Investigation of Access Control for Internet of Things: Service-Level Role-Based Access Control

被引:1
|
作者
Janardhanan, Janani [1 ]
Sharbaf, Mehrdad S. [1 ]
机构
[1] Calif State Univ Dominguez Hills, Dept Comp Sci, Los Angeles, CA USA
来源
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI) | 2017年
关键词
Security; Access Control; CoAP; Encryption; IoT; Authentication and Authorization;
D O I
10.1109/CSCI.2017.229
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Internet of Things (IoT) is basically a system of interrelated computing devices on a network which perform data collection and exchange of real world properties. The major developments witnessed in IoT are mainly within companies, industries, a home environment etc. To increase the scalability of IoT, various security concerns need to be overcome. IoT devices are mostly resource constrained. Complicated network produces potential vulnerabilities referred to heterogeneous devices, sensors and backend systems. So, to realize the dream of internet of things, security is to be ensured for device to device communication. Though IoT has security mechanisms at the network and device level through identification management, it is safer to have a per-service level specific access control based on the "Roles of Things" to attribute for confidentiality and Integrity. This paper presents the current security practices and puts forth the future scope of improvement in fine tuning service level access control.
引用
收藏
页码:1315 / 1319
页数:5
相关论文
共 50 条
  • [21] A Role-Based Workflow Access Control Model
    Zhang Wen-dong
    Zhang Kai-ji
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 1136 - 1139
  • [22] A novel approach for role-based access control
    Yang Geng
    Rong Chunming
    Shen Jiangang
    Wang Jiangtao
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01): : 1 - 6
  • [23] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
    Wang, Man
    Mayo, Jean
    Shene, Ching-Kuang
    Lake, Thomas
    Carr, Steve
    Wang, Chaoli
    ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
  • [24] Attribute-Role-Based Hybrid Access Control in the Internet of Things
    Sun, Kaiwen
    Yin, Lihua
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 333 - 343
  • [25] Blockchain-Based Access Control for the Internet of Things: A Survey
    Abdulrahman, Ebtihal
    Alshehri, Suhair
    Cherif, Asma
    2021 IEEE ASIA-PACIFIC CONFERENCE ON COMPUTER SCIENCE AND DATA ENGINEERING (CSDE), 2021,
  • [26] Machine Learning based Access Control Framework for the Internet of Things
    Outchakoucht, Aissam
    Abou El Kalam, Anas
    Es-Samaali, Hamza
    Benhadou, Siham
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (02) : 331 - 340
  • [27] A Survey on Access Control in the Age of Internet of Things
    Qiu, Jing
    Tian, Zhihong
    Du, Chunlai
    Zuo, Qi
    Su, Shen
    Fang, Binxing
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (06) : 4682 - 4696
  • [28] Survey on Internet of Things Access Control Security
    Liu Q.
    Jin Z.
    Chen C.
    Gao X.
    Zheng N.
    Fang Y.
    Feng Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2190 - 2211
  • [29] Parameterized Role-Based Access Control Policies for XML Documents
    Mueldner, Tomasz
    Leighton, Gregory
    Miziolek, Jan Krzysztof
    INFORMATION SECURITY JOURNAL, 2009, 18 (06): : 282 - 296
  • [30] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9