• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    A Traceable Capability-based Access Control for IoT

    2022-11-11 10:46:24ChaoLiFanLiChengHuangLihuaYinTianjieLuoandBinWang
    Computers Materials&Continua 2022年9期

    Chao Li,Fan Li,2,Cheng Huang,Lihua Yin,*,Tianjie Luo,2 and Bin Wang

    1Cyberspace Institute of Advanced Technology,Guangzhou University,Guangzhou,510700,China

    2PCL Research Center of Cyberspace Security,Peng Cheng Laboratory,Shenzhen,518052,China

    3Department of Electrical and Computer Engineering,University of Waterloo,Waterloo,N2L 3G1,Canada

    4College of Electrical Engineering,Zhejiang University,Hangzhou,310058,China

    Abstract: Delegation mechanism in Internet of Things(IoT)allows users to share some of their permissions with others.Cloud-based delegation solutions require that only the user who has registered in the cloud can be delegated permissions.It is not convenient when a permission is delegated to a large number of temporarily users.Therefore, some works like CapBAC delegate permissions locally in an offline way.However,this is difficult to revoke and modify the offline delegated permissions.In this work,we propose a traceable capability-based access control approach(TCAC)that can revoke and modify permissions by tracking the trajectories of permissions delegation.We define a time capability tree(TCT)that can automatically extract permissions trajectories, and we also design a new capability token to improve the permission verification, revocation and modification efficiency.The experiment results show that TCAC has less token verification and revocation/modification time than those of CapBAC and xDBAuth.TCAC can discover 73.3% unvisited users in the case of delegating and accessing randomly.This provides more information about the permissions delegation relationships, and opens up new possibilities to guarantee the global security in IoT delegation system.To the best of our knowledge,TCAC is the first work to capture the unvisited permissions.

    Keywords: IoT access control; permission delegation; delegation trajectory;capability revocation;capability modification

    1 Introduction

    Internet of Things(IoT)has been discussed and deployed in various fields such as smart home,transportation, healthcare, and industrial automation [1-4].This brings many security challenges[5-7].The OWASP IoT project shows that the vulnerabilities of IoT devices are mainly focused on insecure access to IoT applications [8].A lot of works focus on the IoT access control to avoid unauthorized access[9].

    Delegation is an authorization mechanism in IoT system, which aims to make permissions transmission more convenient.It allows users to share permissions from their permission set to other users.For example,Alice delegates her car’s smart key to Bob,and asks him to help retrieve her bag from her car.Bob can use the smart key to open the car door,but he cannot start the car.In this case,the permission set of Alice smart key is{open car door,start the car,play music,...}.Alice only shares Bob with the{open car door}permission.Some products provide cloud-based delegation services to users to achieve permissions delegation,such as SmartThings[10],IFTTT[11]and GoogleHome[12].However,the cloud-based solutions require users to register in the cloud.For example,if Alice wants to delegate the{open car door}permission to Bob,she must first ask Bob to register in the cloud.It is not convenient when there are a large number of temporarily delegatees who have not registered in the cloud.Since the capability-based access control (CapBAC)[13] issues and delegates permissions by capability tokens,the authorization process can be executed on smart devices locally[14].It delegates the permissions in an offline way without registeration, and this makes permissions delegation user-kindly.

    However,offline delegation in CapBAC are independently determined by users,which are more likely to be wrong or to conflict than those made by administrators.CapBAC allows users to delegate permissions according to their own security constraints.This leads no administer to know all the permission distribution,and brings difficulties in permissions revocation and modification.To solve the problem, CapBAC provides three functions to revoke delegated capabilities:IdentifiedCapabilityOnly,AllCapabilitiesandDependentCapabilitiesOnly.They are not flexible enough to deal with various changes in capability delegation relationships.For example,if an apartment is sold,and the new owner wants to retain the {open smart lock} permissions of all the tenants.Each tenant’s {open smart lock}permission may be delegated to his family,which forms the delegation relationships.The old owner of the apartment will be deleted in the delegation trajectory while preserving the permissions delegation relationships of tenants.The new owner will be added in the delegation trajectory to replace him.The functions CapBAC provides can not address such problems.

    To extend CapBAC,existing methods utilize a revocation/modification list to address delegation changes.However,these methods do not change the issued capability tokens which are still valid.These valid tokens bring more risks to the system.What’s more,as soon as the revocation/modification list is maliciously tampered,any access in the system can not be trusted.In addition,the capability token used in the CapBAC contains the previous token.The nested tokens need to be decrypted iteratively to trace back the first delegator who is the capability owner,to verify the legitimacy of the capability token.This operation will be repeated every time when the token is used.We find that adding a tracking function can solve above problems.The permissions delegation trajectories can be used to simplify token verification, revocation and modification in IoT delegation system, which can solve these problems.

    We propose a traceable capability-based access control approach (TCAC), which uses a new time capability tree(TCT)to track permissions delegation trajectories.It provides a concise legality verification,and a fine-grained permissions revocation and modification.It can also track permissions which have been delegated but not used, which obtains more delegation information and makes it possible to analyze the global permissions delegation relationships.This enhances the security of the IoT delegation system.Our contributions are as follows:

    ? We propose a trajectory extracting method to extract the trajectories of delegated permissions.By using the time capability tree with new capability token, all delegation trajectories will be obtained automatically.

    ? Based on the trajectory extracting method, we propose the traceable capability-based access control approach (TCAC).It supports fine-grained permissions delegation, revocation and modification.To the best of our knowledge, TCAC is the first work to capture unvisited permissions,which can track permissions delegated but not used.

    ? The experimental results show that TCAC has obvious advantage in token verification,token revocation/modification and delegation trajectory capture than those of CapBAC and xDBAuth.It can discover 73.3%of unvisited users when all users delegate and access randomly.

    The rest of the paper is organized as follows.In Section 2, we describe related works.Section 3 presents the architecture of TCAC.The token verification, delegation, revocation and modification will be given in Section 4.Section 5 shows the experiments of TCAC.Section 6 summarizes our work.

    2 Related Works

    Access control methods prevent unauthorzied access from subjects to objects.In an IoT context,attribute based access control (ABAC)[15] is widely used, while it do not provide flexible and user-kindly permissions delegation features.CapBAC allows users to delegate permissions with its capability tokens.Recently, several works have further explored CapBAC.Anggorojati et al.[16]combine delegation mechanism with capability propagation to expand the flexibility of IoT access control.They propose capability-based context aware access control(CCAAC),which is used to adapt the scalability and heterogeneity of IoT networks.But the requirement for prior knowledge limits the use of CCAAC.Hernández-Ramos et al.[17] propose a distributed capability-based access control model (DCapAC)to expand the usage scenarios.It is directly deployed on resource-constrained devices in a distributed IoT system.However, the capability delegation and revocation are not described.Xu et al.[18] propose a federated capability-based access control (FedCAC)framework,which presents the whole token processing.FedCAC delegates part of the identity verification and authorization tasks to the domain delegator.However,the establishment of domain delegator is not suitable for the resource-constrained IoT environment.BlendCAC[19]is subsequently proposed as the follow-up work.It combines blockchain and CapBAC,and uses smart contracts to delegate capability tokens.But the token revocation and modification are not fine-grained enough.Pal et al.[20] use a hybrid method of attributes,roles,and functions to provide a policy-based access control architecture.The delegation of capabilities is described in detail in [21].However, explicit revocation of tokens is not supported in its decentralized design,and the centralized token distribution limits its application.

    To solve the capability revocation and modification problem,the traceability needs to be added in CapBAC, which has been widely used in the cloud of data sharing.For example, Shen et al.[22]propose a traceable group data sharing scheme,to support anonymous multiple users in public cloud.In the case of access control,Guo et al.[23]add tracking function in the process of data entryption to support a dynamic access control.Li et al.[24] propose TRAC to track private key in CP-ABE,to identify the malicious user leaking his private key.Yu et al.[25] utilize the blockchain to achieve a traceable data sharing in industrial IoT.The revocation list is used in their scheme.The tracking function in CapBAC has not been proposed.

    In this paper, we propose a traceable capability-based access control approach (TCAC).Its traceability is guaranteed by the defined time capability tree and the new capability token.TCAC can monitor the permissions delegation automatically,achieving a concise token verification and flexible permissions revocation and modification.What’s more,the ability to capture the unvisited permissions can get more information of the permissions delegation relationships, which is benefit to guarantee the system security.

    3 TCAC Architecture

    The architecture of TCAC is shown in Fig.1.Center Serveris the platform which issues the root capabilities.User Groupis the users in the delegation system.Resource Serveris the object which users want to access.The summary of abbreviations is as follows:

    ?PIP:Policy Information Point,which gets the information needed in access control decisionmaking;

    ?PAP:Policy Administration Point,which manages the access control policies;

    ?PDP: Policy Decision Point, which makes access decisions according to the access control policies and information;

    ?PEP:Policy Enforcement Point,which forms the access control request to PDP and translates the result of decision to other modules;

    ?TI:Token issuer,which issues the capability tokens;

    ?TV:Token Verification,which verifies the validity of capability tokens;

    ?TR:Token Reconstruction,which generates the new capability tokens;

    ?DT:Delegation Trajectory,which is the global capability delegation trajectory.

    Figure 1:The architecture of TCAC

    In theCenter Server,after PDP makes access decisions with the information from PIP and access control policies from PAP, PEP translates the result to TI, which issues the root capability token touser1.The validity of the root token can be verified by TV inuser1, thenuser1writes the delegation information and his local time capability tree in the new capability token with TR.He can delegate the capability to all users inUser Group.When a user accesses the resource,theResource Serververifies the token by TV,extracts the local time capability tree,and combines it with other time capability trees to form a global tree as the permissions delegation trajectory,which is DT.It will be used for token verification, revocation and modification.If the PDP inResource Serverallows the user to access resource, the PEP translates the order to SP, which provides service to the user.Then a capability delegation is finished.

    We introduce the TCAC architecture in this section, including the time capability tree, the capability token structure,and the authorization,encryption and verification methods.

    3.1 Time Capability Tree

    3.1.1 Local Time Capability Tree

    In IoT delegation system, each user delegates his permissions to others.The one-to-multiple relationship is suitable to be saved by a tree,so we define a time capability tree to record the permissions delegation trajectory.The time capability tree is defined by a 5-tuple<Resourse ID,Capability,UserID,Effective Time,Access Records >, which exists in each capability token of TCAC.As shown in Fig.2, TheResource IDand TheCapabilityin theTitlerecord the user’s permission to perform operations on resources,such as open the smart lock,close the car window,etc.In theTree,User IDrepresents the unique identity of the user.Effective Timeis the time interval when the capability is valid.Access Recordis a series of timestamps that records the user’s access time.Time capability tree exists in each capability token of TCAC.In TCAC,a permission delegation trajectory can be extracted from each capability token,and the global delegation trajectory can be obtained by combining all the time capability trees.

    Figure 2:The structure of time capability tree

    3.1.2 Combination of Global Time Capability Tree

    Time capability tree exists in the token delegated to each user.Assuming that the time each user was given a token and each time capability tree was created are different,the delegators only get limited information about time capability tree.To obtain a globle time capability tree,all time capability trees received must be combined in theResource Server.The combination of the time capability trees can be expressed as the following:

    whereTreeGlobalis the global time capability tree combined by theResource Sever, andTreeiis the local time capability tree exists in the capability token.Fig.3 shows the combination of global time capability tree.Initially,there is no time capability tree on theResource Serveruntil an access request arrives.After receiving the first token fromuser A,theResource Serverconstructs a root time capability tree.At this time,there is only oneuser Anode in the global time capability tree.Thenusers B,C,andDaccess to the resource.They show their tokens to theResource Server,and the local time capability trees are extracted.Since the time capability trees ofuser Canduser Dcome fromuser Aanduser Bwhich are the delegators,user CandDare unware of others capability delegation operations.These two local time capability trees are not complete.Only if theResource Serverconbains them can we get the global capability tree.

    If a new user does not access theResource Server, which is defined as the unvisited user.Then theResource Servercannot discover the unvisited token,and the user will not exist in the global time capability tree.The unvisited users are the mainly barrier of monitoring the delegation relationships of IoT system.In TCAC, the local time capability tree of a permission always records delegation information of other users, through these users do not participate in that permission’s delegation.The delegation information make TCAC able to capture the unvisited users by combain the global time capability tree.The capture efficiency of unvisited users will be discussed in Section 5.

    Figure 3:Combination of global time capability trees

    3.2 TCT Capability Token

    We define a new capability token for TCAC.Whenuser Adelegates capability touser B,the tokenCapA→Bis defined as:

    ?IDA:The unique identity ofuser A;

    ?IDB:The unique identity ofuser B;

    ?PKpre:The public key of the previous user which delegates the token touser A;

    ?Cappre:The Capability issued by the previous user which delegates the token touser A;

    ?TCTB:The time capability tree constructed byuser Aincludingnode B;

    ?C:The contextual information;

    ?SignatureA:The signature ofuser A;

    ?f:The one-way hash function;

    In the TCAC token,IDAandIDBare used to identify the virtual/real identity of delegator and delegatee.PKpreandCappreprovide information about the previous delegator of the token, which is used by theResource Serverin token verification.Callows users to add contextual information during delegation,such as the delegation time and user location[26].SignatureAis used to protect the token from being tampered.After the delegator verifies the delegatee identity and the public key,capability token will be signed and delegated.

    4 Detailed System Description

    The Fig.4 shows the flowchart of authorization and request service in TCAC.The delegator receives an authorization request from the delegatee,which includes his ID and public key.The communication legitimacy is guaranteed by establishing a trusted channel.After legitimacy verification,the delegator generates the token,signs it and delegates it with the public key to delegatee.Delegatee uses the public key to verify the Signature,then obtains the required permission.We present the detail description of token verification,delegation,revocation and modification of TCAC in this section.

    Figure 4:Flowchart of authorization and request service in TCAC

    4.1 Token Verification

    The token security of TCAC is guaranteed by the asymmetric encryption.Assume that Alice is the delegator,and Bob is the delegatee.The encryption is expressed as:

    whereTokenis the encryptedtoken,CapA→Bis the content of thetoken, andPKbis the public key of Bob.SignatureAensures that the token comes from Alice, and the content is not tampered.The asymmetric encryption enables only the delegatee knows the content of token.The two encryption methods work together to ensure the integrity and confidentiality ofCapA→B.

    The token verification in TCAC supports common verification and quick verification.

    (i)Common Verification

    Whentokenis successfully decrypted and theSignatureis verified,the obtained capabilitytokenis considered to be valid.If a new user sends a capability request to theResource Serverfor the first time,it needs to perform the iterative decryption on thetokento verify the legitimacy.The decryption is expressed as:

    whereSKis the private key of theResource Server.AfterCapis decrypted,the obtainedCappreandPKpreare used to continue the decryption.The process will be iterated until the root capability is verified,then thetokenis confirmed valid.

    (ii)Quick Verification

    When the user sends a capability request to theResource Serveragain, the server only needs to obtain theUser IDand the requested capability in the token,then search in the global time capability tree.If theUser IDexists in the global time capability tree,and the request time is within theEffective Time,the request will be allowed.Then the access time will be recorded in the global time capability tree.

    Algorithm 1:The common verfication and quick verification of TCAC Input:Useri,tokeni,TCTglobal,Effective Time,Expiration Time(Continued)

    Algorithm 1:Continued Output:AlloworDenyaccess begin verify the identity of the Useri;decrpty the tokeni;if Useri Node ∈TCTglobal&Useri Access Time ∈(Effective Time,Expiration Time)then AlloworDenyaccess=Allow;else if tokeni is valid then AlloworDenyaccess=Allow;TCTglobal=TCTglobal+Useri Node;else AlloworDenyaccess=Deny;end if end

    The Algorithm 1 implements the common verfication and quick verification of TCAC, which solves the iterative decryption problem.It simplifies the token verification and reduces the need in special IoT devices,which makes TCAC more suitable for resource-constrained IoT environment[27].

    4.2 Token Delegation

    We present the time capability trees change in the TCAC’s token delegation of three scenarios:all capability, partial capability, and constrained capability.All capability means the delegatation of all the delegator’s permission set.Partial capability means delegating part of the delegator’s permission set.Constrained capability means delegating a new constrained capability which is defined by the delegator.We use the first letter of each user’s name to replace the node in the time capability tree,and set theEffective Timeto the maximum(ti~tn).

    The delegation in TCAC is shown in Fig.5.Alice is the root user with capabilitiesreadandwriteto the resourceFile.We use R and W to represent the two capabilities.

    1)At timet0,after Alice gets the root tokenΩ0,she obtains the capability toreadandwrite File.

    2)At timet1,Alice generates a new tokenΩ1,and delegates R and W to Bob by delegating them the tokenΩ1.The time capability tree inΩ1is generated by Alice,which is the combination of the time capability tree known by Alice and the new node Bob.

    3)At timet2,Alice delegates R to Candy.All operations are the same,but the time capability tree has changed.The node Candy are added to the time capability tree,and only the R capability tree is saved inΩ2.This helps to protect privacy while reducing the size oftoken.

    4)At timet3,Bob delegates R to David.Bob only adds a new node David on the R capability tree he has obtained,since the capability delegation of Alice is transparent to Bob.

    5)At timet4,Bob delegates the constrained capability of W to Edward,which is recorded as W-.W-is the capability to rewrite part ofFile.W-needs to be defined in theResource Server,otherwise it will not be recognized.Bob adds Edward as a new node based on the W capability tree he has obtained,constructs the W-capability tree,and adds it to the tokenΩ4.

    Figure 5:TCAC’s capability delegation

    Algorithm 2:The permissions delegation trajectory capture algorithm Input:User Group,Useri,tokeni,TCTall,TCTpartial,TCTconstrained Output:AlloworDenyaccess,TCTglobal begin{the trajectory growth of a local TCT in delegation}{Delegator constructs the new TCT to delegate permission}for each Useri ∈User Group do verify the identity of the Useri;decrpty the tokeni;if the delegated capability is the all capability if Useri Node /∈TCTall&tokeni is valid then TCTnew=TCTall+Useri Node;AlloworDenyaccess=Allow;end if else if the delegated capability is the partial capability if Useri Node /∈TCTpartial&tokeni is valid then TCTnew=TCTpartial+Useri Node;(Continued)

    Algorithm 2:Continued AlloworDenyaccess=Allow;end if else if the delegated capability is the constrained capability if Useri Node /∈TCTconstrained&tokeni is valid then TCTnew=TCTconstrained+Useri Node;AlloworDenyaccess=Allow;end if else AlloworDenyaccess=Deny;end if TCTlocal =TCTnew end for TCTglobal=∑TCTlocal;end

    The Algorithm 2 implements the permissions delegation trajectory capture algorithm of TCAC.In an IoT delegation system,the capability delegation and the service request are performed simultaneously.TheResource Serverupdates the global time capability tree according to the newly receivedtoken,then obtain a global delegation trajectory.

    4.3 Token Revocation and Modification

    In CapBAC, some operations can’t be implemented, like to make new user replace an old one while ensuring the delegation relationships not changed.The time capability tree in TCAC provides fine-grained token revocation and modification.

    4.3.1 Capability Revocation

    Benefit from the global delegation trajectory, TCAC brings new possibilities to deal with more complex revocation requirements.Every access request in TCAC will add an access time to theAccess Recordsin global time capability tree.In the token verification, it needs to be checked whether the access time is within theEffective Time.If not, the access is considered illegal and will not be authorized.If we want to revoke the capability that has been captured,we change theEffective Timein the global capability tree from [start time, end time] to [start time, current time], and delete all child nodes.After that,all the issued tokens will be considered as invalid tokens,because theEffective Timesin their local time capability trees do not match the record in the global time capability tree.This change invalidates the capability of the user and all the related users.If we want to replace a user in the delegation relationships,we can change the global tree,and issue a new token to all the related users.Similar methods provide a great deal of flexibility for TCAC capability revocation.

    4.3.2 Capability Modification

    Compared with revocation, capability modification needs more flexibility of the access control system.Modifications are usually caused by caused improper capability definitions and improper delegations.In CapBAC, the improper capability definitions requires to correct of all the issued capability tokens,even though it is a minor change.But in TCAC,we only modify the semantics of the time capability treetitleon theResource Serverto modify similar capabilities.This change not only avoids reissuing all the tokens,but also preserves the capability delegation relationships.The improper delegation requires to change issued capabilities.In TCAC,we can revoke the capability,then reissue the token when the user requests it again.

    Algorithm 3:The token verification after permissions revocation and modification in TCAC Input:Useri,tokeni,TCTglobal,Effective Time,Expiration Time Output:AlloworDenyaccess,TCTglobal begin{the change in a global TCT of revocation and modification}{after a permission is revoked or modified in the delegation system}if Useri Node ∈TCTglobal&Useri Access Time ∈(Effective Time,Expiration Time)then AlloworDenyaccess=Allow;else if Useri Node ∈TCTglobal&Useri Access Time /∈(Effective Time,Expiration Time)then AlloworDenyaccess=Deny;TCTglobal=TCTglobal-Useri Node;else if tokeni is valid then AlloworDenyaccess=Allow;TCTglobal=TCTglobal+Useri Node;else AlloworDenyaccess=Deny;end if end

    The Algorithm 3 presents the token verification after token revocation and modification in TCAC.It is worth notice that the revocation and modification methods in TCAC are not unique.Different methods can be customized for a delegation system by changing the token verification algorithm.

    5 Experimental Evaluation

    We evaluate the token verification time,communication time,revocation/modification time and delegation trajectory capture efficiency to verify the effectiveness of TCAC.

    5.1 Experimental Implementation

    The root token issuer and theResource Serverare deployed on a laptop with the following configuration: the CPU is 1.6 GHz Intel Core i5 (4 cores), the RAM memory is 8GB, and the operating system is Ubuntu 16.04.10 Raspberry PI 4 Model B devices are used to represent 10 users.The configuration of the deivces is as follows: the CPU is 1.5 GHz 64-bit 4-core ARM Cortex-A72 architecture,the RAM is 4GB LPDDR4-3200,the operating system is Raspbian.The 2.4 GHz wireless hotspot is used for communication.

    We generate delegation trajectories from the randomly selected devices,to represent the local time capability trees of users.Then we combain them to obtain global time capability trees with delegation depths from 1 to 10.We finally get 1000 global time capability trees, which consist of 10,000 users.An attribute-based access control is deployed in the root token issuer, and the tokens are delegated randomly between users.We use RSA in our experiments, which has been proved faster in token encryption and signature[28].

    5.2 Token Verification Time

    The token we use in token verification has only one authorized user every layer(for example,the 4-layer token contains only 4 authorized users).The CCapBAC represents CapBAC that uses a token cache which stores the visited capability tokens.Tab.1 shows the results.

    In Tab.1,the verification time of the three methods are positively correlated with the delegation depth.CapBAC’s verification time increases fast with the increase of the delegation depth.CCapBAC and TCAC keep a small growth rate in token verification,while CCapBAC is faster than TCAC before the delegation depth is less than 5.TCAC shows advantage in token verification after the delegation depth is more than 4,because it has a smaller growth rate than those of the other two methods.When the delegation depth is 7,the verification time of CapBAC exceeds 2000 ms,but TCAC still maintains a 43.8 ms verification time.It is caused by the iterative RSA decryption and signature verification in CapBAC.CCapBAC and TCAC only verify the signature and search in the token cache or the global time capability tree,so their verification efficiency is higher.But CCapBAC uses the nested tokens as the same of CapBAC.The increasing size of token makes the search speed increase faster than that of TCAC.

    Table 1: The time of token verification with different delegation depths

    5.3 Communication and Token Revocation/Modification Time

    We implement experiments in communication and token revocation/modification time of Cap-BAC,TCAC and xDBAuth[29].xDBAuth is another way to use capability-based method.It combines capability token with the blockchain to achieve cross-domain access control.The results are shown in Fig.6.

    In Fig.6a,the communication time of CapBAC and TCAC are almost the same,and they increase with the increase of the token size.It shows that the communication time of TCAC is acceptable for the actual projects.The xDBAuth communication time is only related to the smart contract operations, so it is stable.Fig.6b shows that the revocation/modification time of xDBAuth and TCAC are almost constant with the delegation depth increasing.xDBAuth takes more time in token revocation/modification, because the operations in the smart contract is more complex.CapBAC needs to constuct a new capability token,so the revocation/modification time in CapBAC is increasing with the delegation depth.The token revocation and modification in TCAC are implemented by modifying the global capability tree,so the revocation/modification time is always the smallest than those of CapBAC and xDBAuth.

    5.4 Delegation Trajectory Capture Efficiency

    The delegation trajectory capture efficiency of the 1000 global delegation trajectoris are recorded.The calculation is as follows:

    Figure 6:(a)Communication time and(b)revocation/modification time in different delegation depths

    whereVrepresents the visited users,NVrepresents the unvisited users,Totalrepresents the total users,andCapturedrepresents the captured users.We set the access probability for all the users.The average capture efficiency and the unvisited users capture efficiency in different access probabilities are shown in Fig.7.

    In Fig.7a,the average capture efficiency of CapBAC is consistent with the users access probability,and the capture efficiency of TCAC is always higher than that of CapBAC.It shows that CapBAC only captures the visited users,and TCAC can discover the unvisited users.In Fig.7b,the unvisited users capture efficiency of CapBAC is always 0, and TCAC obtains a increasing unvisited users capture efficiency with the increase of access probability.When there are 1000 unvisited users in the 10,000 users, TCAC captures 733 of them.It shows that benefit from the time capability tree, TCAC has a strong ability of capturing unvisited users in a delegation system.

    Figure 7:(a)The average capture efficiency and(b)the unvisited users capture efficiency in different access probabilities

    6 Conclusion

    In this paper,we propose a traceable capability-based access control approach TCAC.We design a time capability tree to extract capability delegation trajectories, which can monitor the permissions delegation automatically.We also present methods how to execute the capability verification,delegation, revocation and modification in TCAC.The experimental results show that TCAC has advantages of being flexible in token verification, revocation and modification.Furthermore, the delegation trajectory capture efficiency of TCAC is higher than that of CapBAC which can not capture the unvisited users.When 10% of users do not access the resource, TCAC discovers 73.3%of those unvisited users.TCAC’s ability to capture unvisited users provides more information about the permissions delegation relationships.It makes the global delegation trajectory more complete,which brings new possibilities in global delegation analysis and enhances the security of the IoT delegation system.In conclusion, TCAC presents higher effectiveness in token verification, token revocation/modification,and delegation trajectory capture,with the acceptable communication time.

    Funding Statement:This work supports in part by National Key R&D Program of China (No.2018YFB2100400),National Science Foundation of China(No.61872100),Industrial Internet Innovation and Development Project of China (2019), State Grid Corporation of China Co., Ltd.technology project(No.5700-202019187A-0-0-00).

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    看黄色毛片网站| 一级a爱片免费观看的视频| 精品久久国产蜜桃| 国产成人aa在线观看| 欧洲精品卡2卡3卡4卡5卡区| 国语自产精品视频在线第100页| 日韩欧美精品v在线| 国产一区二区亚洲精品在线观看| 国产精品嫩草影院av在线观看| 别揉我奶头 嗯啊视频| 亚洲性久久影院| 嫩草影视91久久| 欧美精品国产亚洲| 久久久色成人| 亚洲丝袜综合中文字幕| 大型黄色视频在线免费观看| 99热只有精品国产| 一边摸一边抽搐一进一小说| 久久久a久久爽久久v久久| 人人妻人人澡人人爽人人夜夜 | 国产黄色视频一区二区在线观看 | 国产久久久一区二区三区| 国产免费男女视频| 一级a爱片免费观看的视频| 亚洲丝袜综合中文字幕| 国内少妇人妻偷人精品xxx网站| 亚洲av免费在线观看| 国模一区二区三区四区视频| 丝袜喷水一区| 欧美日韩一区二区视频在线观看视频在线 | 欧美成人a在线观看| 亚洲婷婷狠狠爱综合网| 国产精品永久免费网站| 在线观看66精品国产| 精品国产三级普通话版| 一区二区三区四区激情视频 | 又黄又爽又免费观看的视频| 国内揄拍国产精品人妻在线| 毛片一级片免费看久久久久| 天堂影院成人在线观看| 国产精品一区二区性色av| 在线免费观看的www视频| 97热精品久久久久久| 亚洲国产精品久久男人天堂| 一个人看的www免费观看视频| 少妇丰满av| 精品免费久久久久久久清纯| 蜜桃久久精品国产亚洲av| 日韩,欧美,国产一区二区三区 | 日韩一本色道免费dvd| 欧美精品国产亚洲| 99热全是精品| 看免费成人av毛片| 男女下面进入的视频免费午夜| 丝袜美腿在线中文| 国产大屁股一区二区在线视频| 黄色日韩在线| 精品乱码久久久久久99久播| 最近手机中文字幕大全| 国产高清三级在线| 天天躁夜夜躁狠狠久久av| 欧美一区二区国产精品久久精品| 久久精品国产亚洲网站| 国产亚洲精品av在线| 村上凉子中文字幕在线| 日日干狠狠操夜夜爽| 特大巨黑吊av在线直播| 一级毛片我不卡| 亚洲不卡免费看| 精品福利观看| 国产精品免费一区二区三区在线| 少妇人妻精品综合一区二区 | 亚洲国产日韩欧美精品在线观看| 亚洲精品成人久久久久久| 亚洲七黄色美女视频| 亚洲欧美精品综合久久99| 国内精品一区二区在线观看| 少妇丰满av| 男女视频在线观看网站免费| 级片在线观看| 国产精品综合久久久久久久免费| 一级毛片久久久久久久久女| 国产久久久一区二区三区| 国产老妇女一区| 在线免费观看的www视频| 日韩亚洲欧美综合| 小蜜桃在线观看免费完整版高清| 日本五十路高清| 一级毛片久久久久久久久女| 久久精品国产鲁丝片午夜精品| 亚洲成人av在线免费| 91麻豆精品激情在线观看国产| 俺也久久电影网| 精品一区二区三区av网在线观看| 三级国产精品欧美在线观看| 18禁在线播放成人免费| 一级av片app| 婷婷亚洲欧美| 亚洲国产欧洲综合997久久,| 成人鲁丝片一二三区免费| 不卡视频在线观看欧美| 精品一区二区免费观看| 成人av在线播放网站| 天堂av国产一区二区熟女人妻| 嫩草影视91久久| 在线观看美女被高潮喷水网站| 蜜桃亚洲精品一区二区三区| 日日摸夜夜添夜夜添av毛片| 亚洲欧美成人综合另类久久久 | 日日摸夜夜添夜夜爱| 色尼玛亚洲综合影院| 亚洲人成网站在线播放欧美日韩| 久久久久久国产a免费观看| 最近的中文字幕免费完整| 中文资源天堂在线| 亚洲成人中文字幕在线播放| 久久久久九九精品影院| 欧美高清成人免费视频www| 人人妻人人澡欧美一区二区| 日本a在线网址| 亚洲美女搞黄在线观看 | 中文字幕精品亚洲无线码一区| 欧美+日韩+精品| 最新中文字幕久久久久| 高清毛片免费观看视频网站| 97超碰精品成人国产| 国产精品无大码| av卡一久久| 国产又黄又爽又无遮挡在线| 国产男靠女视频免费网站| av视频在线观看入口| 天堂影院成人在线观看| 大型黄色视频在线免费观看| av卡一久久| 午夜精品一区二区三区免费看| 22中文网久久字幕| 欧美在线一区亚洲| 成人一区二区视频在线观看| 午夜影院日韩av| 免费人成视频x8x8入口观看| 联通29元200g的流量卡| 亚洲成人中文字幕在线播放| 国产片特级美女逼逼视频| 国产激情偷乱视频一区二区| 99国产极品粉嫩在线观看| 搡老妇女老女人老熟妇| 精品一区二区三区av网在线观看| 97人妻精品一区二区三区麻豆| 99久国产av精品国产电影| 国内久久婷婷六月综合欲色啪| 国产一级毛片七仙女欲春2| 亚洲最大成人av| 特大巨黑吊av在线直播| 天天躁夜夜躁狠狠久久av| 欧美日韩乱码在线| 欧美一级a爱片免费观看看| 97碰自拍视频| 18禁在线无遮挡免费观看视频 | 我要看日韩黄色一级片| 国产色爽女视频免费观看| 亚洲av中文av极速乱| 最近中文字幕高清免费大全6| 亚洲第一电影网av| 99国产极品粉嫩在线观看| 久久韩国三级中文字幕| 赤兔流量卡办理| eeuss影院久久| 日本一二三区视频观看| 日本熟妇午夜| 少妇的逼好多水| 狂野欧美白嫩少妇大欣赏| 成人高潮视频无遮挡免费网站| 久久久久久久久大av| 狂野欧美白嫩少妇大欣赏| 国产精品国产高清国产av| 日韩欧美三级三区| 亚洲欧美日韩高清专用| 日韩精品中文字幕看吧| 国产欧美日韩精品亚洲av| 啦啦啦啦在线视频资源| 日本黄大片高清| 亚洲最大成人av| 日本三级黄在线观看| 色哟哟哟哟哟哟| 一个人免费在线观看电影| av在线老鸭窝| av中文乱码字幕在线| 亚洲五月天丁香| 联通29元200g的流量卡| 亚洲精品成人久久久久久| 亚洲最大成人手机在线| 日韩国内少妇激情av| 亚洲自偷自拍三级| 欧洲精品卡2卡3卡4卡5卡区| 亚洲真实伦在线观看| 日韩成人av中文字幕在线观看 | 赤兔流量卡办理| 午夜精品国产一区二区电影 | 99久久九九国产精品国产免费| 日韩av不卡免费在线播放| 五月玫瑰六月丁香| 性插视频无遮挡在线免费观看| 亚洲一区高清亚洲精品| 午夜视频国产福利| 免费观看在线日韩| 国产精品久久久久久精品电影| 99久久无色码亚洲精品果冻| 国产欧美日韩一区二区精品| 乱码一卡2卡4卡精品| h日本视频在线播放| 亚洲精品成人久久久久久| 亚洲国产欧美人成| 成人av在线播放网站| 少妇的逼水好多| 久久99热这里只有精品18| 三级毛片av免费| 黄色日韩在线| 日本爱情动作片www.在线观看 | 99在线人妻在线中文字幕| 精品日产1卡2卡| 免费在线观看影片大全网站| 一边摸一边抽搐一进一小说| 99久久九九国产精品国产免费| 国产一区二区激情短视频| 精品久久久久久成人av| 2021天堂中文幕一二区在线观| 亚洲精品国产av成人精品 | 插阴视频在线观看视频| 久久久久国产精品人妻aⅴ院| 精品久久久久久久久av| 国产综合懂色| 男女下面进入的视频免费午夜| 国产成人aa在线观看| 国产精品1区2区在线观看.| 激情 狠狠 欧美| 国产aⅴ精品一区二区三区波| 亚洲真实伦在线观看| 国内精品宾馆在线| 大香蕉久久网| 精品乱码久久久久久99久播| 国产精品一区www在线观看| 欧美高清性xxxxhd video| 久久久久国产精品人妻aⅴ院| 村上凉子中文字幕在线| 丰满乱子伦码专区| 亚洲欧美清纯卡通| 国内精品久久久久精免费| 99视频精品全部免费 在线| 精品人妻视频免费看| 噜噜噜噜噜久久久久久91| 成人无遮挡网站| 最新在线观看一区二区三区| 99久久成人亚洲精品观看| 亚洲欧美日韩东京热| 午夜福利18| 淫秽高清视频在线观看| 国产真实乱freesex| 久久久久精品国产欧美久久久| 国产精品乱码一区二三区的特点| 精品人妻偷拍中文字幕| 久久中文看片网| 夜夜爽天天搞| 欧美另类亚洲清纯唯美| 久久久久国产网址| 日韩欧美一区二区三区在线观看| 久久99热6这里只有精品| 国产一级毛片七仙女欲春2| 超碰av人人做人人爽久久| 色尼玛亚洲综合影院| 亚洲av中文av极速乱| 欧美成人一区二区免费高清观看| 联通29元200g的流量卡| 国产不卡一卡二| 99在线视频只有这里精品首页| 亚洲欧美日韩东京热| 亚洲熟妇熟女久久| 亚洲在线自拍视频| 久久精品夜夜夜夜夜久久蜜豆| 国产欧美日韩一区二区精品| 成人亚洲欧美一区二区av| 露出奶头的视频| av黄色大香蕉| 一a级毛片在线观看| 欧美色视频一区免费| 免费看光身美女| 亚洲内射少妇av| 高清毛片免费看| 午夜影院日韩av| 在现免费观看毛片| 免费av不卡在线播放| 国产精品女同一区二区软件| 欧美zozozo另类| 国产激情偷乱视频一区二区| 免费不卡的大黄色大毛片视频在线观看 | 日本 av在线| 国产高清不卡午夜福利| 一级a爱片免费观看的视频| 最近视频中文字幕2019在线8| 日本黄色片子视频| av在线亚洲专区| 婷婷色综合大香蕉| 六月丁香七月| 中文字幕久久专区| 日韩精品青青久久久久久| 免费大片18禁| 中出人妻视频一区二区| 黄色日韩在线| 国产亚洲91精品色在线| 简卡轻食公司| 欧美+日韩+精品| www.色视频.com| 日韩亚洲欧美综合| 欧美日韩国产亚洲二区| 亚洲综合色惰| 熟女人妻精品中文字幕| 日韩,欧美,国产一区二区三区 | 亚洲精品乱码久久久v下载方式| 久久久久久九九精品二区国产| 久久九九热精品免费| 国产毛片a区久久久久| 超碰av人人做人人爽久久| 欧美高清成人免费视频www| 麻豆国产97在线/欧美| 亚洲在线观看片| 亚洲av.av天堂| 国产久久久一区二区三区| eeuss影院久久| 老司机午夜福利在线观看视频| av在线观看视频网站免费| 色综合站精品国产| 赤兔流量卡办理| 精品久久国产蜜桃| 少妇的逼水好多| 男女边吃奶边做爰视频| 看黄色毛片网站| 99在线人妻在线中文字幕| 国产成人a区在线观看| 国产精品久久久久久精品电影| 九九爱精品视频在线观看| av国产免费在线观看| 成人二区视频| 欧美日韩精品成人综合77777| 成人二区视频| 国产一区二区在线观看日韩| 欧洲精品卡2卡3卡4卡5卡区| 国产成人91sexporn| 99热这里只有精品一区| 久久精品国产自在天天线| 欧美成人精品欧美一级黄| 国产真实伦视频高清在线观看| 免费在线观看成人毛片| 嫩草影视91久久| 国产精品美女特级片免费视频播放器| 日韩一本色道免费dvd| 日韩 亚洲 欧美在线| 午夜福利高清视频| 久久精品夜色国产| 日本与韩国留学比较| aaaaa片日本免费| 亚洲av中文av极速乱| 在线免费观看不下载黄p国产| 日韩av不卡免费在线播放| 国产美女午夜福利| av天堂在线播放| 少妇熟女欧美另类| 国产三级在线视频| 蜜桃亚洲精品一区二区三区| 精品久久久久久久久亚洲| 晚上一个人看的免费电影| 美女大奶头视频| 女人被狂操c到高潮| 国产 一区精品| 国产69精品久久久久777片| 国产av在哪里看| 日本黄色片子视频| 欧美bdsm另类| 色尼玛亚洲综合影院| 日韩制服骚丝袜av| 99热这里只有是精品50| 女生性感内裤真人,穿戴方法视频| a级一级毛片免费在线观看| 亚洲精品粉嫩美女一区| 亚洲欧美成人精品一区二区| 嫩草影院新地址| 两性午夜刺激爽爽歪歪视频在线观看| 一区二区三区四区激情视频 | 国产高清激情床上av| 欧美成人精品欧美一级黄| 看非洲黑人一级黄片| 成人亚洲精品av一区二区| 少妇丰满av| 亚洲国产精品久久男人天堂| 免费不卡的大黄色大毛片视频在线观看 | 国产精品福利在线免费观看| 如何舔出高潮| 国产蜜桃级精品一区二区三区| 日韩欧美国产在线观看| АⅤ资源中文在线天堂| 在线国产一区二区在线| 国产一区二区三区在线臀色熟女| 一个人看视频在线观看www免费| 一区二区三区四区激情视频 | 99热网站在线观看| 观看免费一级毛片| 国产成人福利小说| 免费av观看视频| 黄色视频,在线免费观看| 中文资源天堂在线| 日韩av在线大香蕉| 全区人妻精品视频| 亚洲国产色片| 午夜影院日韩av| 欧美成人免费av一区二区三区| 黄片wwwwww| 九九爱精品视频在线观看| 99热网站在线观看| 欧美潮喷喷水| 偷拍熟女少妇极品色| 一个人看视频在线观看www免费| 欧美zozozo另类| 在线a可以看的网站| 一本久久中文字幕| 久久热精品热| 国产单亲对白刺激| 免费av毛片视频| av在线老鸭窝| 亚洲精品国产成人久久av| 国产伦一二天堂av在线观看| 卡戴珊不雅视频在线播放| 亚洲精品一卡2卡三卡4卡5卡| 最近手机中文字幕大全| 男女啪啪激烈高潮av片| 99久国产av精品| 国产伦精品一区二区三区视频9| av黄色大香蕉| 女生性感内裤真人,穿戴方法视频| 亚洲欧美成人精品一区二区| 日韩av在线大香蕉| 国产一级毛片七仙女欲春2| 日韩 亚洲 欧美在线| 午夜福利18| 九九爱精品视频在线观看| 国产精品国产三级国产av玫瑰| 欧美潮喷喷水| 男女之事视频高清在线观看| 欧美最新免费一区二区三区| 久久久色成人| 2021天堂中文幕一二区在线观| 校园春色视频在线观看| 国产高清视频在线观看网站| 18+在线观看网站| 一区二区三区四区激情视频 | 深夜精品福利| 日韩欧美在线乱码| 欧美激情在线99| 高清午夜精品一区二区三区 | 亚洲成av人片在线播放无| 一个人免费在线观看电影| av天堂中文字幕网| 国产人妻一区二区三区在| 午夜影院日韩av| 高清毛片免费看| 国产男人的电影天堂91| 久久久久久伊人网av| 精品人妻熟女av久视频| 搡老岳熟女国产| 国产在视频线在精品| 日本精品一区二区三区蜜桃| 亚洲欧美成人精品一区二区| av卡一久久| 麻豆久久精品国产亚洲av| 免费在线观看成人毛片| 搡女人真爽免费视频火全软件 | 久久99热这里只有精品18| 午夜精品一区二区三区免费看| 我要看日韩黄色一级片| av福利片在线观看| 亚洲人与动物交配视频| 国产 一区精品| 日本三级黄在线观看| 天堂√8在线中文| 亚洲,欧美,日韩| 日韩欧美精品免费久久| 久久热精品热| 精品久久久久久成人av| 亚洲内射少妇av| 欧美绝顶高潮抽搐喷水| 99久久精品国产国产毛片| 亚洲精品在线观看二区| 九九爱精品视频在线观看| 久久精品影院6| 伦精品一区二区三区| 午夜老司机福利剧场| 国产乱人视频| 精品日产1卡2卡| 五月玫瑰六月丁香| 内射极品少妇av片p| 性色avwww在线观看| 此物有八面人人有两片| 亚洲图色成人| 欧美性猛交黑人性爽| 伦理电影大哥的女人| 久久九九热精品免费| 久久人人精品亚洲av| 午夜久久久久精精品| 日韩强制内射视频| 三级男女做爰猛烈吃奶摸视频| 午夜爱爱视频在线播放| 在线观看一区二区三区| 精品国内亚洲2022精品成人| 国产高清有码在线观看视频| 两个人的视频大全免费| 国产精品久久久久久久久免| 国产亚洲91精品色在线| 成人高潮视频无遮挡免费网站| 日本欧美国产在线视频| 亚洲欧美日韩无卡精品| 十八禁国产超污无遮挡网站| 一级毛片久久久久久久久女| 亚洲电影在线观看av| 麻豆乱淫一区二区| 色综合亚洲欧美另类图片| 看黄色毛片网站| 国产精品久久视频播放| 又粗又爽又猛毛片免费看| 成年av动漫网址| 国产精品三级大全| 国语自产精品视频在线第100页| 乱系列少妇在线播放| www日本黄色视频网| 亚洲av成人精品一区久久| 国国产精品蜜臀av免费| 中文资源天堂在线| 最近中文字幕高清免费大全6| 联通29元200g的流量卡| 变态另类成人亚洲欧美熟女| 狠狠狠狠99中文字幕| 日本熟妇午夜| 国产精品久久久久久av不卡| 国产精品1区2区在线观看.| 久久午夜福利片| 精品不卡国产一区二区三区| 国模一区二区三区四区视频| 全区人妻精品视频| videossex国产| 亚洲国产高清在线一区二区三| 亚洲精品国产av成人精品 | 欧美日韩乱码在线| 黄色一级大片看看| 嫩草影院入口| 女同久久另类99精品国产91| 久久久久九九精品影院| 国产亚洲精品久久久久久毛片| 国产精品久久久久久av不卡| 一级黄色大片毛片| 午夜福利视频1000在线观看| 久久精品91蜜桃| 最近在线观看免费完整版| 国产精品综合久久久久久久免费| av女优亚洲男人天堂| 男人舔奶头视频| 成人鲁丝片一二三区免费| 少妇人妻一区二区三区视频| 99热这里只有精品一区| 91麻豆精品激情在线观看国产| 人妻丰满熟妇av一区二区三区| 日韩强制内射视频| 伊人久久精品亚洲午夜| av女优亚洲男人天堂| 日本 av在线| 亚洲成av人片在线播放无| 免费观看的影片在线观看| 亚洲精品日韩av片在线观看| 中文字幕久久专区| 亚洲精品影视一区二区三区av| 蜜臀久久99精品久久宅男| 99热这里只有是精品50| 69av精品久久久久久| 亚洲精品亚洲一区二区| 久久久a久久爽久久v久久| 搡老妇女老女人老熟妇| 精品人妻偷拍中文字幕| 一本精品99久久精品77| 日韩成人av中文字幕在线观看 | 精品日产1卡2卡| 丰满乱子伦码专区| 在线天堂最新版资源| 欧美成人免费av一区二区三区| 久久久久久久午夜电影| 你懂的网址亚洲精品在线观看 | 夜夜夜夜夜久久久久| 欧美精品国产亚洲| 人人妻人人澡人人爽人人夜夜 | 欧美又色又爽又黄视频| 99热这里只有是精品50| 99久久无色码亚洲精品果冻| av在线观看视频网站免费| 啦啦啦观看免费观看视频高清| av卡一久久| 国产午夜精品久久久久久一区二区三区 | 成人特级黄色片久久久久久久| 精品午夜福利视频在线观看一区| 亚洲无线在线观看| 亚洲欧美精品自产自拍| 午夜精品国产一区二区电影 | 男插女下体视频免费在线播放| 美女免费视频网站| 久久久欧美国产精品| 男人和女人高潮做爰伦理| 五月伊人婷婷丁香| 97超碰精品成人国产| 久久久色成人| 丰满的人妻完整版| 内射极品少妇av片p| 午夜激情欧美在线|