Towards Fine-Grained Access Control in Enterprise-Scale Internet-of-Things

被引:11
作者
Zhou, Qian [1 ]
Elbadry, Mohammed [1 ]
Ye, Fan [1 ]
Yang, Yuanyuan [1 ]
机构
[1] SUNY Stony Brook, Elect & Comp Engn, Stony Brook, NY 11794 USA
基金
美国国家科学基金会;
关键词
Access control; Permission; Mobile computing; Computer architecture; Public key; Robustness; Internet of Things; security; access control;
D O I
10.1109/TMC.2020.2984700
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Scalable, fine-grained access control for Internet-of-Things is needed in enterprise environments, where tens of thousands of users need to access smart objects which have a similar or larger order of magnitude. Existing solutions offer all-or-nothing access, or require all access to go through a cloud backend, greatly impeding access granularity, robustness and scale. In this paper, we propose Heracles, an IoT access control system which achieves robust, fine-grained access control and responsive execution at enterprise scale. Heracles adopts a capability-based approach using secure, unforgeable tokens that describe the authorizations of users, to either individuals or collections of objects in single or bulk operations. It has a 3-tier architecture to provide centralized policy and distributed execution desired in enterprise environments. Extensive analysis and performance evaluation on a testbed prove that Heracles achieves fine-grained access control and responsive execution at enterprise scale. Compared with systems using access control list, Heracles eliminates or reduces by 10x-100x the updating overhead under frequent changes of subject memberships and policies. Besides, Heracles achieves responsive execution: it takes 0.57 second to access 18 objects which are scattered 1-9 hops away, and execution on a 1-hop or 2-hop object needs only 0.07 or 0.13 second respectively.
引用
收藏
页码:2701 / 2714
页数:14
相关论文
共 28 条
[1]  
Amazon,, 2015, AWS IOT DEV GUID
[2]  
[Anonymous], 2012, 9 F USENIX G S NETWO
[3]  
[Anonymous], HomeKit
[4]  
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[5]  
Blake-Wilson S., 2006, RFC 4492 (Informational)
[6]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[7]  
Greenough J, 2015, BUSINESS INTELL REP
[8]   A capability-based security approach to manage access control in the Internet of Things [J].
Gusmeroli, Sergio ;
Piccione, Salvatore ;
Rotondi, Domenico .
MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) :1189-1205
[9]  
Hern��ndez-Ramos J.L., 2013, Journal of Internet Services and Information Security, V3, P1
[10]  
Hoque A.K.M.M., 2013, P ACM ICN HONG KONG, P15