Secure biometric-based access control scheme for future IoT-enabled cloud-assisted video surveillance system

被引:8
|
作者
Bagga, Palak [1 ]
Mitra, Ankush [1 ]
Das, Ashok Kumar [1 ,2 ]
Vijayakumar, Pandi [3 ]
Park, YoungHo [4 ]
Karuppiah, Marimuthu [5 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Old Dominion Univ, Modeling Anal & Simulat Ctr, Suffolk, VA 23435 USA
[3] Univ Coll Engn Tindivanam, Dept Comp Sci & Engn, Villupuram 604001, India
[4] Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea
[5] SRM Inst Sci & Technol, Dept Comp Sci & Engn, Delhi NCR Campus, Ghaziabad 201204, India
基金
新加坡国家研究基金会;
关键词
Internet of Things (IoT); Cloud computing; Access control; Key management; Video surveillance; Security; Testbed experiments; AUTHENTICATION; PROTOCOLS; INTERNET;
D O I
10.1016/j.comcom.2022.08.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose a new access control mechanism for video surveillance system based on user's biometrics, which allows to access real-time video surveillance data from deployed Internet of Things (IoT) smart devices. For this purpose, mutual authentication is performed between a user and accessed smart devices via the cloud server(s) and the session keys are then established to make secure communication. The proposed scheme allows accessing real time video and older videos that are in cloud servers, and also user's credential update phase. Through the security analysis, it has been shown that the proposed scheme is robust against a variety of potential passive/active attacks. A detailed comparative study shows the efficacy of the proposed scheme as compared to other existing solutions. Finally, the real testbed experiments have been carried out for secure surveillance system using Raspberry PI devices as IoT devices, user's devices and servers to show its practical application.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 50 条
  • [21] A secure signature-based access control and key management scheme for fog computing-based IoT-enabled big data applications
    Karnatak, Vijay
    Mishra, Amit Kumar
    Tripathi, Neha
    Wazid, Mohammad
    Singh, Jaskaran
    Das, Ashok Kumar
    SECURITY AND PRIVACY, 2024, 7 (02)
  • [22] Privacy-preserving Multi-user Encrypted Access Control Scheme for Cloud-assisted IoT applications
    Kaaniche, Nesrine
    Laurent, Maryline
    PROCEEDINGS 2018 IEEE 11TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2018, : 590 - 597
  • [23] A Secure and Reliable Device Access Control Scheme for IoT Based Sensor Cloud Systems
    Chaudhry, Shehzad Ashraf
    Yahya, Khalid
    Al-Turjman, Fadi
    Yang, Ming-Hour
    IEEE ACCESS, 2020, 8 : 139244 - 139254
  • [24] A secure and efficient computation based multifactor authentication scheme for Intelligent IoT-enabled WSNs
    Kumar, Ravi
    Singh, Samayveer
    Singh, Pradeep Kumar
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 105
  • [25] An Efficient and Flexible Scheme to Support Biometric-Based and Role-Based Access Control
    Nali, Deholo
    Adams, Carlisle
    Miri, Ali
    APPLIED PUBLIC KEY INFRASTRUCTURE, 2005, 128 : 139 - 154
  • [26] An Effective and Secure Access Control System Scheme in the Cloud
    Niu Shaozhang
    Tu Shanshan
    Huang Yongfeng
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (03) : 524 - 528
  • [27] An Effective and Secure Access Control System Scheme in the Cloud
    NIU Shaozhang
    TU Shanshan
    Huang Yongfeng
    ChineseJournalofElectronics, 2015, 24 (03) : 524 - 528
  • [28] ReIPS: A Secure Cloud-Based Reputation Evaluation System for IoT-Enabled Pumped Storage Power Stations
    Zong, Yue
    Wu, Yuechao
    Luo, Yuanlin
    Xu, Han
    Hu, Wenjian
    Yu, Yao
    SENSORS, 2023, 23 (12)
  • [29] A Secure and IoT-Enabled Data Sharing System Based on IPFS and IOTA Blockchain
    Huang, Tse-Yang
    Chen, Yu-Chi
    Hsieh, Tsung-Chen
    Chang, Huan-Chi
    Chang, Chih-Chieh
    PROCEEDINGS OF 2023 5TH BLOCKCHAIN AND INTERNET OF THINGS CONFERENCE, BIOTC 2023, 2023, : 50 - 57
  • [30] SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control
    Al-Sudani, Ahmed Raad
    Zhou, Wanlei
    Wen, Sheng
    Al-Mansoori, Ahmed
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 202 - 211