An extended Attribute-based access control with controlled delegation in IoT

被引:4
作者
Tegane, Saher [1 ]
Semchedine, Fouzi [2 ]
Boudries, Abdelmalek [3 ]
机构
[1] Bejaia Univ, Fac Exact Sci, Bejaia, Algeria
[2] Ferhat Abbas Univ, Inst Opt & Precis Mech, Setif, Algeria
[3] Bejaia Univ, Fac Econ Business & Management, Commercial Sci Dept, Lab LMA, Bejaia, Algeria
关键词
Internet of things (IoTs); Access control; Capability based access control (CapBAC); Attribute-based signatures; Delegation; BLOCKCHAIN; SECURE;
D O I
10.1016/j.jisa.2023.103473
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is one of the main concerns for securing the Internet of Things (IoT) due to its inherent features. It is particularly challenging to manage access policies and authorization (rights) propagation in a highly dynamic and scalable environment with a potentially unbound number of connected objects. This paper proposes an Attribute-Capability-Based Access Control (ACapBAC) system for the IoT. ACapBAC enables flexible and dynamic access control with fine-grained controlled delegation. The reliability of the proposed solution is highlighted through both efficiency and security analysis.
引用
收藏
页数:11
相关论文
共 48 条
  • [11] Dorri Ali, 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), P618, DOI 10.1109/PERCOMW.2017.7917634
  • [12] Hierarchical Attribute-Based Signatures
    Dragan, Constantin-Catalin
    Gardham, Daniel
    Manulis, Mark
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2018, 2018, 11124 : 213 - 234
  • [13] Fortified-Chain: A Blockchain-Based Framework for Security and Privacy-Assured Internet of Medical Things With Effective Access Control
    Egala, Bhaskara S.
    Pradhan, Ashok K.
    Badarla, Venkataramana
    Mohanty, Saraju P.
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (14) : 11717 - 11731
  • [14] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [15] Gagne Martin, 2012, Pairing-Based Cryptography - Pairing 2012. 5th International Conference. Revised Selected Papers, P295, DOI 10.1007/978-3-642-36334-4_19
  • [16] Gaurkar S, 2013, INT J SCI TECHNOL RE, V16, P63
  • [17] Gong L., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P56, DOI 10.1109/SECPRI.1989.36277
  • [18] Towards Activity-Centric Access Control for Smart Collaborative Ecosystems
    Gupta, Maanak
    Sandhu, Ravi
    [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 155 - 164
  • [19] A capability-based security approach to manage access control in the Internet of Things
    Gusmeroli, Sergio
    Piccione, Salvatore
    Rotondi, Domenico
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1189 - 1205
  • [20] Gyu Myoung Lee, 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC), P517, DOI 10.1109/ICTC.2010.5674788