Feasibility Assessment of a Fine-Grained Access Control Model on Resource Constrained Sensors

被引:0
|
作者
Uriarte Itzazelaia, Mikel [1 ]
Astorga, Jasone [2 ]
Jacob, Eduardo [2 ]
Huarte, Maider [2 ]
Romana, Pedro [1 ]
机构
[1] Nextel SA, Technol Pk Bizkaia 207B,1B, Zamudio 48170, Spain
[2] Univ Basque Country, UPV EHU, Fac Engn Bilbao, Dept Commun Engn, Plaza Ingn Torres Quevedo 1, Bilbao 48013, Spain
来源
SENSORS | 2018年 / 18卷 / 02期
关键词
access control model; fine-grained authorization; constrained device; expressive policy language; least privilege; message exchange protocol; policy codification; sensor; feasibility assessment; performance evaluation; SECURITY; INTERNET; PRIVACY; TRUST;
D O I
10.3390/s18020575
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Upcoming smart scenarios enabled by the Internet of Things (IoT) envision smart objects that provide services that can adapt to user behavior or be managed to achieve greater productivity. In such environments, smart things are inexpensive and, therefore, constrained devices. However, they are also critical components because of the importance of the information that they provide. Given this, strong security is a requirement, but not all security mechanisms in general and access control models in particular are feasible. In this paper, we present the feasibility assessment of an access control model that utilizes a hybrid architecture and a policy language that provides dynamic fine-grained policy enforcement in the sensors, which requires an efficient message exchange protocol called Hidra. This experimental performance assessment includes a prototype implementation, a performance evaluation model, the measurements and related discussions, which demonstrate the feasibility and adequacy of the analyzed access control model.
引用
收藏
页数:32
相关论文
共 50 条
  • [41] A fine-grained access control and revocation scheme on clouds
    Tu, Shan-shan
    Niu, Shao-zhang
    Li, Hui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (06): : 1697 - 1714
  • [42] Fine-Grained Vulnerability Analysis of Resource Constrained Neural Inference Accelerators
    Corneliou, Panayiotis
    Nikolaou, Panagiota
    Michael, Maria K.
    Theocharides, Theocharis
    34TH IEEE INTERNATIONAL SYMPOSIUM ON DEFECT AND FAULT TOLERANCE IN VLSI AND NANOTECHNOLOGY SYSTEMS (DFT 2021), 2021,
  • [43] Modelling Fine-Grained Access Control Policies in Grids
    Benjamin Aziz
    Journal of Grid Computing, 2016, 14 : 477 - 493
  • [44] Vigiles: Fine-grained Access Control for MapReduce Systems
    Ulusoy, Huseyin
    Kantarcioglu, Murat
    Pattuk, Erman
    Hamlen, Kevin
    2014 IEEE INTERNATIONAL CONGRESS ON BIG DATA (BIGDATA CONGRESS), 2014, : 40 - 47
  • [45] Fine-grained access control for EPC information services
    Grummt, Eberhard
    Mueller, Markus
    INTERNET OF THINGS, PROCEEDINGS, 2008, 4952 : 35 - +
  • [46] Fine-Grained Support of Security Services for Resource Constrained Internet of Things
    Ban, Hyo Jin
    Choi, Jaeduck
    Kang, Namhi
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [47] Achieving fine-grained access control in virtual organizations
    Zhang, N.
    Yao, L.
    Nenadic, A.
    Chin, J.
    Goble, C.
    Rector, A.
    Chadwick, D.
    Otenko, S.
    Shi, Q.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (09): : 1333 - 1352
  • [48] Modelling Fine-Grained Access Control Policies in Grids
    Aziz, Benjamin
    JOURNAL OF GRID COMPUTING, 2016, 14 (03) : 477 - 493
  • [49] THE RESEARCH OF SPREADSHEET BASED ON FINE-GRAINED ACCESS CONTROL
    Zheng Yanwei
    Feng Zhiquan
    FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 245 - 251
  • [50] Capability and Blockchain-Based Fine-Grained and Flexible Access Control Model
    Chen, Yanru
    Tao, Li
    Liang, Bing
    Sun, Limin
    Li, Yang
    Xing, Bin
    Chen, Liangyin
    IEEE NETWORK, 2023, 37 (06): : 197 - 205