XSACd Cross-domain resource sharing & access control for smart environments

被引:10
|
作者
Fysarakis, Konstantinos [1 ]
Soultatos, Othonas [1 ]
Manifavas, Charalampos [2 ]
Papaefstathiou, Ioannis [1 ]
Askoxylakis, Ioannis [3 ]
机构
[1] Tech Univ Crete, Elect & Comp Engn Dept, Akrotiri Campus, Khania 73100, Crete, Greece
[2] Rochester Inst Technol, Elect Engn & Comp Sci Dept, Techno Point Bldg, Silicon Oasis, Dubai, U Arab Emirates
[3] Fdn Res & Technol Hellas FORTH, Inst Comp Sci, Iraklion 70013, Crete, Greece
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2018年 / 80卷
基金
欧盟地平线“2020”;
关键词
Access control; Authorization; Web Services; Service-oriented architectures; Ubiquitous computing; HOME; MANAGEMENT; FRAMEWORK; INTERNET; DEVICES;
D O I
10.1016/j.future.2016.05.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a "smart home". However, the direct interaction smart devices often have with the physical world, along with the processing, storage and communication of data pertaining to users' lives, i.e. private sensitive in nature, bring security concerns into the limelight. The resource-constraints of the platforms being integrated into a smart home environment, and their heterogeneity in hardware, network and overlaying technologies, only exacerbate the above issues. This paper presents XSACd, a cross-domain resource sharing & access control framework for smart environments, combining the well-studied fine-grained access control provided by the eXtensible Access Control Markup Language (XACML) with the benefits of Service Oriented Architectures, through the use of the Devices Profile for Web Services (DPWS). Based on standardized technologies, it enables seamless interactions and fine-grained policy-based management of heterogeneous smart devices, including support for communication between distributed networks, via the associated MQ Telemetry Transport protocol (MQTT) based proxies. The framework is implemented in full, and its performance is evaluated on a test bed featuring relatively resource-constrained smart platforms and embedded devices, verifying the feasibility of the proposed approach. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:572 / 582
页数:11
相关论文
共 50 条
  • [1] DACP: Enforcing a dynamic access control policy in cross-domain environments
    Salehi, Ahmad S.
    Han, Runchao
    Rudolph, Carsten
    Grobler, Marthie
    COMPUTER NETWORKS, 2023, 237
  • [2] Lark: Verified Cross-Domain Access Control for Trusted Execution Environments
    Zeng, Fanlang
    Zhang, Zhuoruo
    Chang, Rui
    Yu, Chenyang
    Zhang, Zijun
    Zhao, Yongwang
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 160 - 171
  • [3] An access control model for data security sharing cross-domain in consortium blockchain
    Liu Y.
    Yang W.
    Wang Y.
    IET Blockchain, 2023, 3 (01): : 18 - 34
  • [4] Cross-Domain Access Control in a Military SOA
    Nordbotten, Nils Agne
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 448 - 455
  • [5] Blockchain-based cross-domain authorization system for user-centric resource sharing
    Ezawa, Yuki
    Kakei, Shohei
    Shiraishi, Yoshiaki
    Mohri, Masami
    Morii, Masakatu
    BLOCKCHAIN-RESEARCH AND APPLICATIONS, 2023, 4 (02):
  • [6] A Blockchain-Based IoT Cross-Domain Delegation Access Control Method
    Li, Chao
    Li, Fan
    Yin, Lihua
    Luo, Tianjie
    Wang, Bin
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021 (2021)
  • [7] Cross-domain dynamic access control based on "blockchain plus artificial intelligence"
    Wang, Fengling
    Hu, Zhenlong
    Wang, Han
    Chen, Xingji
    Feng, Weigong
    NEURAL COMPUTING & APPLICATIONS, 2023, 35 (35) : 24575 - 24585
  • [8] The Research of Cross-Domain Access Control Based on Attribute Mapping
    Mu, Ling-ling
    Gao, Yan-yan
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 95 - 100
  • [9] A Cross-Domain Access Control Model Based on Trust Measurement
    YANG Xiaohui
    WANG Hong
    WuhanUniversityJournalofNaturalSciences, 2016, 21 (01) : 21 - 28
  • [10] Cross-Domain Access Control Model in Industrial IoT Environment
    Zhang, Zhen
    Wu, Xu
    Wei, Shuang
    APPLIED SCIENCES-BASEL, 2023, 13 (08):