StyleGeng, X., Wen, Y., Mo, Z., & Liu, Y. (2023). An Access Control Framework for Multilayer Rail Transit Systems Based on Trust and Sensitivity Attributes. Applied Sciences, 13(23), 12904. https://doi.org/10.3390/app132312904