Distributed Processing System, 2022, 3(3); doi: 10.38007/DPS.2022.030309.
Kishita Naoko
Univ Rennes, INRIA, CNRS, IRISA, Rennes, France
AC is to control and manage the access rights of legitimate users who enter the system on the basis of user identity authentication, so that the user's access rights are limited within the allowable range. It is an important part of information security technology. Implementing AC to users through technical means plays an important role in information security. The main purpose of this paper is to use fuzzy mathematics (FMs) and probability theory (PT) to study the access control (AC) of distributed systems (DS). This paper adds trust elements on the basis of the AC model, sets roles for each trust level, and sets a series of permissions for each role. The user determines the trust level to which he belongs by being judged by other users, and then obtains the corresponding authority through the role corresponding to the trust level. Experiments show that by evaluating the trust degree and the reputation value of user behavior, the ability of user trust degree and service and access behavior is greatly improved. Compared with the existing trust evaluation algorithm, it has a good correlation. At the same time, it satisfies the rule of "slow increase and sudden decrease" of the target change trust degree, which can effectively resist malicious users' phishing attacks, bleaching attacks, collusion attacks and other security attacks, and has higher security.
Fuzzy Mathematics, Probability Theory, Distributed Systems, Access Control
Kishita Naoko. Distributed System Access Control for Fuzzy Mathematics and Probability Theory. Distributed Processing System (2022), Vol. 3, Issue 3: 72-81. https://doi.org/10.38007/DPS.2022.030309.
[1] Khalil O. Pointwise equidistribution and translates of measures on homogeneous spaces. Ergodic Theory and Dynamical Systems, 2020, 40(2):453-477.
[2] Park J, Yoon C. Distributed Medium AC Method through Inductive Reasoning. International Journal of Fuzzy Logic and Intelligent Systems, 2021, 21(2):145-151.
[3] Hafeez Y, Ali S, Jhanjhi N, et al. Role of Fuzzy Approach towards Fault Detection for Distributed Components. Computers, Materials and Continua, 2021, 67(2):1979–1996.
[4] Khan M, Zeeshan M, Song S Z, et al. Types of Complex Fuzzy Relations with Applications in Future Commission Market. Journal of Mathematics, 2021, 2021(4):1-14.
[5] Homaei M H, Soleimani F, Shamshirband S, et al. An Enhanced Distributed Congestion Control Method for Classical 6LowPAN Protocols Using Fuzzy Decision System. IEEE Access, 2020, 8(99):20628-20645.
[6] Kirk N W, Declerck M, Kemp R J, et al. Language control in regional dialect speakers – monolingual by name, bilingual by nature?. Bilingualism: Language and Cognition, 2021, 25(3):511-520.
[7] Wilson S, Glotfelter P, Wang L, et al. The Robotarium: Globally Impactful Opportunities, Challenges, and Lessons Learned in Remote-Access, Distributed Control of Multirobot Systems. IEEE Control Systems Magazine, 2020, 40(1):26-44.
[8] Rezaei A, Smarandache F, Mirvakili S. Applications of (Neutro/Anti)sophications to Semihypergroups. Journal of Mathematics, 2021, 2021(6649349):1-7.
[9] Durairaj M, Asha J. Fuzzy probability based person recognition in smart environments. Journal of Intelligent and Fuzzy Systems, 2021, 40(5):1-16.
[10] Shahrouz S, Salehkaleybar S, Hashemi M. gIM: GPU Accelerated RIS-based Influence Maximization Algorithm. IEEE Transactions on Parallel and DSs, 2021, PP(99):1-1.
[11] Abughazalah N, Yaqoob N, Shahzadi K. Topological Structures of Lower and Upper Rough Subsets in a Hyperring. Journal of Mathematics, 2021, 2021(4):1-6.
[12] Nandanwar A, Nair R R, Behera L. Fuzzy inferencing-based path planning with a cyber-physical framework and adaptive second-order SMC for routing and mobility control in a robotic network. IET Cyber-Systems and Robotics, 2020, 2(3):149-160.
[13] Kim C, Kim W. Coordinated Fuzzy-Based Low-Voltage Ride-Through Control for PMSG Wind Turbines and Energy Storage Systems. IEEE Access, 2020, PP(99):1-1.
[14] Srivastava E. NdRAdAC: Need based AC Framework for an Emergency Response System. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021, 12(5):1414-1428.
[15] Sharma E. A Framework Of Big Data As Service Platform For AC & Privacy Protection Using Blockchain Network. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 2021, 12(11):476-485.
[16] Gaino R, Covacic M R, Cardim R, et al. Discrete Takagi-Sugeno Fuzzy Models Applied to Control the Knee Joint Movement of Paraplegic Patients. IEEE Access, 2020, PP(99):1-1.
[17] Dichev K, Sensi D D, Nikolopoulos D S, et al. Power LognRoll: Power-Efficient Localized Rollback for MPI Applications Using Message Logging Protocols. IEEE Transactions on Parallel and DSs, 2021, PP(99):1-1.
[18] Kozhaya D, Decouchant J, Rahli V, et al. PISTIS: An Event-Triggered Real-time Byzantine Resilient Protocol Suite. IEEE Transactions on Parallel and DSs, 2021, PP(99):1-1.