Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

被引:0
|
作者
Uriarte Itzazelaia, Mikel [1 ]
Astorga, Jasone [2 ]
Jacob, Eduardo [2 ]
Huarte, Maider [2 ]
Romana, Pedro [1 ]
机构
[1] Nextel SA, Technol Pk Bizkaia 207B,1B, Zamudio 48170, Spain
[2] Univ Basque Country, UPV EHU, Fac Engn Bilbao, Dept Commun Engn, Plaza Ingn Torres Quevedo 1, Bilbao 48013, Spain
来源
SENSORS | 2018年 / 18卷 / 02期
关键词
access control model; fine-grained authorization; constrained device; expressive policy language; least privilege; message exchange protocol; policy codification; sensor; feasibility assessment; performance evaluation; SECURITY; INTERNET; PRIVACY; TRUST;
D O I
10.3390/s18020575
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
引用
收藏
页数:32
相关论文
共 50 条
  • [21] Fine-grained Access Control to Web Databases
    Roichman, Alex
    Gudes, Ehud
    SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 31 - 40
  • [22] Fine-grained access control of PDM and CAPP
    Feng, SH
    Jiang, ZL
    ADVANCES IN MATERIALS MANUFACTURING SCIENCE AND TECHNOLOGY, 2004, 471-472 : 573 - 576
  • [23] Fine-grained access control for cloud computing
    Ye, Xinfeng
    Khoussainov, Bakh
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 160 - 168
  • [24] A Fine-grained Multiparty Access Control Model for Photo Sharing in OSNs
    Lee, Chao
    Wang, Wei
    Guo, Yunchuan
    2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC 2016), 2016, : 440 - 445
  • [25] Fine-grained Service Side Access Control Model for Web Application
    Liang, Zhijun
    Zhang, Hua
    Zhao, Zhonghua
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1 - 6
  • [26] A Unified Network Security and Fine-Grained Database Access Control Model
    Pan, Leon
    PROCEEDINGS OF THE SECOND INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, VOL I, 2009, : 265 - 269
  • [27] Towards a fine-grained access control model and mechanisms for semantic databases
    Franzoni, Stefano
    Mazzoleni, Pietro
    Valtolina, Stefano
    Mazzoleni, Pietro
    Bertino, Elisa
    2007 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2007, : 993 - +
  • [28] Access policy sheet for access control in fine-grained XML
    Wu, J
    Mu, Y
    Seberry, J
    Ruan, C
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 1273 - 1282
  • [29] BLOCKCHAIN-BASED FINE-GRAINED ACCESS CONTROL FOR SPACE RESOURCE SHARING AND MANAGEMENT
    Wu, Yusen
    Makki, Alex Pissinou
    Padron, Kevin
    Nguyen, Phuong
    Dennis, Stephen
    Yesha, Yelena
    IGARSS 2024-2024 IEEE INTERNATIONAL GEOSCIENCE AND REMOTE SENSING SYMPOSIUM, IGARSS 2024, 2024, : 681 - 684
  • [30] Strong mobility and fine-grained resource control in NOMADS
    Suri, N
    Bradshaw, JM
    Breedy, MR
    Groth, PT
    Hill, GA
    Jeffers, R
    AGENT SYSTEMS, MOBILE AGENTS AND APPLICATIONS, 2000, 1882 : 2 - 15