Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure

被引:0
|
作者
Misbah, Anass [1 ]
Ettalbi, Ahmed [1 ]
机构
[1] Mohammed V Univ Rabat, Rabat IT Ctr, ADMIR Lab, IMS Team,ENSIAS, Rabat, Morocco
来源
INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017 | 2018年 / 735卷
关键词
Internet of Things; Cloud; Multi-view Web services; Security layer; WADL; Architecture; Restful;
D O I
10.1007/978-3-319-76354-5_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected objects are more and more commonly used within different type of organizations in order to collect, summarize and process data of diverse terminals and devices; this concept is called Internet of Things (IoT). One of the major concerns of IoT architectures is the security. In fact, the concept of gathering data from a large variety of objects brought a lot of capabilities and functionalities in terms of decision making, flexibility and improved services. However, it brought also several security issues such as Authentication, Confidentiality and Integrity. In this work we are proposing a new approach of security implementation in IoT architectures; this approach is based on our previous work regarding Multi-view Web services and makes use of the previously proposed mechanisms of dealing with end users needs and access rights. The proposed architecture consists of the introduction of a new security layer that will receive all kinds of messages and requests through the exposed Multi-view Web services, analyze the access rights and messages subscription of the requestor and the object and then relay the request to the appropriate object or service. This architecture can be implemented in a Cloud infrastructure so as to centralize operations, enhance reusability and reach a high level of availability.
引用
收藏
页码:288 / 297
页数:10
相关论文
共 48 条
  • [1] Internet of Things: Infrastructure, Architecture, Security and Privacy
    Alansari, Zainab
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Belgaum, Mohammad Riyaz
    Alshaer, Jawdat
    Soomro, Safeeullah
    Miraz, Mahdi H.
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 150 - 155
  • [2] Mobile web and cloud services enabling Internet of Things
    Satish Narayana Srirama
    CSI Transactions on ICT, 2017, 5 (1) : 109 - 117
  • [3] Multi-Layer Blockchain-Based Security Architecture for Internet of Things
    Honar Pajooh, Houshyar
    Rashid, Mohammad
    Alam, Fakhrul
    Demidenko, Serge
    SENSORS, 2021, 21 (03) : 1 - 26
  • [4] Security Provisioning for RESTful web services in Internet of Things
    Nakhuva, Bhumi N.
    Champaneria, Tushar A.
    2017 4TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION SYSTEMS (ICACCS), 2017,
  • [5] A Security Framework for the Internet of Things based on Public Key Infrastructure
    Ning, Hong
    CONSTRUCTION AND URBAN PLANNING, PTS 1-4, 2013, 671-674 : 3223 - 3226
  • [6] Applying Security to a Big Stream Cloud Architecture for the Internet of Things
    Belli, Laura
    Cirani, Simone
    Davoli, Luca
    Ferrari, Gianluigi
    Melegari, Lorenzo
    Picone, Marco
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2016, 7 (01) : 37 - 58
  • [7] A Multi-layer Security Model for Internet of Things
    Yang, Xue
    Li, Zhihua
    Geng, Zhenmin
    Zhang, Haitao
    INTERNET OF THINGS-BK, 2012, 312 : 388 - 393
  • [8] Physical Layer Security for the Internet of Things: Authentication and Key Generation
    Zhang, Junqing
    Rajendran, Sekhar
    Sun, Zhi
    Woods, Roger
    Hanzo, Lajos
    IEEE WIRELESS COMMUNICATIONS, 2019, 26 (05) : 92 - 98
  • [9] Smart Home: Integrating Internet of Things with Web Services and Cloud Computing
    Soliman, Moataz
    Abiodun, Tobi
    Hamouda, Tarek
    Zhou, Jiehan
    Lung, Chung-Horng
    2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 317 - 320
  • [10] A multi-layer multi-view architecture for software engineering environments
    Kempkens, R
    Rösch, P
    Scott, L
    Zettel, J
    INFORMATION AND SOFTWARE TECHNOLOGY, 2000, 42 (02) : 141 - 149