Attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications

被引:0
作者
Gupta, B. B. [1 ]
Quamara, Megha [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Mirzapur Part 136119, Haryana, India
关键词
attribute; access control; authentication; authorisation; smart cards; cloud; internet of things; IoT; access control policy testing; ACPT; AVISPA; on-the-fly model checker; OFMC; SECURE; ATTACK;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With exploding growth in information technology (IT), numerous services and applications having enhanced capabilities are coming into picture with an aim to serve the users. Internet of things (IoT) along with its enabling cutting-edge technologies is establishing a scenario where these services can be utilised effectively. However, with large number of users and applications, it becomes challenging to safeguard the identifying information being transmitted to provide access to these services. This paper presents a refined version of an integrated attribute-based access control and authentication mechanism using smart cards for cloud-based IoT applications. System-wide attributes not only restrict the users to access the remote cloud services, but also ensure user anonymity. We also implement the proposed mechanism on ACPT and AVISPA tool for its validation and to verify its correctness. Moreover, we present an analysis of its security and performance efficiency on the basis of different parameters.
引用
收藏
页码:40 / 49
页数:10
相关论文
共 25 条
[1]   A light weight authentication protocol for IoT-enabled devices in distributed Cloud Computing environment [J].
Amin, Ruhul ;
Kumar, Neeraj ;
Biswas, G. P. ;
Iqbal, R. ;
Chang, Victor .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 :1005-1019
[2]   An IoT-Aware Architecture for Smart Healthcare Systems [J].
Catarinucci, Luca ;
de Donno, Danilo ;
Mainetti, Luca ;
Palano, Luca ;
Patrono, Luigi ;
Stefanizzi, Maria Laura ;
Tarricone, Luciano .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (06) :515-526
[3]   Situation-Aware IoT Service Coordination Using the Event-Driven SOA Paradigm [J].
Cheng, Bo ;
Zhu, Da ;
Zhao, Shuai ;
Chen, Junliang .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (02) :349-361
[4]   An integrated intelligent paradigm to detect DDoS attack in mobile ad hoc networks [J].
Devi, P. ;
Kannammal, A. .
INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2016, 8 (01) :69-77
[5]  
Gupta B., 2016, Handbook of research on modern cryptographic solutions for computer and cyber security
[6]  
Gupta B. B., 2018, Procedia Computer Science, V132, P189, DOI 10.1016/j.procs.2018.05.185
[7]  
Gupta B.B., 2018, Computer and cyber security: principles, algorithm, applications, and perspectives
[8]  
JeeHyun Hwang, 2010, Proceedings 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), P40, DOI 10.1109/POLICY.2010.22
[9]   A secure and scalable storage system for aggregate data in IoT [J].
Jiang, Hai ;
Shen, Feng ;
Chen, Su ;
Li, Kuan-Ching ;
Jeong, Young-Sik .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 :133-141
[10]   Design of a provably secure biometrics-based multi-cloud-server authentication scheme [J].
Kumari, Saru ;
Li, Xiong ;
Wu, Fan ;
Das, Ashok Kumar ;
Choo, Kim-Kwang Raymond ;
Shen, Jian .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 68 :320-330