A proposal of a distributed access control over Fog computing: the ITS use case

被引:0
|
作者
Riabi, Imen [1 ]
Kaffel-Ben Ayed, Hella [1 ]
Saidane, Leila Azzouz [1 ]
机构
[1] Univ Manouba, ENSI, Natl Sch Comp Sci, CRISTAL LAB, Manouba, Tunisia
来源
2017 INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS (PEMWN) | 2017年
关键词
Internet of Things; Access control; Fog computing; Intelligent Transport System; DHT; INTERNET; THINGS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.
引用
收藏
页数:7
相关论文
共 50 条
  • [31] Verifiable access control scheme based on unpaired CP-ABE in fog computing
    Dong J.
    Yan P.
    Du R.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 139 - 150
  • [32] A Secure and Trusted Fog Computing Approach based on Blockchain and Identity Federation for a Granular Access Control in IoT Environments
    El Haddouti, Samia
    Ech-Cherif El Kettani, Mohamed Dafir
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (03) : 575 - 584
  • [33] Adaptive time-bound access control for internet of things in fog computing architecture
    AboDoma N.
    Shaaban E.
    Mostafa A.
    International Journal of Computers and Applications, 2022, 44 (08) : 779 - 790
  • [34] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [35] Access Control Method using Electrocardiogram Signal for Fog Computing Security
    Kim, Jin Su
    Kim, Min Gu
    Lee, Myung-Won
    Pan, Sung Bum
    PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1772 - 1777
  • [36] Fog Computing over Challenged Networks: a Real Case Evaluation
    Castellano, Gabriele
    Risso, Fulvio
    Loti, Riccardo
    2018 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2018,
  • [37] A Case Study of Edge Computing Implementations: Multi-access Edge Computing, Fog Computing and Cloudlet
    Tian L.
    Zhong X.
    Journal of Computing and Information Technology, 2022, 30 (03) : 139 - 159
  • [38] Access Control Method in Distributed Grid Computing Networks
    Konoplev, A. S.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2015, 49 (08) : 679 - 683
  • [39] Distributed Fog Computing Based on Batched Sparse Codes for Industrial Control
    Yue, Jing
    Xiao, Ming
    Pang, Zhibo
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (10) : 4683 - 4691
  • [40] Evaluation of table-based access control in IoT data distribution method using fog computing
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    IEICE COMMUNICATIONS EXPRESS, 2021, 10 (10): : 822 - 827