Evaluation of table-based access control in IoT data distribution method using fog computing

被引:3
|
作者
Yoshii, Masaki [1 ]
Banno, Ryohei [2 ]
Mizuno, Osamu [1 ,2 ]
机构
[1] Kogakuin Univ, Grad Sch Elect & Elect Engn, Shinjuku Ku, 1-24-2 Nishi Shinjuku, Tokyo, Tokyo 1638677, Japan
[2] Kogakuin Univ, Fac Informat, Dept Informat & Commun Engn, 2665-1 Nakanomachi, Hachioji, Tokyo 1920015, Japan
来源
IEICE COMMUNICATIONS EXPRESS | 2021年 / 10卷 / 10期
关键词
fog computing; IoT data distribution; access control;
D O I
10.1587/comex.2021XBL0134
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
New services can use fog nodes to distribute Internet of Things (IoT) data. To distribute IoT data, we apply the publish/subscribe messaging model to a fog computing system. However, there is a possibility that the user's private data are distributed without their permission. In this paper, we propose a Table-based Access Control List to protect unnecessary private data distribution. The evaluation results show that the bandwidth usage is reduced by about 40% and the queuing delay of a service fog node is reduced by about 60%.
引用
收藏
页码:822 / 827
页数:6
相关论文
共 50 条
  • [1] Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2022, E105B (11) : 1390 - 1399
  • [2] Evaluation of ticket-based access control method applied to IoT data distribution
    Yoshii, Masaki
    Banno, Ryohei
    Mizuno, Osamu
    [J]. IEICE COMMUNICATIONS EXPRESS, 2022, 11 (03): : 148 - 153
  • [3] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    Pallavi, K. N.
    Ravi Kumar, V.
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (04) : 3039 - 3060
  • [4] Authentication-based Access Control and Data Exchanging Mechanism of IoT Devices in Fog Computing Environment
    K. N. Pallavi
    V. Ravi Kumar
    [J]. Wireless Personal Communications, 2021, 116 : 3039 - 3060
  • [5] PROPOSED ACCESS CONTROL AND SECURITY ARCHITECTURE BASED ON FOG COMPUTING FOR IOT ENVIRONMENTS
    Bharathi, C. R.
    Ramesh, L. V.
    Priya, L. Vamsi
    [J]. INTERNATIONAL JOURNAL OF EARLY CHILDHOOD SPECIAL EDUCATION, 2022, 14 (02) : 1398 - 1404
  • [6] Table-based recursive method for function evaluation
    Pont, M. T. Signes
    Casado, G. de Miguel
    Mora, H. Mora
    Chamizo, J. M. Garcia
    [J]. NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, 2007, 936 : 511 - +
  • [7] Table-based Method for Reconfigurable Function Evaluation
    Signes Pont, Maria Teresa
    Mora Mora, Higinio
    Garcia Chamizo, Juan Manuel
    de Miguel Casado, Gregorio
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL & DISTRIBUTED PROCESSING, VOLS 1-5, 2009, : 1224 - +
  • [8] Access Control Method using Electrocardiogram Signal for Fog Computing Security
    Kim, Jin Su
    Kim, Min Gu
    Lee, Myung-Won
    Pan, Sung Bum
    [J]. PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20), 2020, : 1772 - 1777
  • [9] An adaptive distributed access control model for IoT and fog computing environments
    Charaf, Lalla Amina
    Alihamidi, Imam
    Deroussi, Anass
    Madi, Abdessalam Ait
    Addaim, Adnane
    Charaf, Moulay El Hassan
    [J]. INTERNATIONAL JOURNAL OF MODELLING IDENTIFICATION AND CONTROL, 2024, 44 (03) : 230 - 245
  • [10] Indoor Access Control System Through Symptomatic Examination Using IoT Technology, Fog Computing and Cloud Computing
    Lopez-Blanco, Raul
    Alonso, Ricardo S.
    Prieto, Javier
    Rodriguez-Gonzalez, Sara
    Corchado, Juan M.
    [J]. HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, HAIS 2022, 2022, 13469 : 60 - 72