
of undesired access to smart farm image data, ensur-
ing that only authorized personnel can retrieve spe-
cific image content.
The effectiveness of this architecture is demon-
strated by its ability to enrich access requests with
necessary image information, facilitating a more in-
formed decision-making process based on the visual
content of the images. Additionally, the edge clas-
sification model’s lightweight, fast, and accurate na-
ture contributes to the overall efficiency of the sys-
tem. Furthermore, the average total time taken to
evaluate access requests for both pre-classified and
new images is remarkably small, with only slight ad-
ditional time required for pre-classified images due
to the time taken for ontology inference. This ef-
ficiency ensures a seamless and swift access control
process, contributing to the overall success and prac-
ticality of the proposed architecture in a smart farm
environment.
REFERENCES
Abdi, A. I., Eassa, F. E., Jambi, K., Almarhabi, K., Khe-
makhem, M., Basuhail, A., and Yamin, M. (2022).
Hierarchical blockchain-based multi-chaincode ac-
cess control for securing iot systems. Electronics,
11(5):711.
Abu Jabal, A., Bertino, E., Lobo, J., Law, M., Russo, A.,
Calo, S., and Verma, D. (2020). Polisma-a framework
for learning attribute-based access control policies. In
Computer Security–ESORICS 2020: 25th European
Symposium on Research in Computer Security, ES-
ORICS 2020, Guildford, UK, September 14–18, 2020,
Proceedings, Part I 25, pages 523–544. Springer.
Alohaly, M., Takabi, H., and Blanco, E. (2018). A deep
learning approach for extracting attributes of abac
policies. In Proceedings of the 23nd ACM on Sym-
posium on Access Control Models and Technologies,
pages 137–148.
Alohaly, M., Takabi, H., and Blanco, E. (2019a). Auto-
mated extraction of attributes from natural language
attribute-based access control (abac) policies. Cyber-
security, 2(1):2.
Alohaly, M., Takabi, H., and Blanco, E. (2019b). Towards
an automated extraction of abac constraints from nat-
ural language policies. In ICT Systems Security and
Privacy Protection: 34th IFIP TC 11 International
Conference, SEC 2019, Lisbon, Portugal, June 25-27,
2019, Proceedings 34, pages 105–119. Springer.
Bera, S. and Shrivastava, V. K. (2020). Analysis of vari-
ous optimizers on deep convolutional neural network
model in the application of hyperspectral remote sens-
ing image classification. International Journal of Re-
mote Sensing, 41(7):2664–2683.
Bui, T. and Stoller, S. D. (2020). Learning attribute-based
and relationship-based access control policies with
unknown values. In International Conference on In-
formation Systems Security, pages 23–44. Springer.
Cheng, J., Wu, J., Leng, C., Wang, Y., and Hu, Q.
(2017). Quantized cnn: A unified approach to ac-
celerate and compress convolutional networks. IEEE
transactions on neural networks and learning systems,
29(10):4730–4743.
Cotrini, C., Weghorn, T., and Basin, D. (2018). Mining
abac rules from sparse logs. In 2018 IEEE Euro-
pean Symposium on Security and Privacy (EuroS&P),
pages 31–46. IEEE.
Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., and Fei-
Fei, L. (2009). Imagenet: A large-scale hierarchical
image database. In 2009 IEEE conference on com-
puter vision and pattern recognition, pages 248–255.
Ieee.
Howard, A. G. (2017). Mobilenets: Efficient convolutional
neural networks for mobile vision applications. arXiv
preprint arXiv:1704.04861.
Karimi, L., Aldairi, M., Joshi, J., and Abdelhakim, M.
(2021). An automatic attribute-based access control
policy extraction from access logs. IEEE Transactions
on Dependable and Secure Computing, 19(4):2304–
2317.
Liu, A., Du, X., and Wang, N. (2021). Efficient access
control permission decision engine based on machine
learning. Security and Communication Networks,
2021(1):3970485.
Nobi, M. N., Krishnan, R., Huang, Y., Shakarami, M., and
Sandhu, R. (2022). Toward deep learning based access
control. In Proceedings of the Twelfth ACM Confer-
ence on Data and Application Security and Privacy,
pages 143–154.
Sandhu, R. (2021). Access control policy generation from
user stories using machine learning. In Data and
Applications Security and Privacy XXXV: 35th An-
nual IFIP WG 11.3 Conference, DBSec 2021, Cal-
gary, Canada, July 19–20, 2021, Proceedings, volume
12840, page 171. Springer Nature.
Yassin, G. I. and Ramaswamy, L. (2022). Effective & ef-
ficient access control in smart farms: Opportunities,
challenges & potential approaches. ICISSP, pages
445–452.
Yassin, G. I. and Ramaswamy, L. (2023). Harvesting secu-
rity: A semantically enriched access control architec-
ture for smart farms. In 2023 5th IEEE International
Conference on Trust, Privacy and Security in Intelli-
gent Systems and Applications (TPS-ISA), pages 335–
343. IEEE.
Zhou, L., Su, C., Li, Z., Liu, Z., and Hancke, G. P. (2019).
Automatic fine-grained access control in scada by ma-
chine learning. Future Generation Computer Systems,
93:548–559.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
94