A proposal of a distributed access control over Fog computing: the ITS use case

被引:0
|
作者
Riabi, Imen [1 ]
Kaffel-Ben Ayed, Hella [1 ]
Saidane, Leila Azzouz [1 ]
机构
[1] Univ Manouba, ENSI, Natl Sch Comp Sci, CRISTAL LAB, Manouba, Tunisia
来源
2017 INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS (PEMWN) | 2017年
关键词
Internet of Things; Access control; Fog computing; Intelligent Transport System; DHT; INTERNET; THINGS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.
引用
收藏
页数:7
相关论文
共 50 条
  • [41] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [42] Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things"
    Tan, Syh-Yuan
    IEEE ACCESS, 2018, 6 : 22464 - 22465
  • [43] Privacy-Preserving Access Control Using Dynamic Programming in Fog Computing
    Gai, Keke
    Qiu, Meikang
    Liu, Meiqin
    2018 IEEE 4TH INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), 4THIEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 3RD IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2018, : 126 - 132
  • [44] Distributed Trust Based Access Control Architecture for Pervasive Computing
    Javeed, M. Younas
    Nawaz, Sidra
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INFORMATION TECHNOLOGIES & APPLICATIONS (ICUT 2009), 2009, : 464 - 469
  • [45] An Improved Distributed Access Control Model in Cloud Computing by Blockchain
    Sabzmakan, Akram
    Mirtaheri, Seyedeh Leili
    2021 26TH INTERNATIONAL COMPUTER CONFERENCE, COMPUTER SOCIETY OF IRAN (CSICC), 2021,
  • [46] Access control for agent-based computing: a distributed approach
    Antonopoulos, N
    Koukoumpetsos, K
    Shafarenko, A
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2001, 11 (01): : 55 - 64
  • [47] Using the Pairing Function for Distributed Access Control in Cloud Computing
    Wan, Changsheng
    Zhang, Juan
    Zhou, Lin
    Qin, Zhongyuan
    ADVANCED TECHNOLOGIES IN MANUFACTURING, ENGINEERING AND MATERIALS, PTS 1-3, 2013, 774-776 : 1745 - +
  • [48] Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation
    Xu, Qian
    Tan, Chengxiang
    Fan, Zhijie
    Zhu, Wenye
    Xiao, Ya
    Cheng, Fujia
    SENSORS, 2018, 18 (05)
  • [49] Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Li, Yingjiu
    Zhang, Yinghui
    Xu, Guowen
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1064 - 1077
  • [50] Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing
    Xu, Shengmin
    Ning, Jianting
    Ma, Jinhua
    Huang, Xinyi
    Pang, Hwee Hwa
    Deng, Robert H.
    PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 143 - 154