Distributed Configuration, Authorization and Management in the Cloud-based Internet of Things

被引:18
作者
Henze, Martin [1 ]
Wolters, Benedikt [1 ]
Matzutt, Roman [1 ]
Zimmermann, Torsten [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Commun & Distributed Syst, Aachen, Germany
来源
2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS | 2017年
关键词
D O I
10.1109/Trustcom/BigDataSE/ICESS.2017.236
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential data to a malicious cloud provider being able to physically control safety-critical devices. To overcome these concerns, we present D-CAM, which enables secure and distributed configuration, authorization, and management across network borders in the cloud-based Internet of Things. With D-CAM, we constrain the cloud to act as highly available and scalable storage for control messages. Consequently, we achieve reliable network control across network borders and strong security guarantees. Our evaluation confirms that D-CAM adds only a modest overhead and can scale to large networks.
引用
收藏
页码:185 / 192
页数:8
相关论文
共 32 条
[1]  
Accorsi R., 2010, EUROPKI
[2]  
Ali M., 2016, TECH REP
[3]  
Atzori L., 2010, COMPUTER NETWORKS, V54
[4]  
Barker E., 2012, NIST SPECIAL PUBLICA, V800-57
[5]  
Botta A., 2016, FGCS, V56
[6]  
Eyal I., 2016, USENIX NSDI
[7]  
Goldreich O., 2004, Basic Applications
[8]  
Greenberg A., 2015, How the Internet of Things Got Hacked
[9]  
Haerick w., 2015, 5G-PPP White Paper
[10]  
Henze M., 2014, FICLOUD