XSACd Cross-domain resource sharing & access control for smart environments

被引:10
|
作者
Fysarakis, Konstantinos [1 ]
Soultatos, Othonas [1 ]
Manifavas, Charalampos [2 ]
Papaefstathiou, Ioannis [1 ]
Askoxylakis, Ioannis [3 ]
机构
[1] Tech Univ Crete, Elect & Comp Engn Dept, Akrotiri Campus, Khania 73100, Crete, Greece
[2] Rochester Inst Technol, Elect Engn & Comp Sci Dept, Techno Point Bldg, Silicon Oasis, Dubai, U Arab Emirates
[3] Fdn Res & Technol Hellas FORTH, Inst Comp Sci, Iraklion 70013, Crete, Greece
基金
欧盟地平线“2020”;
关键词
Access control; Authorization; Web Services; Service-oriented architectures; Ubiquitous computing; HOME; MANAGEMENT; FRAMEWORK; INTERNET; DEVICES;
D O I
10.1016/j.future.2016.05.023
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Computing devices permeate working and living environments, affecting all aspects of modern everyday lives; a trend which is expected to intensify in the coming years. In the residential setting, the enhanced features and services provided by said computing devices constitute what is typically referred to as a "smart home". However, the direct interaction smart devices often have with the physical world, along with the processing, storage and communication of data pertaining to users' lives, i.e. private sensitive in nature, bring security concerns into the limelight. The resource-constraints of the platforms being integrated into a smart home environment, and their heterogeneity in hardware, network and overlaying technologies, only exacerbate the above issues. This paper presents XSACd, a cross-domain resource sharing & access control framework for smart environments, combining the well-studied fine-grained access control provided by the eXtensible Access Control Markup Language (XACML) with the benefits of Service Oriented Architectures, through the use of the Devices Profile for Web Services (DPWS). Based on standardized technologies, it enables seamless interactions and fine-grained policy-based management of heterogeneous smart devices, including support for communication between distributed networks, via the associated MQ Telemetry Transport protocol (MQTT) based proxies. The framework is implemented in full, and its performance is evaluated on a test bed featuring relatively resource-constrained smart platforms and embedded devices, verifying the feasibility of the proposed approach. (C) 2016 Elsevier B.V. All rights reserved.
引用
收藏
页码:572 / 582
页数:11
相关论文
共 50 条
  • [1] An ontology based access control service for cross-domain e-learning resource sharing
    Wu, Jiaoyu
    Huang, Changqin
    Wang, Xianqing
    Wu, Zhanjie
    Zheng, Xiaolin
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2007, 14 : 786 - 792
  • [2] DACP: Enforcing a dynamic access control policy in cross-domain environments
    Salehi, Ahmad S.
    Han, Runchao
    Rudolph, Carsten
    Grobler, Marthie
    COMPUTER NETWORKS, 2023, 237
  • [3] Lark: Verified Cross-Domain Access Control for Trusted Execution Environments
    Zeng, Fanlang
    Zhang, Zhuoruo
    Chang, Rui
    Yu, Chenyang
    Zhang, Zijun
    Zhao, Yongwang
    2023 IEEE 34TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, ISSRE, 2023, : 160 - 171
  • [4] An access control model for data security sharing cross-domain in consortium blockchain
    Liu Y.
    Yang W.
    Wang Y.
    IET Blockchain, 2023, 3 (01): : 18 - 34
  • [5] Cross-domain access control via PKI
    Denker, G
    Millen, J
    Miyake, Y
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 202 - 205
  • [6] Cross-Domain Access Control in a Military SOA
    Nordbotten, Nils Agne
    MILITARY COMMUNICATIONS CONFERENCE, 2010 (MILCOM 2010), 2010, : 448 - 455
  • [7] Browser user tracking based on cross-domain resource access
    Song Y.
    Wu T.
    Hu A.
    Gao S.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2021, 61 (11): : 1254 - 1259
  • [8] A Cross-domain Access Control Method for Large Organizations
    Wang Chao
    Chen Ji-zhou
    Liu Yu-jun
    Li An-qi
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 941 - 946
  • [9] A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing
    Shen, Yuan
    Song, Wei
    Zhao, Changsheng
    Peng, Zhiyong
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (07): : 1611 - 1628
  • [10] The Research of Cross-Domain Access Control Based on Attribute Mapping
    Mu, Ling-ling
    Gao, Yan-yan
    INTERNATIONAL CONFERENCE ON COMPUTER, NETWORK SECURITY AND COMMUNICATION ENGINEERING (CNSCE 2014), 2014, : 95 - 100