Next Article in Journal
A Grip Strength Estimation Method Using a Novel Flexible Sensor under Different Wrist Angles
Next Article in Special Issue
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing
Previous Article in Journal
A New Setup for the Measurement of Total Organic Carbon in Ultrapure Water Systems
Previous Article in Special Issue
HSAS-MD Analyzer: A Hybrid Security Analysis System Using Model-Checking Technique and Deep Learning for Malware Detection in IoT Apps
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model

by
Hany F. Atlam
1,2,*,
Muhammad Ajmal Azad
1 and
Nawfal F. Fadhel
3
1
School of Computing and Engineering, University of Derby, Derby DE22 1GB, UK
2
Computer Science Engineering Department, Faculty of Electronic Engineering, Menoufia University, Menouf 32952, Egypt
3
Electronic and Computer Science Department, University of Southampton, Southampton SO17 1BJ, UK
*
Author to whom correspondence should be addressed.
Sensors 2022, 22(5), 2005; https://doi.org/10.3390/s22052005
Submission received: 24 January 2022 / Revised: 1 March 2022 / Accepted: 2 March 2022 / Published: 4 March 2022
(This article belongs to the Special Issue Security and Privacy in Internet of Things (IoT))

Abstract

:
Providing a dynamic access control model that uses real-time features to make access decisions for IoT applications is one of the research gaps that many researchers are trying to tackle. This is because existing access control models are built using static and predefined policies that always give the same result in different situations and cannot adapt to changing and unpredicted situations. One of the dynamic models that utilize real-time and contextual features to make access decisions is the risk-based access control model. This model performs a risk analysis on each access request to permit or deny access dynamically based on the estimated risk value. However, the major issue associated with building this model is providing a dynamic, reliable, and accurate risk estimation technique, especially when there is no available dataset to describe risk likelihood and impact. Therefore, this paper proposes a Neuro-Fuzzy System (NFS) model to estimate the security risk value associated with each access request. The proposed NFS model was trained using three learning algorithms: Levenberg–Marquardt (LM), Conjugate Gradient with Fletcher–Reeves (CGF), and Scaled Conjugate Gradient (SCG). The results demonstrated that the LM algorithm is the optimal learning algorithm to implement the NFS model for risk estimation. The results also demonstrated that the proposed NFS model provides a short and efficient processing time, which can provide timeliness risk estimation technique for various IoT applications. The proposed NFS model was evaluated against access control scenarios of a children’s hospital, and the results demonstrated that the proposed model can be applied to provide dynamic and contextual-aware access decisions based on real-time features.

1. Introduction

Traditional access control models, while successful in solving various problems in some situations, are designed to offer a link between information associated with an access control rule logic and a resource to which access is requested. The implementation of an access control model can be manipulated in a variety of ways, ranging from an unforeseen situation involving poorly designed access policies to malicious entities gaining access to a group of existing accounts. As a result, traditional access control models, which are based on static and predefined policies, cannot manage unanticipated scenarios and situations [1]. As a result, they are incompatible with a dynamic and distributed system like the IoT. Instead, the IoT system requires a dynamic access control model. Dynamic access control models are based on the idea that they use not only access policies, but also dynamic and contextual features that are estimated at the time of the access request to make access decisions [2]. This provides more flexibility and can adapt to varying situations and conditions while making access decisions.
Dynamic access control techniques, as opposed to static policies, make access decisions based on real-time and contextual features. Trust, risk, context, history, and operational needs are examples of real-time features [3,4]. A risk-based access control model is one of the dynamic models that perform a risk analysis on each access request to permit or deny access requests dynamically [5,6].
The risk estimation process is an important stage for implementing a risk-based access control model. This process is based on calculating the likelihood of data leakage and the value of that data. The primary goal of the risk estimation process is to devise a method for ranking risks in order of priority and using risk numeric values to make access decisions in a given situation [7,8,9]. Several researchers used various risk assessment and management strategies; however, the majority of these methods relied on qualitative indicators. Risk estimation without enough data to define its likelihood and impact is like predicting the future; therefore, quantifying security risk, particularly in the context of access control, is extremely difficult.
The fuzzy logic system was one of the risk estimation techniques offered in the literature to overcome the lack of datasets for estimating the security risk value associated with access requests. As a result, the authors put the fuzzy logic system into action, and the findings showed that it generates correct and realistic risk values for access control operation, as presented in [9]. The fuzzy logic system, on the other hand, has several drawbacks. The scalability of the fuzzy logic system seems to be questionable because estimating the security risks of access control activities takes a long time. The fuzzy logic system also cannot learn or adapt to new environments, which will be a huge challenge for a dynamic and distributed system like the IoT. Therefore, this paper proposes the Neuro-Fuzzy System (NFS) model to resolve issues associated with the fuzzy logic system.
This paper proposes a novel NFS model to build the risk estimation process in the risk-based access control model for the IoT system. The proposed NFS model has been implemented to evaluate security risk values associated with each access request. The results demonstrated that the NFS model provides an efficient and accurate risk estimation technique that can adapt to the changing conditions in the IoT environment. The proposed NFS model was evaluated against access control scenarios of a children’s hospital. Using the contextual and real-time features involving time and location, the results demonstrated that the proposed NFS model can be applied to provide dynamic and contextual-aware access decisions.
The contribution of this paper can be summarized as follows:
  • Proposing the NFS model to overcome flexibility and scalability issues associated with the fuzzy logic system for the risk estimation in the risk-based access control model;
  • Identifying and implementing the most effective learning algorithm for the NFS model by comparing three different learning algorithms;
  • Evaluating the accuracy and applicability of the proposed NFS model through providing access control scenarios of a children’s hospital.
The remainder of this paper is organized as follows: Section 2 presents related work, Section 3 provides an overview of the NFS technique, Section 4 presents the risk-based access control model, Section 5 presents the implementation of the proposed NFS model, Section 6 presents experimental results, Section 7 presents the evaluation of results, and Section 8 is the conclusion.

2. Related Work

Risk-based access control models are used primarily to provide the required flexibility to the access control process. Several researchers discussed creating a risk-based access control model to overcome flexibility and the inability to handle unpredicted situations. McGraw [10] introduced the Risk-Adaptable Access Control (RAdAC) model, which is based on assessing security risks and operational needs for granting or denying access. This model is used to calculate the risk associated with an access request and then compare that risk to the access control policy. The system then verifies the operational needs. If the corresponding operational needs and policy are met, access is granted. However, this model does not provide details about how to estimate risk and operational needs quantitatively. Furthermore, Khambhammettu et al. [11] developed a risk-based model based on object sensitivity, subject trustworthiness, and the difference between them. However, the model does not include how to estimate the risk quantitatively. Furthermore, this model requires a system administrator with broad experience to provide a reasonable value for each input in the early stage of the risk assessment process.
Chen et al. [12] presented a dynamic risk-based access control model for Cloud Computing. It combines the attribute-based access control model with the risk–trust assessment method. The model drives a threshold risk value from historical records to determine the access decision. However, this model lacked contextual features and the ability to learn and adapt to unpredicted situations. Furthermore, Choi et al. [13] presented a framework for a context-sensitive risk-based model for medical information systems. This framework categorizes information to calculate the risk value and apply the risk through treatment-based permission profiling and specifications. This framework provides the access decision based on the severity of the context and treatment. However, this model does not include how to estimate the risk quantitatively. Furthermore, the model is limited to medical information systems.
The essential step to developing a risk-based access control model is the risk estimation process, which assesses the risk value associated with each access request. This calculated risk value is then utilized to decide on whether to grant or deny access. It is difficult to assign a quantitative or numeric value to risk without a dataset to characterise its likelihood and impact. The fuzzy logic system was one of the risk estimation strategies provided by the literature to overcome the lack of datasets. For instance, Chen et al. [5] designed a fuzzy multi-level security model using the fuzzy logic system. The difference between the object and subject security levels is used to calculate risk. As a result, the risk value will be high if the difference is large. The output risk is expressed as a binary value of 0 (allow) or 1 (deny). The authors, on the other hand, did not explain how to calculate risk quantitatively or how fuzzy rules were created. The authors also failed to discuss the fuzzy logic system’s scalability, incapacity to learn, and time overhead concerns.
Ni et al. [14] used a fuzzy logic system to assess security risks. The risk value is calculated using subject and object security levels. However, the suggested approach faces numerous scaling issues, as estimating the security risk value takes a long time, especially with an increasing number of input parameters and fuzzy rules. The authors also did not discuss how fuzzy rules were created. In addition, Li et al. [15] developed a fuzzy modelling technique for determining the security risks of a healthcare information system. Using action severity, risk history, and data sensitivity, this model calculates the risk associated with each access request. The authors, on the other hand, did not provide any information on how to objectively evaluate risk values. Besides, it necessitates prior knowledge of diverse environmental scenarios to construct fuzzy rules. Furthermore, Diep et al. [16] presented a dynamic and flexible risk-based model by collecting useful information from the environment to make access decisions. The risk value was evaluated using outcomes of actions in terms of availability, confidentiality, and integrity. However, the model does not cover how values of outcomes of actions can be evaluated quantitatively.
Based on the recommendations of the literature review, the fuzzy logic system was implemented in [9] to resolve the unavailability of datasets and provide a quantitative and a numeric risk value for each access request to determine the access decision. Although the fuzzy logic system provides accurate and realistic risk values to implement the risk-based access control model, the major issue associated with it was the scalability and inability to learn. An access control model for the IoT system is intended to serve hundreds or thousands of users. Based on the experimental results discussed in [9], the risk estimation using the fuzzy logic system requires 57.38 s to estimate the security risks of 1000 access requests. This response time is efficient for a small network of devices, but with the IoT system, there are thousands of devices per network. This number of IoT devices is constantly increasing, which requires taking the scalability of the risk estimation technique into account and providing the required solution to resolve this issue. In addition, the risk estimation technique cannot learn or adapt to a new environment.
Therefore, the solution was to integrate an Artificial Neural Network (ANN) with the fuzzy logic system which creates NFS. NFS is an ANN technique, which is functionally equivalent to the fuzzy logic system. It combines the parallel computation and learning capabilities of an ANN with the human-like knowledge representation and explanation abilities of the fuzzy logic system. As a result, the ANN becomes more transparent, while the fuzzy logic system becomes capable of learning. In addition, the NFS can be trained to develop IF-THEN fuzzy rules and determine membership functions (MFs) for input and output variables of the system [17,18].
Among all methods of integrating fuzzy systems and ANNs, a hybrid NFS has the most potential. This is because it makes the best use of the advantages of fuzzy systems and ANNs. Hybrid systems have the property of constantly being treated as systems of fuzzy rules with ANNs used to tune MFs in preconditions and conclusions of rules based on the set of learning. A NFS has been utilized to estimate risk in various domains. For example, Kristjanpoller and Michell [19] utilized it for combining external factors to estimate the risk of a stock market in the Latin American region and improve the forecast accuracy. Conversely, Beinarovica et al. [20] used the NFS model in transportation control to improve safety by evaluating the risk of accidents using intelligent infrastructure devices. The model was used to simulate various scenarios, analyse risks, and recommend possible infrastructure or vehicle changes to reduce the probability of future disasters. Furthermore, Shahzadi et al. [21] adopted the NFS model to reduce security risks in cloud computing by identifying various risks associated with cloud computing. Furthermore, Kaur et al. [22] utilized the NFS model to improve authentication in mobile devices. The authors used the NFS model to build an implicit authentication system based on behavioural data collected for 12 weeks from different android users. Table 1 shows the summary of related work.
One of the major issues to develop an efficient and effective risk-based access control model is to create an accurate and reliable risk estimation technique that can resolve issues associated with existing techniques in terms of scalability and inability to learn. This paper utilizes the NFS model to add the learning capability to the risk estimation technique to build a dynamic and efficient risk-based access control model for IoT applications. To the best of the authors’ knowledge, no research exists that utilizes the NFS model in risk-based access control models. Therefore, this paper provides a novel NFS model to implement the risk estimation technique of the risk-based access control model.

3. An Overview of NFS

NFS is the result of integrating an ANN with the fuzzy logic system. It integrates the human-like reasoning of fuzzy logic systems with the learning and connectionist of the ANN [23]. The NFS provides powerful and flexible universal approximations with the capability to recognize interpretable IF-THEN rules [24]. The NFS is simply a fuzzy logic system that is trained by a learning algorithm derived from the ANN theory. One of the most important advantages of the ANN is the capability to learn from examples; however, it is hard to prove that the ANN is working as expected. In addition, it is like a “black box” to the user, in which the method for obtaining the output is not revealed [25]. On the other hand, the fuzzy logic system is easy to build and understand by using linguistic expressions to resolve imprecise information [25,26]. However, it is not easy to guarantee that a fuzzy logic system with several complex rules will provide an appropriate degree of meaningfulness. Furthermore, the fuzzy logic system uses static fuzzy rules that lack the adaptability to resolve unpredicted changes in the environment [26].
The integration of the ANN with the fuzzy logic system resolved some of these issues. The resultant NFS combines parallel computation and learning abilities of the ANN with the human reasoning of fuzzy systems and clarity of systems representation. Therefore, the ANN becomes more transparent, and the fuzzy logic system becomes capable of learning [27]. The integration of the ANN with the fuzzy logic system can be done in three ways: cooperative, concurrent, and hybrid. Cooperative NFS is used to describe the integration of the ANN with the fuzzy logic system, in which the ANN is used to tune the fuzzy logic system without changing its functionality [28]. Conversely, concurrent NFS refers to the system where the ANN and the fuzzy logic system work together, in which the inputs entered into the fuzzy logic system are pre-processed, and then the ANN processes the outputs of the concurrent system or in a reverse way [29]. In the hybrid NFS, both fuzzy logic and ANN models are used independently, in which each model is used to perform a certain task in the system to reach a common target [30]. The concept of the hybrid NFS refers to the explanation of the fuzzy logic system with respect to the ANN. Hence, fuzzy sets can be interpreted as weights, and fuzzy rules, input, and output variables can be interpreted as neurons [29].

4. Risk-Based Access Control Model

Unauthorized information disclosure is one of the critical challenges in the IoT system that need to be addressed. Current traditional access control models cannot resolve this challenge, since these models are built using static and predefined policies that always give the same result in different situations [15,31]. Therefore, they are not flexible to resolve the varying behaviour of users, especially in a dynamic environment like the IoT. On the other hand, dynamic access control approaches provide an efficient solution for dynamic environments, like IoT, as they utilize not only access policies but also real-time and contextual features to make access decisions.
The risk-based access control model is one of the dynamic models that use the security risk value associated with each access request as a criterion to determine the access decision. It performs a risk analysis to estimate the security risk value for each access request, and then it uses the estimated risk value to decide to either grant or deny access [4,6].
A dynamic risk-based access control model for the IoT was proposed by the authors and discussed in [8,9,32]. The proposed model has four inputs: user/agent context, resource sensitivity, action severity, and risk history, as shown in Figure 1. These inputs/risk factors are used to estimate the security risk value associated with the access request. Then, the estimated risk value is compared against risk policies to specify the access decision. The eventual goal of the proposed risk-based model is to create a system that encourages information sharing to maximize organization benefits while keeping users responsible for their actions.

5. Implementation of the Proposed NFS Model

The hybrid NFS was utilized to implement the risk estimation technique of the risk-based access control model. Implementing the hybrid NFS was performed in two separate stages. The fuzzy logic system was first implemented, then the ANN was used to train it. Figure 2 shows the structure of the proposed NFS model. The input involved risk factors: user context, resource sensitivity, action severity, and risk history. Then, the fuzzy logic system was implemented based on the input of IoT security experts [9] to provide a numeric risk value for each input combination. The output of the fuzzy logic system with input was used to build a dataset to train the neural network and select the most appropriate learning algorithm that provided the optimal performance for the risk estimation process. This yielded an accurate output risk value that was used to decide whether to grant or deny access for each access request promptly.
The proposed hybrid NFS model was built by implementing the fuzzy logic system and neural network in two separate phases. In the first phase, the fuzzy logic system was implemented to utilize the effectiveness of converting linguistic expressions into quantitative values, which could be used to produce numeric risk values to make access decisions. The implementation of the fuzzy logic system was discussed in detail in [9]; therefore, we will only summarize it in this paper briefly to show how the entire NFS model was implemented.
To implement a Mamdani Fuzzy Inference System (FIS), there are five main stages, which include fuzzification, MFs, fuzzy rules, rule aggregation, and defuzzification. To determine the required parameters to implement the fuzzy logic system of the risk estimation technique, 20 IoT security experts from inside and outside the UK were interviewed, as discussed in [9].
The first stage was used to convert the input and output variables of the system into linguistic expressions (fuzzy sets), which is called fuzzification. Three fuzzy sets were used to represent each risk factor and five fuzzy sets to represent the output risk. The user context, action severity, and risk history were represented by “Low”, “Moderate”, and “High” fuzzy sets. The resource sensitivity was represented by “Not Sensitive”, “Sensitive”, and “Highly Sensitive” fuzzy sets. Conversely, the output risk was represented by using five fuzzy sets: “Negligible”, “Low”, “Moderate”, “High”, and “Unacceptable High” [9].
The second stage to implement a Mamdani FIS was to specify the MF that represented the relationship between the input risk factors and output risk. A Triangular MF was selected as the appropriate MF to provide a proper representation of the expert knowledge and facilitate the calculation process. The third stage was fuzzy rules, which are the knowledge base that is used by the fuzzy model to generate the output. Fuzzy rules are used to define the relationship between the output risk and input risk factors. It builds input combinations with the corresponding output in the form of IF-THEN statements. As there is no available dataset, there is no way to ensure correct and precise fuzzy rules. Hence, IoT security experts were used to build fuzzy rules based on their knowledge and experience [9]. Since the risk-based model has four inputs/risk factors, each input has three fuzzy sets, and the total number of fuzzy rules was 81 rules.
The fourth stage was rule aggregation, which combined the outputs of all fuzzy rules. The max (maximum) aggregation operator was used to combine output rules into one fuzzy set. The fifth and final stage was defuzzification. The output risk of the fuzzy model should be back to be a crisp value. The centroid method was selected to defuzzifize the output. The MATLAB fuzzy logic toolbox was utilized to implement the fuzzy logic system of the risk estimation technique, as shown in Figure 3.
After the fuzzy logic system was implemented, a dataset consisting of 160,000 records was created. Each record contained values of the four risk factors (user context, resource sensitivity, action severity, and risk history) and the output risk value.
The second phase to implement the proposed NFS model was the neural network. A Multi-Layer Perceptron (MLP) model was utilized to implement the neural network. A MLP is a feed-forward neural network that is used to explore complex and nonlinear models. It is based on a supervised learning technique that needs the desired output for each input to be known to calculate the error [33]. The MLP model consists of three layers: the input layer, hidden layer, and output layer, as shown in Figure 4.
The input layer represents the risk factors: user context, resource sensitivity, action severity, and risk history. The output layer represents the output risk value resulting from the risk estimation process. Conversely, the middle layer is the hidden layer that is responsible for carrying out computations and updating weights between different connections. One of the challenges associated with implementing the NFS model was determining the appropriate number of hidden layers and the appropriate number of neurons for each hidden layer. The number of hidden layers needed depends on the complexity of the relationship between the input and the target parameters. It represents a major impact on the learning process. However, a Feed-Forward Back Propagation (FFBP) network encompassing more than one hidden layer is very rare [33]. Hornik, Stinchcombe, and White [34] have proved that an FFBP network with one hidden layer is enough for most problems in various applications. Therefore, one hidden layer was used.
In addition, determining the optimal number of neurons in the hidden layer plays a significant role in the implementation of the NFS model. If an insufficient number of neurons are used, the model will be unable to model complicated data, and the resulting fit will be poor. Conversely, using a large number of neurons in the hidden layer affects its performance on new data, and its ability to provide a generalized model will be compromised [35]. Indeed, increasing the number of neurons ensures correct training, but it also affects performance. Therefore, a compromise needs to be reached between too many and too few neurons in the hidden layer.
In the next section, training the NFS model using various learning algorithms will be discussed to determine the appropriate learning algorithm as well as the appropriate number of neurons in the hidden layer that provides the best performance.

6. Experimental Results

Several experiments were carried out to train the proposed NFS model of the risk estimation technique to increase the accuracy of the output risk. Furthermore, several experiments were performed to determine the number of neurons in the hidden layer with various learning algorithms. All training and experiments were coded and executed using the MATLAB software. All experiments and measurements were coded using MATLAB on Intel(R) Core (TM) i7-2600, 3.40 GHz CPU, with 16 GB RAM, running Windows 10.

6.1. Data Collection

Implementing the NFS model of the proposed risk estimation technique requires a dataset or examples for training. After implementing the fuzzy logic system, a dataset consisting of 160,000 records was created. To avoid possible bias in the sample data to the NFS, the dataset was randomized and divided into three sets using the cross-validation method.
  • Training set: This set contained 96,000 records (60% of the dataset) to train the NFS model.
  • Testing set: This set contained 32,000 records (20% of the dataset) to test the NFS model.
  • Validation set: This set contained 32,000 records (20% of the dataset) to validate the NFS model.

6.2. Performance Evaluation

Commonly used performance evaluation metrics in forecasting problems were utilized to compare and evaluate the accuracy of the NFS model [36]. The NFS model was trained, and the performance was observed using the MSE (Mean Square Error), RMSE (Root Mean Squared Error), and R (Correlation Coefficient). The number of neurons in the hidden layer with the lowest MSE and RMSE and the highest R was selected to implement the NFS model of the risk estimation technique.
RMSE = 1 n i = 1 n ( O i P i ) 2
MSE = 1 n i = 1 n ( O i P i ) 2
R = n i = 1 n O i P i i = 1 n O i i = 1 n P i ( n i = 1 n O i 2 ( i = 1 n O i ) 2 ) ( n i = 1 n P i 2 ( i = 1 n P i ) 2 )
where n is the total number of data, Oi is the observed value, and Pi is the predicted value.

6.3. Training the NFS Model

To reach network generalization and a good fit with all the data points, the proposed NFS model of the risk estimation technique was trained using three learning algorithms, Levenberg–Marquardt (trainlm), Conjugate Gradient with Fletcher–Reeves Resrarts (traincgf), and Scaled Conjugate Gradient (trainscg), to determine the optimal learning algorithm that guarantees network generalization with the minimum error (lowest RMSE and MSE) and the maximum fit (highest R).

6.3.1. Training the NFS with LM

The Levenberg–Marquardt (LM) algorithm is an iterative method that locates a local minimum of a multivariate function. It is expressed as the sum of squares of several non-linear and real-valued functions. The LM algorithm is widely adopted in various domains to deal with data-fitting applications. It has become a standard method for nonlinear least-squares problems. The LM algorithm can be considered as a combination of the steepest descent and the Gauss–Newton method and is one of the fastest learning algorithms [37].
The LM algorithm with one hidden layer was utilized to train the proposed NFS model of the risk estimation technique. Several experiments were carried out to determine the number of neurons that produce the lowest error and the best fit with the learning process. The NFS model was trained using the LM learning algorithm with increasing the number of neurons in the hidden layer from 100 to 1000, and MSE, RMSE, and R values were recorded, as shown in Table 2.
The results demonstrated that increasing the number of neurons in the hidden layer led to decreasing both MSE and RMSE values for training, testing, and validation data and increasing the value of R. The results demonstrated that the NFS model had the lowest MSE and RMSE error values for training, testing, and validation at 1000 neurons. Furthermore, the NFS model had the highest value of R, 0.9985, at 1000 neurons, which is an adequate correlation that indicates the NFS model was well trained and fitted with the learning process, as the value of R is very close to 1.
Since the best results in terms of MSE, RMSE, and R were obtained using 1000 neurons in the hidden layer, the proposed NFS model was implemented and trained using the LM learning algorithm with 1000 neurons in the hidden layer. The performance graph of the MSE values of training, testing, and validation data is shown in Figure 5. The results demonstrated that the NFS model was a good fit with the learning process, with a value of R of 0.999, which is very close to 1. In addition, no overfitting occurred, as training, validation, and testing data had the same behaviour. In addition, Figure 6 shows regression plots of the proposed NFS model with respect to targets for training, validation, and testing data. For a perfect fit, the data should fall along a 45-degree line, where the network outputs are equal to the targets. For the proposed NFS model of the risk estimation technique, the fit was reasonably good for all training, validation, and testing data with a value of R of 0.999, which is very close to the ideal case.

6.3.2. Training the NFS with CGF

A gradient-based learning algorithm is one of the most commonly used error minimization techniques. It is a gradient descent local optimization algorithm that includes the backward error correction of the network weights [38]. The conjugate gradient algorithm is one of the backpropagation techniques used to train multilayer ANN networks in a supervised way. It updates weight and bias values based on the conjugate gradient backpropagation with Fletcher–Reeves updates [39]. Therefore, it is called the Conjugate Gradient with Fletcher–Reeves (CGF) learning method. The conjugate gradient algorithms are usually much faster than the variable learning rate backpropagation. However, they require more storage than simple algorithms, so they are often a good choice for networks with a large number of weights [40].
The CGF learning algorithm with one hidden layer was utilized to train the proposed NFS model. Several experiments were carried out to determine the number of neurons that produced the lowest error and the best fit with the learning process. The NFS model was trained with increasing the number of neurons in the hidden layer from 50 to 1200, and the MSE, RMSE, and R values were recorded, as shown in Table 3.
The results of training the NFS model using the CGF learning algorithm showed unstable behaviour when increasing the number of neurons in the hidden layer. For example, the MSE value of the training dramatically decreased from 25.27 at 50 neurons to reach 21.04 at 100 neurons. This decrease continued to reach 20.59 at 200 neurons. Then, the MSE value of the training data increased dramatically to reach 26.75 at 300 neurons. Then, the MSE reached its lowest value at 400 neurons. Increasing the number of neurons in the hidden layer from 400 to 1200 showed the same unstable behaviour. However, the MSE value at 400 neurons produced the lowest error. This was the same scenario for the RMSE value for training, validation, and testing data, where it produced the lowest RMSE values at 400 neurons. For the value of R, the results showed the same behaviour of the MSE and RMSE values, in which the lower the error, the higher the correlation. The highest value of R (0.976) for the proposed NFS model was realized at 400 neurons in the hidden layer.
Since the best results in terms of MSE, RMSE, and R were obtained using 400 neurons, the proposed NFS model of the risk estimation technique was implemented and trained using the CGF learning algorithm with 400 neurons in the hidden layer. The performance graph of MSE values of training, validation, and testing data is shown in Figure 7. The results demonstrated that the proposed NFS model was a good fit, as the R value was close to 1, as shown in Figure 8. In addition, no overfitting occurred, as the training, validation, and testing data had the same behaviour.

6.3.3. Training the NFS with SCG

Conjugate gradient methods need a line search at each iteration, which is computationally expensive, as it requires that the network response to all training inputs be estimated multiple times for each search. The Scaled Conjugate Gradient (SCG) learning algorithm was developed by Moller in 1993 [41]. It was primarily built to overcome the time-consuming line search associated with conjugate gradient learning methods. The SCG algorithm utilizes the second-order information from the ANN to reach faster convergence. It is also fully automated, so there are no user-dependent parameters, and it avoids a time-consuming line-search in each iteration to determine the appropriate step size [41].
The SCG learning algorithm with one hidden layer was utilized to train the proposed NFS model of the risk estimation technique. The NFS model was trained with increasing the number of neurons in the hidden layer from 50 to 1200, and the MSE, RMSE, and R values were recorded, as shown in Table 4. The results demonstrated unstable behaviour when increasing the number of neurons in the hidden layer. The MSE value of the training data increased from 19.99 at 50 neurons to 23.77 at 100 neurons. Then, the unstable behaviour continued until the MSE reached its lowest value at 1000 neurons. This was the same scenario for the RMSE for training, validation, and testing data, where it produced the lowest values at 1000 neurons. For the value of R, the results demonstrated the same behaviour of MSE and RMSE values, in which the lower the error, the higher the correlation. The highest value of R (0.9975) for the proposed NFS model was realized at 1000 neurons in the hidden layer.
Since the best results in terms of the MSE, RMSE, and R were obtained using 1000 neurons, the proposed NFS model of the risk estimation technique was implemented and trained using the SCG learning algorithm with 1000 neurons in the hidden layer. The performance graph of the MSE values for training, validation, and testing data can be shown in Figure 9. The results showed that the NFS model was a good fit, as the value of R (0.9975) was very close to 1, as shown in Figure 10. In addition, no overfitting occurred, as the training, validation, and testing data had the same behaviour.

6.3.4. Comparison of Training Algorithms

A comparison between three learning algorithms that were utilized to train the proposed NFS model is shown in Table 5. The results demonstrated that there was no optimal number of neurons for the hidden layer that could be used to produce the lowest error and the highest correlation with different learning algorithms.
As shown in Table 5, although the MSE and RMSE errors of both the CGF and SCG algorithms were quite high, the correlation of both algorithms was good. This is due to the fact that the CGF and SCG algorithms are mainly designed to avoid the time-consuming line search which produces a good fit in a short period of time [42]. This can be shown by having a good fit (0.976 and 0.997, respectively). In terms of the MSE and RMSE values, the LM learning algorithm produced the lowest error for training, validation, and testing data among other learning algorithms. In addition, the LM algorithm produced the highest correlation, with 0.999 for the value of R, which is close to the ideal case. This indicates that the NFS model was well trained and fitted with the learning process. This is because the LM optimization technique is more powerful than the conventional gradient descent techniques [43]. Therefore, the LM learning algorithm was selected as the optimal learning algorithm to be utilized to implement the proposed NFS model of the risk estimation technique.

6.4. NFS and the Fuzzy System

Utilizing the risk-based access control model to decide whether granting or denying access needs a risk estimation technique that produces a quantitative and numeric risk value for each access request. However, there was no available dataset to describe the risk probabilities and impacts for a set of specified incidents. In the absence of a dataset, the fuzzy logic system using the Mamdani FIS was utilized with the input of IoT security experts to implement the risk estimation process [9]. One of the challenges that faced adopting the fuzzy logic system in the risk estimation technique in real-world IoT applications is that it requires a long processing time, and its scalability seems to be questionable. To overcome these issues, the risk estimation technique was implemented using the hybrid NFS model. This is because the hybrid NFS model makes the best use of the advantages of fuzzy systems and ANNs. Hybrid systems have the property of constantly being treated as systems of fuzzy rules, with neural networks used to tune MFs in the preconditions and conclusions of rules based on the set of learning [44]. Furthermore, the parallel computation and learning abilities of the NFS model add more improvements to the risk estimation technique.
After training the NFS model using three learning algorithms (LM, CGF, and SCG), the results demonstrated that implementing the proposed NFS model with the LM learning algorithm to implement the risk estimation technique provided less processing time, as it used only one-sixth of the time used by the Mamdani FIS, as depicted in Table 6. Both methods followed a linear relationship, in which increasing the number of access requests led to increasing the processing time. In addition, the results demonstrated that the time per access request for the NFS model using the LM algorithm produced a very short time compared to the time per access request produced by the Mamdani FIS. As shown in Table 6, the processing time required to process 1000 access requests using the Mamdani FIS was 57.38 s, while it only took 10.87 s when processed using the proposed NFS model with the LM learning algorithm. The trained NFS model with the LM learning algorithm proved that it provides a more efficient processing time, which can provide timeliness risk estimation techniques for various IoT applications. Besides this, the learning capability makes the risk estimation technique able to adapt to changes and unpredicted situations in the IoT environment, which will result in more accurate and realistic risk values.

7. Evaluation of Results: Healthcare

Healthcare is one of the main applications of the IoT system [45,46]. It is used to provide remote monitoring and constant tracking of health conditions, which provide a more effective healthcare system for various patients. Due to the vast volume of sensitive data collected by various healthcare devices about patients, that if accessed by unauthorized individuals can lead to severe and deadly consequences, providing a secure, dynamic, and flexible access control model that uses not only access policies but also real-time and contextual features to provide access decisions is required [47,48]. In addition, protecting patients’ data is not the only concern in healthcare systems but also regarding providing access in unexpected situations. In crises or emergencies, the availability of information takes precedence over privacy and security concerns. Therefore, providing a dynamic access control model for healthcare is a significant aspect to ensure data security and adapt to unexpected situations [49]. Hence, the healthcare scenario was utilized to check the applicability of the proposed risk-based access control model using the NFS model for the risk estimation.
This section discusses applying the proposed risk-based access control model and the risk estimation technique using the NFS model. Different access control scenarios will be presented to evaluate the applicability of the proposed model to real-world scenarios.

7.1. Scenario Description

A closed world scenario involving a healthcare provider, such as Mount Cedar (MC) children’s hospital [50], was utilized to show various access control scenarios. Typically, patients’ information in hospitals is stored as datasets. Each dataset is characterized by a unique object identifier. Datasets can be organized in classes that can be collectively referred to with a given name and associated with an object profile (metadata) that provides additional information about the dataset.
Consider the MC hospital has now received a four-year-old child called Harry, who was brought into the MC’s first aid clinic by his mother, Eva, late Wednesday evening. The admitting staff observed that Harry suffered from several bruises all over his body, a fractured rib, and a distorted shoulder [50]. Let us walk through the events that would occur in this situation. Initially, Harry’s doctor in the first aid clinic, Dr Chris, made an access request to the system to view or read Harry’s history file in the Electronic Patient Record (EPR). He also assigned Harry to a care team involving a set of nurses and ordered a series of examinations. The leader nurse of the care team made an access request to the system to read Harry’s file in the patient’s EPR.
When the examination results returned, Dr Chris wrote the diagnosis and the required medication for Harry and called social workers and policemen to investigate the incident, as he suspected a child abuse has occurred. Therefore, one of the social workers who is responsible for helping the children in case of abuse and a police officer requested to access Harry’s medical information for investigation purposes.

7.2. Scenario Actors

The MC is a children’s hospital. Actors involved in this scenario include:
  • The child who needs treatment;
  • Doctors who are responsible for providing care to the child;
  • Nurses who are responsible for helping the doctors;
  • Social workers who are responsible for helping the children in case of trauma or abuse;
  • Policemen who are responsible for investigating and establishing possible criminal charges and responsibilities in cases of trauma or abuse.

7.3. Scenario Assumption

There is no available dataset that describes risk likelihood and its impact nor has similar work done before to use the NFS model in the risk estimation in risk-based access control models. Some parameters will be assumed based on the literature review and logical flow of the scenarios. Applying the proposed risk-based access control model on the healthcare access control scenario requires defining values of the four risk factors (action severity, resource sensitivity, user context, and risk history) for each access request. For the action severity, three actions were assumed, involving read/view, write, and delete. The delete operation is not permitted for all actors involved in this scenario, as the hospital keeps track of all the medical histories of patients, so there is no need to delete any data. As discussed earlier, there are various actors involved in this scenario, in which each actor has a different role in the hospital. The proposed risk-based model should validate its applicability in this scenario by allowing or denying tasks for each role. Generally, only doctors can perform both read and write operations on the EPR, while other actors, including nurses, social workers, and policemen, can only read/view the EPR. For the resource sensitivity, two sensitivity levels were assumed: sensitive and not sensitive. However, all data/resources involved in this scenario were assumed to be sensitive.
To define the value of the action severity, Sharma et al.’s [51] formula was utilized. This formula was used to estimate the risk score of action severity in terms of various actions, risk probability, and cost regarding data availability, integrity, and confidentiality. The formula is represented as:
Risk = (C × P) + (I × P) + (A × P)
where C, I, and A represents confidentiality, integrity, and availability, respectively, and P represents the probability. In addition, Sharma et al. [51] have suggested some actions and corresponding values of the CIA, as shown in Table 7. Therefore, values of action severity of the proposed risk-based model will be estimated using this table.
As shown in Table 7, if a user needed to perform a “view” operation on sensitive data, the probability of this incident was 0.2. Since only confidentiality would be affected (second row), the risk value of the action severity would be 0.2. Since healthcare data contain sensitive information, that if used maliciously can lead to deadly consequences, all data or resources involved in this scenario were assumed to be sensitive and with the probability of 0.2, and the value of the resource sensitivity was 0.4. For the contextual and real-time attributes (user context) that were collected at the time of the access request, the time and location features were utilized. The time refers to the time of duty for the hospital staff, whether a doctor or nurse, in which if the doctor requested access to data during his/her time of duty (time allocation), the risk associated with the time context feature would be low, otherwise it would be high. Furthermore, the location was utilized to determine the risk associated with contextual attributes, in which if the actor requested access to data from inside the hospital, the risk would be low, otherwise, the risk would be high. The value of user context was assumed, as shown in Table 8. In addition, since actors involved in this scenario, involving doctors, nurses, social workers, and policemen, are officially employed in the hospital, they are trusted users, and hence their risk history was assumed to be low. Therefore, the value of the risk history would be 0.2.

7.4. Scenario Results

The output risk value was used to assess the security risk value associated with the access request and used to make the access decision. The risk values of this scenario were categorized into three groups, as shown in Table 9. The security administrator could utilize these bands to grant or deny access to system resources. For example, if the output risk is low or moderate, access can be granted, while if the output risk is high, the access should be denied. These bands can be flexibly changed by the security administrator in response to unpredicted situations. Furthermore, the security administrator or owner has the full flexibility to specify different values for the risk category and specify their output risk band to grant or deny access.
All access control scenarios of the MC children’s hospital were implemented, and the output risk value was evaluated using the proposed NFS model with the LM algorithm, as shown in Table 10. Applying the proposed risk-based access control model and the risk estimation using the NFS model demonstrated that it can provide several advantages to the healthcare domain. Using contextual and real-time features involving time and location demonstrated it can provide dynamic and flexible access decisions that can adapt to unpredicted situations. Allowing the doctors to access the patient’s EPR even after finishing their duty time allows them to help the patient until an available on duty doctor is allocated. In addition, one of the important aspects of applying the proposed risk-based model in the healthcare domain is denying access, whether to reading or writing operations, for all actors involved in this scenario when they are not on duty and outside the location of the hospital. This adds more security to the healthcare system compared to the existing systems, in which if one actor lost his/her credentials (for example password) through social engineering or any other type of attack, this can lead to information disclosure. Using the proposed risk-based model with contextual and real-time features, no-one can access data only if they are inside the hospital and within their duty time.
Applying the proposed risk-based model on access control scenarios of the MC children’s hospital demonstrated it can provide an effective access control model that can use contextual and real-time features to provide access decisions. It solves issues associated with static policies that always give the same result in different situations. For example, it allows access if the actor is located in the hospital location. It also solves issues associated with misuse and credential loss by allowing access by actors in person.

8. Conclusions

A risk-based access control model is one of the dynamic models that utilizes real-time and contextual features to make access decisions. This model performs a risk analysis on each access request to permit or deny access dynamically based on the estimated risk value. The risk estimation process is one of the essential stages to implement a risk-based access control model for the IoT. Although the fuzzy logic system provides accurate and realistic risk values for access control operations, it has some limitations. For example, the scalability of the fuzzy logic system seems to be doubtful, since it requires a non-trivial time to estimate security risks of access control operations. Furthermore, the fuzzy logic cannot learn or adjust itself to a new environment. Therefore, this paper proposed a novel NFS model to build the risk estimation technique that evaluates security risks associated with access requests. The proposed NFS model was trained using three learning algorithms, LM, CGF, and SCG, to determine the optimal learning algorithm with the minimum error (lowest RMSE and MSE) and the maximum fit (highest R). The results demonstrated that the LM algorithm was the optimal method to implement the NFS model of the risk estimation process. The trained NFS model with the LM learning algorithm proved that it provides a more efficient processing time, which can provide a timeliness risk estimation technique for various IoT applications. Besides this, adding the learning capability will make the risk estimation technique able to adapt to changes in the IoT environment, which results in more accurate and realistic risk values. The proposed NFS model was also evaluated against access control scenarios of a healthcare system (children’s hospital), and the results demonstrated that the proposed NFS model provides dynamic, flexible, and accurate access decisions using the contextual and real-time features involving the time and location associated with each access request. For future work, deep learning techniques will be investigated for the risk estimation process. With the availability of a large dataset in this research, deep learning algorithms are expected to provide better results in terms of accuracy and performance. In addition, investigating utilizing risk with user trust to provide access decisions should be performed.

Author Contributions

H.F.A.: Conceptualization and design of the study, methodology; validation, experimentation, writing—original draft preparation, and/or writing—review and editing. M.A.A.: Conception and design of the study, writing—original draft, and writing—review & editing. N.F.F.: Experiment setup and testing, writing—original draft, and writing—review & editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Metoui, N.; Bezzi, M.; Armando, A. Trust and risk-based access control for privacy-preserving threat detection systems. In Lecture Notes in Computer Science; Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics; Springer: Cham, Switzerland, 2016; Volume 10018, pp. 285–304. [Google Scholar]
  2. Wang, Q.; Jin, H. Quantified risk-adaptive access control for patient privacy protection in health information systems. In Proceedings of the 6th ACM Symposium on Information, Computer, and Communications Security—ASIACCS’11, Hong Kong, China, 22–24 March 2011; pp. 406–410. [Google Scholar]
  3. Li, Y.; Sun, H.; Chen, Z.; Ren, R.; Luo, H. Using Trust and Risk in Access Control for Grid Environment. In Proceedings of the International Conference on Security Technology—SECTECH’08, Sanya, China, 13–15 December 2008; pp. 13–16. [Google Scholar]
  4. Shaikh, R.A.; Adi, K.; Logrippo, L. Dynamic risk-based decision methods for access control systems. Comput. Secur. 2012, 31, 447–464. [Google Scholar] [CrossRef]
  5. Chen, P.; Pankaj, C.; Karger, P.A.; Wagner, G.M.; Schuett, A. Fuzzy Multi-Level Security: An Experiment on Quantified Risk—Adaptive Access Control. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07), Oakland, CA, USA, 20–23 May 2007; pp. 222–227. [Google Scholar]
  6. Dos Santos, D.R.; Westphall, C.M.; Westphall, C.B. A dynamic risk-based access control architecture for cloud computing. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Management in a Software-Defined World, Krakow, Poland, 5–9 May 2014; pp. 1–9. [Google Scholar]
  7. Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B. An Overview of Risk Estimation Techniques in Risk-based Access Control for the Internet of Things. In Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security (IoTBDS 2017), Porto, Portugal, 24–26 April 2017; pp. 254–260. [Google Scholar]
  8. Atlam, H.F.; Alenezi, A.; Walters, R.J.; Wills, G.B.; Daniel, J. Developing an adaptive Risk-based access control model for the Internet of Things. In Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter, UK, 21–23 June 2017; pp. 655–661. [Google Scholar]
  9. Atlam, H.F.; Wills, G.B. An efficient security risk estimation technique for Risk-based access control model for IoT. Internet Things 2019, 6, 100052. [Google Scholar] [CrossRef] [Green Version]
  10. McGraw, R. Risk-Adaptable Access Control (RAdAC): Access Control and the Information Sharing Problem. In Proceedings of the NIST & NSA Privilege Management Workshop, Gaithersburg, MD, USA, 1–3 September 2009. [Google Scholar]
  11. Khambhammettu, H.; Boulares, S.; Adi, K.; Logrippo, L. A framework for risk assessment in access control systems. Comput. Secur. 2013, 39, 86–103. [Google Scholar] [CrossRef]
  12. Chen, A.; Xing, H.; She, K.; Duan, G. A Dynamic Risk-Based Access Control Model for Cloud Computing. In Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom) (BDCloud-SocialCom-SustainCom), Atlanta, GA, USA, 8–10 October 2016; pp. 579–584. [Google Scholar]
  13. Choi, D.; Kim, D.; Park, S. A Framework for Context-Sensitive Risk-Based Access Control in Medical Information Systems. Comput. Math. Methods Med. 2015, 2015, 265132. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Ni, Q.; Bertino, E.; Lobo, J. Risk-based access control systems built on fuzzy inferences. In Proceedings of the 5th ACM Symposium on Information, Computer, and Communications Security—ASIACCS 10, Beijing, China, 13–16 April 2010; pp. 250–260. [Google Scholar]
  15. Li, J.; Bai, Y.; Zaman, N. A fuzzy modelling approach for risk-based access control in eHealth cloud. In Proceedings of the 12th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications, Melbourne, Australia, 16–18 July 2013; pp. 17–23. [Google Scholar]
  16. Diep, N.; Hung, L.; Zhung, Y.; Lee, S.; Lee, Y.; Lee, H. Enforcing Access Control Using Risk Assessment. In Proceedings of the The Fourth European Conference on Universal Multiservice Networks, Toulouse, France, 14–16 February 2007; pp. 419–424. [Google Scholar]
  17. Iranmanesh, S.H.; Alem, S.M.; Berneti, E.M. Project Risk Assessment for Customer Relationship Management Using Adaptive Nero Fuzzy Inference System (ANFIS). In Proceedings of the 2nd International Conference in Computer Science and Its Applications, CSA ’09, Jeju Island, Korea, 10–12 December 2009; pp. 23–29. [Google Scholar]
  18. Asogbon, M.G.; Olabode, O.; Agbonifo, O.C.; Samuel, O.W.; Yemi-peters, V.I. Adaptive Neuro-Fuzzy Inference System for Mortgage Loan Risk Assessment. Int. J. Intell. Inf. Syst. 2016, 5, 17–24. [Google Scholar]
  19. Kristjanpoller, W.; Michell, K.V. A stock market risk forecasting model through integration of switching regime, ANFIS and GARCH techniques. Appl. Soft Comput. J. 2018, 67, 106–116. [Google Scholar] [CrossRef]
  20. Beinarovica, A.; Gorobetz, M.; Levchenkov, A. Innovative neuro-fuzzy system of smart transport infrastructure for road traffic safety. In IOP Conference Series Materials Science and Engineering; IOP Publishing: Bristol, UK, 2017; Volume 236, pp. 1–9. [Google Scholar]
  21. Shahzadi, S.; Khaliq, B.; Rizwan, M.; Ahmad, F. Security of Cloud Computing Using Adaptive Neural Fuzzy Inference System. Secur. Commun. Netw. 2020, 2020, 5352108. [Google Scholar] [CrossRef]
  22. Yao, F.; Yerima, S.Y.; Kang, B.; Sezer, S. Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference system. In Proceedings of the 2017 International Conference on Cyber Security and Protection of Digital Services (Cybersecurity), London, UK, 19–20 June 2017. [Google Scholar]
  23. Jang, S.R. ANFIS: Adaptive-Network-Based Fuzzy Inference System. IEEE Trans. Syst. Man Cybern. 1993, 23, 665–685. [Google Scholar] [CrossRef]
  24. Kar, S.; Das, S.; Ghosh, P.K. Applications of neuro-fuzzy systems: A brief review and future outline. Appl. Soft Comput. J. 2014, 15, 243–259. [Google Scholar] [CrossRef]
  25. Jang, S.R.; Sun, C.T.; Mizutani, E. Neuro-Fuzzy and Soft Computing; Prentice-Hall: Pearson College, NJ, USA, 1997. [Google Scholar]
  26. Gray, A.R.; MacDonell, S.G. A comparison of techniques for developing predictive models of software metrics. Inf. Softw. Technol. 1997, 39, 425–437. [Google Scholar] [CrossRef] [Green Version]
  27. Shaf, J.; Angelov, P.; Umair, M. Prediction of the Attention Area in Ambient Intelligence Tasks. In Innovative Issues in Intelligent Systems; Springer International Publishing: Cham, Switzerland, 2016; pp. 33–56. [Google Scholar]
  28. Vieira, J.; Dias, F.M.; Mota, A. Neuro-Fuzzy Systems: A Survey. In Proceedings of the 5th International Conference on Neural Networks and Applications, Udine, Italy, 25–27 March 2004; pp. 1–6. [Google Scholar]
  29. Abraham, A. Neuro-Fuzzy Systems: State-of-the-art Modeling Techniques. In Proceedings of the International Work-Conference on Artificial Neural Networks, Vienna, Austria, 21–25 August 2001; pp. 269–276. [Google Scholar]
  30. Naidu, D.S.; Sun, C.T. Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence; Pearson Education: London, UK, 1997. [Google Scholar]
  31. Lee, S.; Lee, Y.W.; Diep, N.N.; Lee, S.; Lee, Y.; Lee, H. Contextual Risk-based access control. In Proceedings of the 2007 International Conference on Security & Management, Las Vegas, NV, USA, 25–28 June 2007; pp. 406–412. [Google Scholar]
  32. Atlam, H.F.; Walters, R.J.; Wills, G.B.; Daniel, J. Fuzzy Logic with Expert judgment to Implement an Adaptive Risk-based Access Control Model for IoT. Mob. Netw. Appl. 2021, 26, 2545–2557. [Google Scholar] [CrossRef] [Green Version]
  33. Konaté, A.A.; Pan, H.; Khan, N.; Yang, J.H. Generalized regression and feed-forward back propagation neural networks in modelling porosity from geophysical well logs. J. Pet. Explor. Prod. Technol. 2015, 5, 157–166. [Google Scholar] [CrossRef] [Green Version]
  34. Hornik, K.; Stinchcombe, M.; White, H. Multilayer feedforward networks are universal approximators. Neural Netw. 1989, 2, 359–366. [Google Scholar] [CrossRef]
  35. Abraham, A. Artificial neural networks. In The Handbook of Measuring System Design; John Wiley & Sons Ltd.: Chichester, UK, 2005; pp. 97–129. [Google Scholar]
  36. Cerezuela-Escudero, E.; Rios-Navarro, A.; Dominguez-Morales, J.P.; Tapiador-Morales, R.; Gutierrez-Galan, D.; Martín-Cañal, C.; Linares-Barranco, A. Performance Evaluation of Neural Networks for Animal Behaviors Classification: Horse Gaits Case Study; Springer: Cham, Switzerland, 2016; pp. 377–385. [Google Scholar]
  37. Lourakis, M.A.; Argyros, A.A. Is Levenberg-Marquardt the most efficient optimization algorithm for implementing bundle adjustment? In Proceedings of the IEEE International Conference on Computer Vision, Beijing, China, 17–21 October 2005; Volume 2, pp. 1526–1531. [Google Scholar]
  38. Nawi, N.M.; Ransing, R.S.; Salleh, M.N.; Ghazali, R.; Hamid, N.A. An Improved Back Propagation Neural Network Algorithm on Classification Problems; Springer: Berlin/Heidelberg, Germany, 2010; pp. 177–188. [Google Scholar]
  39. Fletcher, R.; Reeves, C.M. Function minimization by conjugate gradients. Comput. J. 1964, 7, 149–154. [Google Scholar] [CrossRef] [Green Version]
  40. Ellah, A.R.; Yahya, A.; Essai, M.H. Comparison of Different Backpropagation Training Algorithms Using Robust M- Estimators Performance Functions. In Proceedings of the 2015 Tenth International Conference on Computer Engineering & Systems (ICCES), Cairo, Egypt, 23–24 December 2015; pp. 384–388. [Google Scholar]
  41. Moller, M. A scaled conjugate gradient algorithm for fast supervised learning. Neural Netw. 1993, 6, 525–533. [Google Scholar] [CrossRef]
  42. Cetisli, B.; Barkana, A. Speeding up the scaled conjugate gradient algorithm and its application in neuro-fuzzy classifier training. Soft Comput. 2010, 14, 365–378. [Google Scholar] [CrossRef]
  43. Wilamowski, B. Neural network architectures and learning algorithms. IEEE Ind. Electron. Mag. 2009, 3, 56–63. [Google Scholar] [CrossRef]
  44. Chung, K.; Tan, S.; Holdworth, D. Insolvency Prediction Model Using Multivariate Discriminant Analysis and Artificial Neural Network for the Finance Industry in New Zealand. Int. J. Bus. Manag. 2008, 3, 19–29. [Google Scholar]
  45. Qadri, Y.A.; Nauman, A.; Zikria, Y.B.; Vasilakos, A.V.; Kim, S.W. The Future of Healthcare Internet of Things: A Survey of Emerging Technologies. IEEE Commun. Surv. Tutor. 2020, 22, 1121–1167. [Google Scholar] [CrossRef]
  46. Xiong, H.; Choo, K.K.R.; Vasilakos, A.V. Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing. IEEE Trans. Big Data 2022, 8, 1–13. [Google Scholar] [CrossRef]
  47. Yang, H.; Yuan, J.; Li, C.; Zhao, G.; Sun, Z.; Yao, Q.; Bao, B.; Vasilakos, A.V. BrainIoT: Brain-Like Productive Services Provisioning with Federated Learning in Industrial IoT. IEEE Internet Things J. 2022, 9, 2014–2024. [Google Scholar] [CrossRef]
  48. Bera, B.; Saha, S.; Das, A.K.; Vasilakos, A.V. Designing Blockchain-Based Access Control Protocol in IoT-Enabled Smart-Grid System. IEEE Internet Things J. 2021, 8, 5744–5761. [Google Scholar] [CrossRef]
  49. Liu, X.; Xie, L.; Wang, Y.; Zou, J.; Xiong, J.; Ying, Z.; Vasilakos, A.V. Privacy and Security Issues in Deep Learning: A Survey. IEEE Access 2021, 9, 4566–4593. [Google Scholar] [CrossRef]
  50. Crdagna, A.; Capitani Di Vimercati, S.; Foresti, S.; Grandison, T.W.; Jajodia, S.; Samarati, P. Access control for smarter healthcare using policy spaces. Comput. Secur. 2010, 29, 848–858. [Google Scholar] [CrossRef] [Green Version]
  51. Sharma, M.; Bai, Y.; Chung, S.; Dai, L. Using risk in access control for cloud-assisted ehealth. In Proceedings of the 9th International Conference on High-Performance Computing and Communication & Embedded Software and Systems (HPCC-ICESS), Liverpool, UK, 25–27 June 2012; pp. 1047–1052. [Google Scholar]
Figure 1. Dynamic risk-based access control mode.
Figure 1. Dynamic risk-based access control mode.
Sensors 22 02005 g001
Figure 2. Structure of the Proposed NFS model.
Figure 2. Structure of the Proposed NFS model.
Sensors 22 02005 g002
Figure 3. Implementation of Mamdani FIS using the MATLAB fuzzy logic toolbox.
Figure 3. Implementation of Mamdani FIS using the MATLAB fuzzy logic toolbox.
Sensors 22 02005 g003
Figure 4. Architecture of an MLP neural network.
Figure 4. Architecture of an MLP neural network.
Sensors 22 02005 g004
Figure 5. Performance of the training, validation, and testing data with the LM algorithm at 1000 neurons in the hidden layer.
Figure 5. Performance of the training, validation, and testing data with the LM algorithm at 1000 neurons in the hidden layer.
Sensors 22 02005 g005
Figure 6. Regression plots of the training, testing, and validation data with the LM algorithm at 1000 neurons in the hidden layer.
Figure 6. Regression plots of the training, testing, and validation data with the LM algorithm at 1000 neurons in the hidden layer.
Sensors 22 02005 g006
Figure 7. Performance of the training, validation, and testing data with the CGF learning algorithm at 400 neurons in the hidden layer.
Figure 7. Performance of the training, validation, and testing data with the CGF learning algorithm at 400 neurons in the hidden layer.
Sensors 22 02005 g007
Figure 8. Regression plots of the training, testing, and validation data with the CGF algorithm at 400 neurons in the hidden layer.
Figure 8. Regression plots of the training, testing, and validation data with the CGF algorithm at 400 neurons in the hidden layer.
Sensors 22 02005 g008
Figure 9. Performance of the training, validation, and testing data with the SCG learning algorithm at 1000 neurons in the hidden layer.
Figure 9. Performance of the training, validation, and testing data with the SCG learning algorithm at 1000 neurons in the hidden layer.
Sensors 22 02005 g009
Figure 10. Regression plots of the training, validation, and testing data with the SCG learning algorithm at 1000 neurons in the hidden layer.
Figure 10. Regression plots of the training, validation, and testing data with the SCG learning algorithm at 1000 neurons in the hidden layer.
Sensors 22 02005 g010
Table 1. Summary of related work.
Table 1. Summary of related work.
CitationSummary of Contribution
McGraw [10]Proposed an RAdAC model that provides access based on security risks and operational needs. However, the model does not provide details about how to estimate security risks and operational needs quantitatively.
Khambhammettu et al. [11]Proposed a framework to assess security risks based on object sensitivity and subject trustworthiness. However, the model lacks contextual features and is unable to learn or adapt to unpredicted situations.
Chen et al. [12]Proposed a dynamic risk-based model that integrates the attribute-based access control model with the risk-trust assessment method. However, the model lacks contextual features and is unable to learn or adapt to unpredicted situations.
Choi et al. [13]Proposed a context-sensitive risk-based model that uses action severity and treatment to provide access decisions. However, the model does not include how to estimate the risk quantitatively.
Chen et al. [5]Proposed a fuzzy multi-level security model to estimate security risks using the difference between the object and subject security levels. However, the model does not explain how to estimate risk quantitatively. Furthermore, time overhead and scalability issues have not been addressed.
Ni et al. [14]Proposed a fuzzy logic system to assess security risks based on the subject and object security levels. However, the model does not explain how fuzzy rules were created or how scalability and time-overhead issues can be addressed.
Li et al. [15]Proposed a fuzzy modelling technique to assess security risks based on action severity, risk history, and data sensitivity. However, the model does not use contextual features.
Atlam et al. [9]Proposed a fuzzy logic system to assess security risks based on action severity, risk history, resource sensitivity, and user context. However, the model lacks the ability to learn or adapt to unpredicted situations.
Diep et al. [16]Proposed a dynamic risk-based model by collecting useful information from the environment to make access decisions based on outcomes of actions. However, the model does not cover how values of outcomes of actions can be evaluated.
Kristjanpoller & Michell [19]Proposed the NFS model to assess security risks of a stock market in the Latin American region and improve the forecast accuracy.
Beinarovica et al. [20]Proposed the NFS model in transportation control to improve safety by evaluating the risk of accidents using intelligent infrastructure devices.
Shahzadi et al. [21]Proposed the NFS model to reduce security risks in cloud computing by identifying various risks associated with it.
Kaur et al. [22]Proposed the NFS model to improve authentication in mobile devices by building an implicit authentication system based on behavioural data collected from different android users.
Table 2. MSE, RMSE, and R values when training the NFS model using the LM algorithm.
Table 2. MSE, RMSE, and R values when training the NFS model using the LM algorithm.
Number of NeuronsTraining MSEValidation MSETesting MSETraining RMSEValidation RMSETesting RMSER
1006.2996.4926.4722.5092.5482.5440.9921
2004.19034.39344.41122.04702.09602.10030.9946
3003.05233.32453.26081.74711.82331.80580.9960
4002.22282.40412.44421.49091.55051.56340.9970
5001.92342.18452.16241.38691.47801.48230.9973
6001.62371.78321.75761.27421.33541.42370.9976
7001.44561.68101.63441.20231.29651.27850.9980
8001.21961.42941.49711.10441.19561.22360.9983
9001.10311.31541.24911.03761.14771.15460.9984
10000.97771.21881.19020.98881.10401.09100.9985
Table 3. MSE, RMSE, and R values when training the NFS model using the CGF algorithm.
Table 3. MSE, RMSE, and R values when training the NFS model using the CGF algorithm.
Number of NeuronsTraining MSEValidation MSETesting MSETraining RMSEValidation RMSETesting RMSER
5025.268225.304725.75035.02675.03045.07450.9677
10021.042621.119920.82874.58724.59564.56380.9744
20020.591820.635520.33874.53784.54264.50980.9747
30026.753626.775627.24665.17245.17455.21980.9663
40019.253019.543419.13584.38784.42084.37450.9764
50019.610319.680519.89244.42844.43634.46010.9756
60023.218723.384823.64044.81864.83584.86210.9706
70022.681322.531323.12974.76254.74674.80930.9715
80020.637421.376920.87234.54284.62354.56860.9741
90020.832421.102420.98754.56434.59374.62750.9740
100022.638223.594723.28924.75804.85744.82590.9710
110024.958025.682226.00884.99585.06785.09990.9679
120021.042621.119920.82874.58724.59564.56380.9744
Table 4. The MSE, RMSE, and R values when training the NFS model using the SCG algorithm.
Table 4. The MSE, RMSE, and R values when training the NFS model using the SCG algorithm.
Number of NeuronsTraining MSEValidation MSETesting MSETraining RMSEValidation RMSETesting RMSER
5019.994820.301820.56144.47164.50584.53450.9745
10023.767923.912724.09204.87524.89014.90840.9704
20017.819118.039718.11984.22134.24734.25670.9780
30020.893620.857521.24344.57104.56704.60910.9735
40016.747117.210116.96454.09234.14854.11880.9791
50018.916718.989819.45184.34934.35774.41040.9759
60021.101421.588621.36244.59364.64644.62190.9738
70018.675218.692519.28154.32154.32354.39110.9763
80018.989819.647319.20344.35774.43254.38220.9762
90018.102718.276618.25574.25474.27514.27270.9815
100014.750215.168315.01133.84063.89473.87440.9975
110018.935819.369819.30344.35154.40114.39360.9763
120019.894620.821521.32344.46034.56314.61770.9746
Table 5. Comparison between the learning algorithms used to train the proposed NFS model.
Table 5. Comparison between the learning algorithms used to train the proposed NFS model.
ItemTraining Algorithms
LMCGFSCG
Number of neurons in the hidden layer10004001000
Number of epochs100010001000
MSE of training0.97819.25314.750
MSE of validation1.21919.54315.168
MSE of testing1.19019.13615.011
RMSE of training0.9894.3883.841
RMSE of validation1.1044.4213.895
RMSE of testing1.0914.3753.874
Correlation Coefficient (R)0.9990.9760.997
Table 6. Processing time of the NFS model using the LM learning algorithm and Mamdani FIS.
Table 6. Processing time of the NFS model using the LM learning algorithm and Mamdani FIS.
Number of Access RequestsNFS Using the LM AlgorithmMamdani FIS [9]
Time (s)Time per Request (s)Time (s)Time per Request (s)
100010.87500.0108857.3850.0574
10,00081.54690.00815572.1250.0572
20,000146.56250.007331140.40.05702
30,000211.42160.007051713.60.05712
40,000277.60940.006942286.40.05716
50,000341.76560.006842860.50.05721
60,000407.18750.006793436.20.05727
70,000472.12500.006744012.40.05732
80,000537.23450.006724588.80.05736
90,000602.23140.006695166.90.05741
100,000667.12860.006675746.230.05746
150,000995.46880.006648625.320.0575
200,0001325.31240.0066311,506.140.05753
250,0001634.82130.0065414,390.10.05756
Table 7. Risk values associated with action and data sensitivity.
Table 7. Risk values associated with action and data sensitivity.
ActionSensitivityCIA
CreateSensitive/Not-Sensitive011
ViewSensitive100
ViewNot-Sensitive001
ModifySensitive/Not-Sensitive011
DeleteSensitive/Not-Sensitive011
Table 8. The risk value of user context of various actors involved in this scenario.
Table 8. The risk value of user context of various actors involved in this scenario.
ActorOn Duty
(Time)
Location
(In Hospital)
User Context Risk LevelProposed UC Value
DoctorYesYesLow0.2
NoYesModerate0.4
NoNoHigh0.7
NurseYesYesLow0.2
NoYesModerate0.4
NoNoHigh0.7
Social WorkerYesYesLow0.2
NoYesModerate0.4
NoNoHigh0.7
PolicemanYesYesLow0.2
NoYesModerate0.4
NoNoHigh0.7
Table 9. Proposed output risk bands for the scenarios.
Table 9. Proposed output risk bands for the scenarios.
Risk BandRisk Category
0.1–0.3Low
0.31–0.5Moderate
0.51–1.0High
Table 10. Access decisions of various scenarios of the MC children hospital.
Table 10. Access decisions of various scenarios of the MC children hospital.
ActorOn DutyIn HospitalActionRisk FactorsOutput RiskOutput Risk Category
UCRSASRH
DoctorYesYesRead0.20.40.20.20.277Low
NoYesRead0.40.40.20.20.353Moderate
NoNoRead0.70.40.20.20.533High
YesYesWrite0.20.40.40.20.338Moderate
NoYesWrite0.40.40.40.20.412Moderate
NoNoWrite0.70.40.40.20.581High
NurseYesYesRead0.20.40.20.20.277Low
NoYesRead0.40.40.20.20.353Moderate
NoNoRead0.70.40.20.20.533High
Social Wo.YesYesRead0.20.40.20.20.277Low
NoYesRead0.40.40.20.20.353Moderate
NoNoRead0.70.40.20.20.533High
PolicemanYesYesRead0.20.40.20.20.277Low
NoYesRead0.40.40.20.20.353Moderate
NoNoRead0.70.40.20.20.533High
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Atlam, H.F.; Azad, M.A.; Fadhel, N.F. Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model. Sensors 2022, 22, 2005. https://doi.org/10.3390/s22052005

AMA Style

Atlam HF, Azad MA, Fadhel NF. Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model. Sensors. 2022; 22(5):2005. https://doi.org/10.3390/s22052005

Chicago/Turabian Style

Atlam, Hany F., Muhammad Ajmal Azad, and Nawfal F. Fadhel. 2022. "Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model" Sensors 22, no. 5: 2005. https://doi.org/10.3390/s22052005

APA Style

Atlam, H. F., Azad, M. A., & Fadhel, N. F. (2022). Efficient NFS Model for Risk Estimation in a Risk-Based Access Control Model. Sensors, 22(5), 2005. https://doi.org/10.3390/s22052005

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop