LP-SBA-XACML: Lightweight Semantics Based Scheme Enabling Intelligent Behavior-Aware Privacy for IoT

被引:16
作者
Chehab, Mohamad [1 ]
Mourad, Azzam [1 ]
机构
[1] Lebanese Amer Univ, Dept Comp Sci & Math, Beirut, Lebanon
关键词
Privacy; Internet of Things; Data privacy; Authorization; Performance evaluation; Machine learning; deep learning; access control; customized user privacy; behavior based privacy; IoT; XACML; limited resource devices; INTERNET; SECURITY; WEB;
D O I
10.1109/TDSC.2020.2999866
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The broad applicability of Internet of Things (IoT) would truly enable the pervasiveness of smart devices for sensing data. In this context, achieving service personalization requires collecting sensitive data about users. That yields to privacy concerns due to the possibility of abusing the data through unauthorized access. Moreover, IoT devices have limited computing resources, making them difficult to perform heavy protection mechanisms. Despite several existing solutions for privacy protection, they were not designed to run on limited resources in large scale environment. In addition, existing access control solutions, including XACML, are heavy to run on resource constraint devices and lack behavior-based customization of user privacy where users have little to no control over their private data. In this regard, we address the aforementioned problems by proposing LP-SBA-XACML, which embeds an efficient and lightweight semantics-based scheme targeting user privacy and providing efficient policy evaluation. LP-SBA-XACML is a scalable and lightweight solution suitable for the IoT context while preserving the assumptions of XACML. Moreover, an intelligent model for real-time behavior/activity prediction is integrated to systematically customize user's privacy and services. Experiments conducted on synthetic and real-life scenarios demonstrate the feasibility and relevance of our proposed framework within a mobile IoT resource-constrained environment.
引用
收藏
页码:161 / 175
页数:15
相关论文
共 50 条
[31]   A High-level Aspect-oriented-based Framework for Software Security Hardening [J].
Mourad, Azzam ;
Laverdiere, Marc-Andre ;
Debbabi, Mourad .
INFORMATION SECURITY JOURNAL, 2008, 17 (02) :56-74
[32]   SBA-XACML: Set-based approach providing efficient policy decision process for accessing Web services [J].
Mourad, Azzam ;
Jebbaoui, Hussein .
EXPERT SYSTEMS WITH APPLICATIONS, 2015, 42 (01) :165-178
[33]  
Nguyen Phong Hoang, 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT), P517, DOI 10.1109/ICACT.2015.7224918
[34]  
Oasis eXtensible access control markup language(XACML), 30 OASIS
[35]  
Oleshchuk Vladimir, 2009, Proceedings 2009 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), P336, DOI 10.1109/WIRELESSVITAE.2009.5172470
[36]   Predicting travel mode of individuals by machine learning [J].
Omrani, Hichem .
18TH EURO WORKING GROUP ON TRANSPORTATION, EWGT 2015, 2015, 10 :840-849
[37]  
Pedregosa F, 2011, J MACH LEARN RES, V12, P2825
[38]  
Rao P, 2009, SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P63, DOI 10.1145/1542207.1542218
[39]   Adaptive risk-aware access control model for Internet of Things [J].
Rath, Annanda Thavymony ;
Colin, Jean-Noel .
2017 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2017), 2017, :40-49
[40]   Pareto Optimal Security Resource Allocation for Internet of Things [J].
Rullo, Antonino ;
Midi, Daniele ;
Serra, Edoardo ;
Bertino, Elisa .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2017, 20 (04)