Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform

被引:0
作者
Bayu Anggorojati
Neeli Rashmi Prasad
Ramjee Prasad
机构
[1] Universitas Indonesia,Faculty of Computer Science
[2] International Technological University,Engineering Management Faculty
[3] Future Technologies for Business Ecosystem Innovation (FT4BI),undefined
来源
Wireless Personal Communications | 2018年 / 100卷
关键词
Capability; Access control; ECC; Key management; M2M; Cloud;
D O I
暂无
中图分类号
学科分类号
摘要
One of the critical requirement in managing security of any computing system is access control, which includes protection and access management to the available resources. This requirement becomes more strict especially in a distributed computing environment that consists of constrained devices such as Machine-to-Machine (M2M). New challenges in access control are identified in a system comprises a group of distributed multiple M2M gateways forming a so called M2M local cloud platform (Vallati et al. in Wirel Trans Commun 87(3):1071–1091, 2016). Scalability is obviously a necessity which is lacking in some existing access control system. In addition, flexibility in managing access from users or entity belonging to other authorization domains as well as delegating access right are not provided as an integrated features. Lately, the capability-based access control has been suggested as method to manage access for M2M as the key enabler of Internet of Things. In this paper, a capability based access control equipped with Elliptic Curve Cryptography based key management is proposed for the M2M local cloud platform. The feasibility of the proposed capability based access control and key management are tested by implementing them within the security manager that is part of the overall component of the platform architecture, and evaluating their performances by a series of experimentations.
引用
收藏
页码:519 / 538
页数:19
相关论文
共 31 条
[1]  
Vallati C(2016)BeTaaS: A platform for development and execution of machine-to-machine applications in the Internet of Things Wireless Personal Communications 87 1071-1091
[2]  
Mingozzi E(2013)On the features and challenges of security and privacy in distributed Internet of Things Computer Networks 57 2266-2279
[3]  
Tanganelli G(2013)A capability-based security approach to manage access control in the Internet of Things Mathematical and Computer Modelling 58 1189-1205
[4]  
Buonaccorsi N(1996)Role-based access control models Computer 29 38-47
[5]  
Valdambrini N(2010)Review: Wireless sensor network key management survey and taxonomy Journal of Network and Computer Applications 33 63-75
[6]  
Zonidis N(2006)Identity-based key agreement and encryption for wireless sensor networks The Journal of China Universities of Posts and Telecommunications 13 54-60
[7]  
Martnez B(undefined)undefined undefined undefined undefined-undefined
[8]  
Mamelli A(undefined)undefined undefined undefined undefined-undefined
[9]  
Sommacampagna D(undefined)undefined undefined undefined undefined-undefined
[10]  
Anggorojati B(undefined)undefined undefined undefined undefined-undefined