Open Access Open Access  Restricted Access Subscription or Fee Access

A Trust and Activity Based Access Control Model for Preserving Privacy and Sensitive Data in a Distributed and Collaborative System: Application to a Healthcare System

(*) Corresponding author

Authors' affiliations



Protecting privacy and sensitive data is an important task, especially in an open and dynamic environment such as distributed and collaborative systems. The traditional access control models and these extensions are not sufficient for preserving privacy and sensitive resources in a collaborative system. However, trust is an essential concern of any collaborative system. The trust concept is difficult to define, yet, it is accepted that the authorization decision-making process could be based on trust. In this paper, we have proposed an access control model based on the trustworthiness of the requested user within a collaborative system. This Trust and Activity Based Access Control (TABAC) model is composed of the trust mechanism, the trust model, defined within the activity in order to enhance the efficiency and reliability of the system. The existing approaches define authorization policies that include trust, but they do not take into account the process of calculating trust. Nevertheless, the decision-making in our model is based on trust computing. In addition, the trust concept is based on three components to assess a trust relationship: (1) collaboration, (2) recommendation, and (3) reputation. So that our trust approach adapts to a dynamic environment, we dynamically assign a weight to each trust component using the Weighted Moving Average and Ordered Weighted Averaging (WMA-OWA) combination algorithm. The scenario developed for the healthcare case shows that our TABAC model is a flexible and efficient approach to protecting the privacy and sensitive resources for a collaborative system.
Copyright © 2021 Praise Worthy Prize - All rights reserved.


Collaborative System; Trust; Collaboration Component; Recommendation Component; Reputation Component; Activity

Full Text:



R. Barhoun, M. Ed-daibouni, A. Namir, An Extended Attribute-Based Access Control (ABAC) Model for Distributed Collaborative Healthcare System, (2019) International Journal of Service Science, Management, Engineering, and Technology (IJSSMET), 10(4), pp. 81-94.

H. Mora, M.T. Signes-Pont, A. Fuster-Guilló, M.L. Pertegal-Felices. A collaborative working model for enhancing the learning process of science & engineering students, (2020) Computers in Human Behavior, 103, 140-150.

X., Castañer, N., Oliveira, Collaboration, coordination, and cooperation among organizations: Establishing the distinctive meanings of these terms through a systematic literature review, (2020) Journal of Management, 46(6), 965-1001.

P. Samarati, SC., de Vimercati, Access control: Policies, models, and mechanisms. In International School on Foundations of Security Analysis and Design (Springer, Berlin, Heidelberg, 2000, 137-196).

F., Paci, A., Squicciarini, N., Zannone, Survey on access control for community-centered collaborative systems, (2018) ACM Computing Surveys (CSUR), 51(1), 1-38.

W.W., Smari, P., Clemente, J.F., Lalande, An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system, (2014) Future Generation Computer Systems, 31, 147-168.

H. C., Chen, Collaboration IoT-based RBAC with trust evaluation algorithm model for massive IoT integrated application, (2019) Mobile Networks and Applications, 24(3), 839-852.

Ray, I., Chakraborty, S., A vector model of trust for developing trustworthy systems. In European Symposium on Research in Computer Security (Pages: 260-275 Year of Publication: 2014 Springer, Berlin, Heidelberg).

Ray, I., Chakraborty, S., Ray, I., VTRUST: a trust Management System based on a Vector Model of Trust. In International Conference on Information Systems Security (Pages: 91-105 Year of Publication: 2005 Springer, Berlin, Heidelberg).

S. A., Ghasempouri, B. T., Ladani, Modeling trust and reputation systems in hostile environments, (2019) Future Generation Computer Systems, 99, 571-592.

A., Aldini, Design and verification of trusted collective adaptive systems. (2018) ACM Transactions on Modeling and Computer Simulation (TOMACS), 28(2), 1-27.

D. D. S., Braga, M., Niemann, B., Hellingrath, F. B. D. L., Neto, Survey on computational trust and reputation models. (2018) ACM Computing Surveys (CSUR), 51(5), 1-40.

A., Singh, K., Chatterjee, An adaptive mutual trust-based access control model for electronic healthcare system, (2019) Journal of Ambient Intelligence and Humanized Computing, 1-20.

A. A., Adewuyi, H., Cheng, Q.., Shi, J., Cao, A., MacDermott, X., Wang, CTRUST: A dynamic trust model for collaborative applications in the Internet of Things, (2019) IEEE Internet of Things Journal, 6(3), 5432-5445.

N., Drawel, H., Qu, J., Bentahar, E., Shakshuki, Specification and automatic verification of trust-based multi-agent systems, (2020) Future Generation Computer Systems, 107, 1047-1060.

J., Chen, Z., Tian, X., Cui, I., Yin, X., Wang, Trust architecture and reputation evaluation for internet of things, (2019) Journal of Ambient Intelligence and Humanized Computing, 10(8), 3099-3107.

A. I. A., Ahmed, S. H., Ab Hamid, A., Gani, M. K., Khan, Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open Research Challenges, (2019) Journal of Network and Computer Applications, 145, 102409.

Atele-Williams, T., Marsh, S., Towards a computational model of information trust. In IFIP International Conference on Trust Management (Pages: 124-136 Year of Publication: 2018 Springer, Cham).

Y., Wang, J., Wen, X., Wang, B., Tao, W., Zhou, A cloud service trust evaluation model based on combining weights and gray correlation analysis, (2019) Security and Communication Networks, 1-11. 10.1155/2019/2437062.

Y., Wang, J., Wen, W., Zhou, A trust-based evaluation model for data privacy protection in cloud computing, (2019) International Journal of High-Performance Computing and Networking, 14(2), 147-156.

Singh, A., Chatterjee, K., A multi-dimensional trust and reputation calculation model for cloud computing environments. In 2017 ISEA Asia Security and Privacy (ISEASP) (Pages: 1-8 Year of Publication: 2017 IEEE).

A., Singh, K., Chatterjee, Trust based access control model for securing electronic healthcare system, (2019) Journal of Ambient Intelligence and Humanized Computing, 10(11), 4547-4565.

S., Pan Jun, A Trust-Game-Based Access Control Model for Cloud Service, (2020) Mobile Information Systems, 2020.

A., Kesarwani, P. M., Khilar, Development of trust based access control models using fuzzy logic in cloud computing, (2019) Journal of King Saud University-Computer and Information Sciences, ISSN 1319-1578, 2019.

S., Mehraj, M. T., Banday, A flexible fine-grained dynamic access control approach for cloud computing environment, (2021) Cluster Computing, 24(2), 1413-1434.

X., Li, F., Zhou, X., Yang, A multi-dimensional trust evaluation model for large-scale P2P computing, (2011) Journal of Parallel and Distributed Computing, 71(6), 837-847.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2023 Praise Worthy Prize