Access Control Models for Virtual Object Communication in Cloud-Enabled IoT

被引:40
作者
Alshehri, Asma [1 ]
Sandhu, Ravi
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, One UTSA Circle, San Antonio, TX 78249 USA
来源
2017 IEEE 18TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI 2017) | 2017年
关键词
Security; Access Control; Internet of Things; Devices; Virtual Objects; ACL; RBAC: ABAC; INTERNET; THINGS; CHALLENGES;
D O I
10.1109/IRI.2017.60
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is the latest evolution of the Internet, encompassing an enormous number of connected physical "things." The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. A central aspect of ACO is to control communication among VOs. This paper develops operational and administrative access control models for this purpose, assuming topic-based publish-subscribe interaction among VOs. Operational models are developed using (i) access control lists for topics and capabilities for virtual objects and (ii) attribute-based access control, and it is argued that role-based access control is not suitable for this purpose. Administrative models for these two operational models are developed using (i) access control lists, (ii) role-based access control, and (iii) attribute-based access control. A use case illustrates the details of these access control models for VO communication, and their differences. An assessment of these models with respect to security and privacy preserving objectives of IoT is also provided.
引用
收藏
页码:16 / 25
页数:10
相关论文
共 24 条
  • [1] Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
    Al-Fuqaha, Ala
    Guizani, Mohsen
    Mohammadi, Mehdi
    Aledhari, Mohammed
    Ayyash, Moussa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2347 - 2376
  • [2] Alshehri A, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P530, DOI [10.1109/CIC.2016.081, 10.1109/CIC.2016.79]
  • [3] On the Relationship Between Finite Domain ABAM and PreUCONA
    Alshehri, Asma
    Sandhu, Ravi
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 333 - 346
  • [4] Amazon Web Services, 2017, AWS IOT PLATF WORKS
  • [5] Bacon Jean., 2008, P 2 INT C DISTRIBUTE, P23, DOI DOI 10.1145/1385989.1385993
  • [6] On the Integration of Cloud Computing and Internet of Things
    Botta, Alessio
    de Donato, Walter
    Persico, Valerio
    Pescape, Antonio
    [J]. 2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 23 - 30
  • [7] The many faces of publish/subscribe
    Eugster, PT
    Felber, PA
    Guerraoui, R
    Kermarrec, AM
    [J]. ACM COMPUTING SURVEYS, 2003, 35 (02) : 114 - 131
  • [8] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [9] Gong L., 1989, Proceedings 1989 IEEE Symposium on Security and Privacy (Cat. No.89CH2703-7), P56, DOI 10.1109/SECPRI.1989.36277
  • [10] Internet of Things (IoT): A vision, architectural elements, and future directions
    Gubbi, Jayavardhana
    Buyya, Rajkumar
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660