Centralized, Distributed, and Everything in between: Reviewing Access Control Solutions for the loT

被引:25
作者
Drame-Maigne, Sophie [1 ,2 ]
Laurent, Maryline [2 ]
Castillo, Laurent [1 ]
Ganem, Herve
机构
[1] Gemalto SA, 6 Rue Verrerie, F-92190 Meudon, France
[2] SAMOVAR, Telecom SudParis, CNRS, 9 Rue Charles Fourier, F-91011 Evry, France
关键词
Access control; Internet of Things; IoT; security; survey; CONTROL SCHEME; INTERNET; BLOCKCHAIN; SECURITY; THINGS; IOT; PRIVACY; CHALLENGES; MANAGEMENT; TRUST;
D O I
10.1145/3465170
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging loT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies loT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.
引用
收藏
页数:34
相关论文
共 96 条
[1]  
Abdallah AE, 2005, INT FED INFO PROC, V173, P233
[2]   ControlChain: A new stage on the IoT access control authorization [J].
Ahlert Pinno, Otto Julio ;
Abed Gregio, Andre Ricardo ;
De Bona, Luis C. E. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (12)
[3]   A Lazy Approach to Access Control as a Service (ACaaS) for IoT [J].
Ahmad, Tahir ;
Morelli, Umberto ;
Ranise, Silvio ;
Zannone, Nicola .
SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, :235-246
[4]   CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY [J].
AKL, SG ;
TAYLOR, PD .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1983, 1 (03) :239-248
[5]  
American National Standard for Information Technology, 2013, 4992013 INCITS AM NA
[6]  
American National Standard for Information Technology, 2016, 526 INCITS AM NAT ST
[7]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[8]  
Anggorojati B., 2012, 2012 15th International Symposium on Wireless Personal Multimedia Communications (WPMC 2012), P604
[9]  
[Anonymous], 2015, 7519 RFC
[10]  
[Anonymous], 2001, 3198 RFC