Multi-view Web Services as a Key Security Layer in Internet of Things Architecture Within a Cloud Infrastructure

被引:0
|
作者
Misbah, Anass [1 ]
Ettalbi, Ahmed [1 ]
机构
[1] Mohammed V Univ Rabat, Rabat IT Ctr, ADMIR Lab, IMS Team,ENSIAS, Rabat, Morocco
来源
INNOVATIONS IN BIO-INSPIRED COMPUTING AND APPLICATIONS, IBICA 2017 | 2018年 / 735卷
关键词
Internet of Things; Cloud; Multi-view Web services; Security layer; WADL; Architecture; Restful;
D O I
10.1007/978-3-319-76354-5_26
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Connected objects are more and more commonly used within different type of organizations in order to collect, summarize and process data of diverse terminals and devices; this concept is called Internet of Things (IoT). One of the major concerns of IoT architectures is the security. In fact, the concept of gathering data from a large variety of objects brought a lot of capabilities and functionalities in terms of decision making, flexibility and improved services. However, it brought also several security issues such as Authentication, Confidentiality and Integrity. In this work we are proposing a new approach of security implementation in IoT architectures; this approach is based on our previous work regarding Multi-view Web services and makes use of the previously proposed mechanisms of dealing with end users needs and access rights. The proposed architecture consists of the introduction of a new security layer that will receive all kinds of messages and requests through the exposed Multi-view Web services, analyze the access rights and messages subscription of the requestor and the object and then relay the request to the appropriate object or service. This architecture can be implemented in a Cloud infrastructure so as to centralize operations, enhance reusability and reach a high level of availability.
引用
收藏
页码:288 / 297
页数:10
相关论文
共 48 条
  • [41] Unsupervised multi-view non-negative for law data feature learning with dual graph-regularization in smart Internet of Things
    Qiu, Xiru
    Chen, Zhikui
    Zhao, Liang
    Hu, Chengsheng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 523 - 530
  • [42] Evaluation of key performance indicators of Internet of Things and Cloud Computing for infrastructure projects in Gujarat, India through Consistent Fuzzy Preference Relations approach
    Solanki, Arpit
    Sarkar, Debasis
    Kapdi, Parth
    INTERNATIONAL JOURNAL OF CONSTRUCTION MANAGEMENT, 2024, 24 (07) : 707 - 721
  • [43] Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things
    Wu, Bin
    Wang, Caifen
    Yao, Hailong
    PLOS ONE, 2020, 15 (04):
  • [44] An operation site security detection method based on point cloud data and improved YOLO algorithm under the architecture of the power internet of things
    Yang, Shibo
    Wang, Yu
    Guo, Shuai
    Feng, Shijie
    JOURNAL OF ENGINEERING-JOE, 2024, 2024 (01):
  • [45] Cluster Based Multi Layer User Authentication Data Center Storage Architecture for Big Data Security in Cloud Computing
    Ramasamy, S.
    Gnanamurthy, R. K.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (01): : 159 - 171
  • [46] A security-enhanced authentication scheme for quantum-key-distribution (QKD) enabled Internet of vehicles in multi-cloud environment
    Yang, Ze
    Shi, Qin
    Cheng, Teng
    Wang, Xunji
    Zhang, Rutong
    Yu, Lin
    VEHICULAR COMMUNICATIONS, 2024, 48
  • [47] An advanced deep reinforcement learning algorithm for three-layer D2D-edge-cloud computing architecture for efficient task offloading in the Internet of Things
    Moghaddasi, Komeil
    Rajabi, Shakiba
    Gharehchopogh, Farhad Soleimanian
    Ghaffari, Ali
    SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS, 2024, 43
  • [48] S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within Web Services environments
    Pinzon, Cristian I.
    Bajo, Javier
    De Paz, Juan F.
    Corchado, Juan M.
    EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) : 5486 - 5499