A Lazy Approach to Access Control as a Service (ACaaS) for IoT

被引:14
|
作者
Ahmad, Tahir [1 ,2 ]
Morelli, Umberto [1 ]
Ranise, Silvio [1 ]
Zannone, Nicola [3 ]
机构
[1] FBK ICT, Secur & Trust Unit, Trento, Italy
[2] Univ Genoa, DIBRIS, Genoa, Italy
[3] Eindhoven Univ Technol, Eindhoven, Netherlands
关键词
Internet of Things; Policy specification and management; Attribute-Based Access Control; IoT platforms; Edge Computing; POLICIES;
D O I
10.1145/3205977.3205989
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is receiving considerable attention from both industry and academia because of the new business models that it enables and the new security and privacy challenges that it generates. Major Cloud Service Providers (CSPs) have proposed platforms to support IoT by combining cloud and edge computing. However, the security mechanisms available in the cloud have been extended to IoT with some shortcomings with respect to the management and enforcement of access control policies. Access Control as a Service (ACaaS) is emerging as a solution to overcome these difficulties. The paper proposes a lazy approach to ACaaS that allows the specification and management of policies independently of the CSP while leveraging its enforcement mechanisms. We demonstrate the approach by investigating (also experimentally) alternative deployments in the IoT platform offered by Amazon Web Services on a realistic smart lock solution.
引用
收藏
页码:235 / 246
页数:12
相关论文
共 50 条
  • [1] ACaaS: Access Control as a Service for IaaS Cloud
    Wu, Ruoyu
    Zhang, Xinwen
    Ahn, Gail-Joon
    Sharifi, Hadi
    Xie, Haiyong
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 423 - 428
  • [2] Affective Computing as a Service (ACaaS)
    Murphy, Wesley
    Furey, Eoghan
    Blue, Juanita
    2020 31ST IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2020, : 50 - 55
  • [3] Reliable service availability and access control method for cloud assisted IOT communications
    Kousalya, A.
    Sakthidasan, Krishnan
    Latha, A.
    WIRELESS NETWORKS, 2021, 27 (02) : 881 - 892
  • [4] Reliable service availability and access control method for cloud assisted IOT communications
    A. Kousalya
    Krishnan Sakthidasan
    A. Latha
    Wireless Networks, 2021, 27 : 881 - 892
  • [5] Access Control Approach in Public Software as a Service Cloud
    Poniszewska-Maranda, Aneta
    Rutkowska, Roksana
    THEORY AND ENGINEERING OF COMPLEX SYSTEMS AND DEPENDABILITY, 2015, 365 : 381 - 390
  • [6] IoT-CCAC: a blockchain-based consortium capability access control approach for IoT
    Bouras M.A.
    Xia B.
    Abuassba A.O.
    Ning H.
    Lu Q.
    PeerJ Computer Science, 2021, 7 : 1 - 22
  • [7] IoT-CCAC: a blockchain-based consortium capability access control approach for IoT
    Bouras, Mohammed Amine
    Xia, Boming
    Abuassba, Adnan Omer
    Ning, Huansheng
    Lu, Qinghua
    PEERJ COMPUTER SCIENCE, 2021,
  • [8] A Community-Driven Access Control Approach in Distributed IoT Environments
    Hussein, Dina
    Bertin, Emmanuel
    Frey, Vincent
    IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (03) : 145 - 153
  • [9] QUALITY OF SERVICE ASSESSMENT OF OPPORTUNISTIC SPECTRUM ACCESS: A MEDIUM ACCESS CONTROL APPROACH
    Pawelczak, Przemyslaw
    Pollin, Sofie
    So, Hoi-Sheung Wilson
    Bahai, Ahmad
    Prasad, R. Venkatesha
    Hekmat, Ramin
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (05) : 20 - 29
  • [10] Integrated Service Composition Approach Based on Transparent Access to Heterogeneous IoT Networks Using Multiple Service Providers
    Jin, Wenquan
    Xu, Rongxu
    Lim, Sunhwan
    Park, Dong-Hwan
    Park, Chanwon
    Kim, Dohyeun
    MOBILE INFORMATION SYSTEMS, 2021, 2021