SACP: Secure Access Control Protocol

被引:2
作者
Ben Daoud, Wided [1 ]
Rekik, Malek [1 ]
Meddeb-Makhlouf, Amel [1 ]
Zarai, Faouzi [1 ]
Mahfoudhi, Sami [2 ]
机构
[1] Univ Sfax, NTSCom Res Unit, ENETCOM, Sfax, Tunisia
[2] Qassim Univ Buraidah, Dept MIS, CBE, Al Qassim, Saudi Arabia
来源
IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC) | 2021年
关键词
Security; Privacy; cryptography; Fog computing; IoT network; Access control; Trust; Resource Management;
D O I
10.1109/IWCMC51323.2021.9498880
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, there are large amount of data generated by the IoT objects. For that, big data and Cloud and Fog Computing technologies have become increasingly important. Unfortunately, these environments still present many difficulties. And according to the statistics, we note that the major percentages of attacks come mainly from end users. Hence, we need an access control system. So, we focus our work on user access control. In fact, our contribution in this paper is mainly focused on securing user access to Fog Computing networks. For this, we propose, an efficient and complete protocol for access control service, which based on the trust assessment and the monitoring of the user's activities. Afterwards, we aim to improve our protocol by integrating the concept of certificates. We have shown through analysis studies and simulation results that the proposed scheme provides both security requirements in terms of confidentiality, integrity, availability, and anonymity; and network performance in terms of access response latency.
引用
收藏
页码:935 / 941
页数:7
相关论文
共 22 条
[1]   A two-way trust management system for fog computing [J].
Alemneh, Esubalew ;
Senouci, Sidi-Mohammed ;
Brunet, Philippi ;
Tegegne, Tesf .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 106 :206-220
[2]  
Ali A., 2021, ARCH COMPUT METHODS
[3]   A clogging resistant secure authentication scheme for fog computing services [J].
Ali, Zeeshan ;
Chaudhry, Shehzad Ashraf ;
Mahmood, Khalid ;
Garg, Sahil ;
Lv, Zhihan ;
Bin Zikria, Yousaf .
COMPUTER NETWORKS, 2021, 185
[4]   An Attribute-Based Encryption Scheme to Secure Fog Communications [J].
Alrawais, Arwa ;
Alhothaily, Abdulrahman ;
Hu, Chunqiang ;
Xing, Xiaoshuang ;
Cheng, Xiuzhen .
IEEE ACCESS, 2017, 5 :9131-9138
[5]  
[Anonymous], 2018, 23203 3GPP TS
[6]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[7]  
Basin D., 2003, SECURITY PROTOCOL AN, P253
[8]   TACRM: trust access control and resource management mechanism in fog computing [J].
Ben Daoud, Wided ;
Obaidat, Mohammad S. ;
Meddeb-Makhlouf, Amel ;
Zarai, Faouzi ;
Hsiao, Kuei-Fang .
HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2019, 9 (01)
[9]  
Ben Daoud W, 2018, INT WIREL COMMUN, P530, DOI 10.1109/IWCMC.2018.8450466
[10]  
Daoud WB, 2018, 15 INT JOINT C E BUS, P296