Access Control Model for Google Cloud IoT

被引:30
作者
Gupta, Deepti [1 ]
Bhatt, Smriti [2 ]
Gupta, Maanak [3 ]
Kayode, Olumide [1 ]
Tosun, Ali Saman [1 ]
机构
[1] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78249 USA
[2] Texas A&M Univ, Dept Comp & Cyber Secur, San Antonio, TX 78224 USA
[3] Tennessee Technol Univ, Dept Comp Sci, Cookeville, TN 38505 USA
来源
2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS) | 2020年
关键词
Google Cloud Platform; Google Cloud IoT Core; Internet of Things; Attributes; Virtual Devices; Role-Based Access Control; Attribute-Based Access Control; CHALLENGES; INTERNET;
D O I
10.1109/BigDataSecurity-HPSC-IDS49724.2020.00044
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The prevalence of Internet of Things (IoT) is growing rapidly with increasing influence on our daily life. IoT has received considerable attention in both academia and industry recently and there has been significant studies on security and privacy aspects of IoT and cyber-physical systems. Researchers in academia have developed novel access control models and mechanisms for IoT. On the industry side, companies including cloud services providers like Microsoft, Amazon and Google have deployed Cloud-Enabled IoT Platforms to ensure wide scale adoption. However, there is a lack of consensus between formal IoT access control models proposed in the literature and real-world Cloud-Enabled IoT deployments. To bridge this gap, in this paper, we first study and develop a formal access control model of Google Cloud Platform, referred to as GCPAC model. We then extend the GCPAC model into a formal Google Cloud Platform IoT Access Control (GCP-IoTAC) model with IoT specific components. We demonstrate two dominant IoT scenarios - E-health use case, and smart home use case, using the GCP-IoT. We also highlight some of the limitations of the current access control capabilities of GCP-IoT and propose attribute-based extensions for fine-grained access control in GCP and its IoT platform. We envision that this contribution will help achieving consensus among formal IoT access control models and real-world Cloud-Enabled IoT Platforms.
引用
收藏
页码:198 / 208
页数:11
相关论文
共 30 条
[1]   A System for Semantic-Based Access Control [J].
Amato, Flora ;
Mazzocca, Nicola ;
De Pietro, Giuseppe ;
Esposito, Massimo .
2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, :442-446
[2]  
[Anonymous], 2003, ARTECH H COMP SEC LI
[3]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[4]  
Bhatt Smriti, 2019, 2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC), P241, DOI 10.1109/FMEC.2019.8795309
[5]   An Access Control Framework for Cloud-Enabled Wearable Internet of Things [J].
Bhatt, Smriti ;
Patwa, Farhan ;
Sandhu, Ravi .
2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, :328-338
[6]  
Bhatt S, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P37, DOI [10.1109/CIC.2016.17, 10.1109/CIC.2016.019]
[7]  
Geneiatakis D, 2017, 2017 40TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1292, DOI 10.23919/MIPRO.2017.7973622
[8]   Security and Privacy in Smart Farming: Challenges and Opportunities [J].
Gupta, Maanak ;
Abdelsalam, Mahmoud ;
Khorsandroo, Sajad ;
Mittal, Sudip .
IEEE ACCESS, 2020, 8 :34564-34584
[9]   Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars [J].
Gupta, Maanak ;
Benson, James ;
Patwa, Farhan ;
Sandhu, Ravi .
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, :61-72
[10]   Object-Tagged RBAC Model for the Hadoop Ecosystem [J].
Gupta, Maanak ;
Patwa, Farhan ;
Sandhu, Ravi .
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXI, DBSEC 2017, 2017, 10359 :63-81