Research Article

Service-Based Hybrid Access Control Technology with Priority Level for the Internet of Vehicles under the Cloud Architecture

Table 1

Summary of related work.

RefsProsCons

[2, 1719]Various efficient authentication mechanismsSingle, undiversified authentication result

[2023]Enhance the dynamic nature of RBAC, security, as far as possible to weaken the role of permissions encapsulation generated by the role of granularity issuesThere is always the problem of static role permissions. The overall permission system cannot affect role permissions

[2432]The ABAC attribute mechanism is used to improve the granularity and the orderliness of permissions. To enhance ABAC security by adding unique attribute valuesABAC makes the overall model more difficult to manage as the number of attributes increases. Second, the large number of permission units generated by many attributes is difficult to track

[3338]Use the characteristics of RBAC privilege encapsulation to manage many attributes in ABAC, thus reconciling the disadvantages of eachMany unordered attribute aggregation units can make the mixed access control model create the problem of role explosion. But, too little attribute aggregation units can create the problem of insufficient granularity of permissions in RBAC

[3941]Enhance the dynamics of various access control mechanisms using priority mechanisms.Lack of effective use of prioritization mechanisms in the access control model