Context-Aware Adaptive Remote Access for IoT Applications

被引:16
作者
Arfaoui, Amel [1 ,2 ]
Cherkaoui, Soumaya [3 ]
Kribeche, Ali [2 ]
Senouci, Sidi Mohammed [2 ]
机构
[1] SupCom Univ Carthage, Digital Secur Unit, Ariana, Tunisia
[2] Univ Bourgogne Franche Comte, DRIVE EA1859, F-58000 Nevers, France
[3] Univ Sherbrooke, INTERLAB Res Lab, Sherbrooke, PQ, Canada
关键词
Adaptive authorization; attribute-based encryption; context-aware remote access; Internet of Things (IoT); INTERNET; THINGS;
D O I
10.1109/JIOT.2019.2953144
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of communication networking, ubiquitous sensing, and signal processing has spurred the emergence of the Internet of Things (IoT) era. As a novel cutting-edge technology, the IoT enables a plethora of smart-devices equipped with diverse computing, sensing, and actuation capabilities to be connected to the Internet. Thus, it promises to provide a revolutionary and fully connected "smart" world while greatly developing economies and enhancing the quality of life. IoT is indeed an emergent global phenomenon, where real-time remote access to data and applications opens new unprecedented opportunities for ubiquitous monitoring and managing. In such dynamic, interconnected, and heterogeneous environment where the context conditions (location, time, situation sensitivity, etc.) are continuously and frequently changing, context-aware and adaptive solutions for data access are required to respond to the applications' needs. Nevertheless, until now, no schemes provide concrete context-aware access control mechanisms in IoT. In this article, we design a novel context-aware attribute-based access control (CAABAC) that considers the dynamic context changes. The proposed approach incorporates the contextual information with the ciphertext-policy attribute-based encryption (CP-ABE) to guarantee adaptive contextual access to data. The extensive analysis and simulations prove both the effectiveness and efficiency of the proposed scheme. Specifically, context-aware and adaptive remote access is enabled while outperforming other benchmarked schemes in terms of storage, communication, and computational cost.
引用
收藏
页码:786 / 799
页数:14
相关论文
共 34 条
[1]   On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC) [J].
Almehmadi, Abdulaziz ;
El-Khatib, Khalil .
IEEE SYSTEMS JOURNAL, 2017, 11 (02) :373-384
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], [No title captured]
[5]  
[Anonymous], 2017, Proceedings International Radar Symposium
[6]  
Arfaoui A., 2018, PROC IEEE INT C COMM, P1
[7]  
Ashibani Y K., 2017, IEEE Publications. 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), P1, DOI DOI 10.1109/CCECE.2017.7946657
[8]   Big Data Meet Cyber-Physical Systems: A Panoramic Survey [J].
Atat, Rachad ;
Liu, Lingjia ;
Wu, Jinsong ;
Li, Guangyu ;
Ye, Chunxuan ;
Yi, Yang .
IEEE ACCESS, 2018, 6 :73603-73636
[9]   Convergence of MANET and WSN in IoT Urban Scenarios [J].
Bellavista, Paolo ;
Cardone, Giuseppe ;
Corradi, Antonio ;
Foschini, Luca .
IEEE SENSORS JOURNAL, 2013, 13 (10) :3558-3567
[10]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+