A proposal of a distributed access control over Fog computing: the ITS use case

被引:0
|
作者
Riabi, Imen [1 ]
Kaffel-Ben Ayed, Hella [1 ]
Saidane, Leila Azzouz [1 ]
机构
[1] Univ Manouba, ENSI, Natl Sch Comp Sci, CRISTAL LAB, Manouba, Tunisia
来源
2017 INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS (PEMWN) | 2017年
关键词
Internet of Things; Access control; Fog computing; Intelligent Transport System; DHT; INTERNET; THINGS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang Yang
    Ximeng Liu
    Wenzhong Guo
    Xianghan Zheng
    Chen Dong
    Zhiquan Liu
    Multimedia Tools and Applications, 2020, 79 : 10701 - 10716
  • [22] Multimedia access control with secure provenance in fog-cloud computing networks
    Yang, Yang
    Liu, Ximeng
    Guo, Wenzhong
    Zheng, Xianghan
    Dong, Chen
    Liu, Zhiquan
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10701 - 10716
  • [23] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [24] An efficient access control scheme with outsourcing capability and attribute update for fog computing
    Zhang, Peng
    Chen, Zehong
    Liu, Joseph K.
    Liang, Kaitai
    Liu, Hongwei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 753 - 762
  • [25] A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing
    Fan, Kai
    Wang, Junxiong
    Wang, Xin
    Li, Hui
    Yang, Yintang
    SENSORS, 2017, 17 (07)
  • [26] Novel lightweight and fine-grained fast access control using RNS properties in fog computing
    Alizadeh, Mohammad Ali
    Jafarali Jassbi, Somayyeh
    Khademzadeh, Ahmad
    Haghparast, Majid
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 3799 - 3817
  • [27] Analysis of Security Access Control Systems in Fog Computing Environment
    Zhang J.
    Journal of Cyber Security and Mobility, 2023, 12 (05): : 653 - 674
  • [28] Access Control System for Distributed Computing Networks
    Konoplev, A. S.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 664 - 668
  • [29] Adaptive context-aware access control for IoT environments leveraging fog computing
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    Salehi Shahraki, Ahmad
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 3089 - 3107
  • [30] Reach on Access Control Technology of Geomagnetic Observation Network System Based on Fog Computing
    Sun, Luqiang
    Liu, Lei
    Ma, Chaoqun
    Zhu, Hong
    2024 2ND INTERNATIONAL CONFERENCE ON MOBILE INTERNET, CLOUD COMPUTING AND INFORMATION SECURITY, MICCIS 2024, 2024, : 215 - 220