Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control

被引:35
|
作者
Kayes, A. S. M. [1 ]
Rahayu, Wenny [1 ]
Watters, Paul [1 ]
Alazab, Mamoun [2 ]
Dillon, Tharam [1 ]
Chang, Elizabeth [3 ]
机构
[1] La Trobe Univ, Melbourne, Vic, Australia
[2] Charles Darwin Univ, Darwin, NT, Australia
[3] Univ New South Wales, Canberra, ACT, Australia
关键词
Access control; Fog computing; Cloud computing; Security; Privacy; Cybercrime; Internet of Things;
D O I
10.1016/j.future.2020.02.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the cyberspace environment, access control is one of the foremost fundamental safeguards used to prevent unauthorized access and to minimize the impact from security breaches. Fog computing preserves many benefits for the integration of both internet of things (IoT) and cloud computing platforms. Security in Fog computing environment remains a significant concern among practitioners from academia and industry. The current existing access control models, like the traditional Context-Aware Access Control (CAAC), are limited to access data from centralized sources, and not robust due to lack of semantics and cloud-based service. This major concern has not been addressed in the literature, also literature still lacks a practical solution to control fog data view from multiple sources. This paper critically reviews and investigates the limitations of current fog-based access control. It considers the trade-off between latency and processing overheads which has not been thoroughly studied before. In this paper, a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework is proposed to enable flexible access control data from multiple sources. To fill the gap in the literature this paper introduces (i) a general data model and its associated mapping model to collate data from multiple sources. (ii) a data view model to provide an integrated result to the users, dealing with the privacy requirements of the associated stakeholders, (iii) a unified set of CAAC policies with an access controller to reduce both administrative and processing overheads, and (iv) a data ontology to represent the common classes in the relevant data sets. The applicability of FB-CAAC proposal is demonstrated via a walkthrough of the entire mechanism along with several case studies and a prototype testing. The results show the efficiency, flexibility, effectiveness, and practicality of FB-CAAC for data access control in fog computing environment. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:307 / 323
页数:17
相关论文
共 50 条
  • [1] Context-aware cognitive disaster management using fog-based Internet of Things
    Butt, Talal Ashraf
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (08)
  • [2] Context-Aware Trust and Reputation Model for Fog-Based IoT
    Hussain, Yasir
    Zhiqiu, Huang
    Akbar, Muhammad Azeem
    Alsanad, Ahmed
    Alsanad, Abeer Abdul-Aziz
    Nawaz, Asif
    Khan, Izhar Ahmed
    Khan, Zaheer Ullah
    [J]. IEEE ACCESS, 2020, 8 : 31622 - 31632
  • [3] Context-Aware Trust and Reputation Model for Fog-Based IoT
    Hussain, Yasir
    Zhiqiu, Huang
    Akbar, Muhammad Azeem
    Alsanad, Ahmed
    Alsanad, Abeer Abdul-Aziz
    Nawaz, Asif
    Khan, Izhar Ahmed
    Khan, Zaheer Ullah
    [J]. IEEE Access, 2020, 8 : 31622 - 31632
  • [4] Security-Aware Attribute-Based Access Control for Fog-Based Eldercare System
    Yin, Luona
    Zhang, Aiqing
    Ye, Xinrong
    Wang, Lei
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2680 - 2684
  • [5] Enhancing Kerberos Security using Public Key and Context-Aware Access Control
    Gunjal, Gauri
    Pathan, S. K.
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (06): : 78 - 86
  • [6] Footsteps in the fog: Certificateless fog-based access control
    Frimpong, Eugene
    Michalas, Antonis
    Ullah, Amjad
    [J]. COMPUTERS & SECURITY, 2022, 121
  • [7] Footsteps in the fog: Certificateless fog-based access control
    Frimpong, Eugene
    Michalas, Antonis
    Ullah, Amjad
    [J]. Computers and Security, 2022, 121
  • [8] Adaptive context-aware access control for IoT environments leveraging fog computing
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    Salehi Shahraki, Ahmad
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (04) : 3089 - 3107
  • [9] Context-aware access control - Making access control decisions based on context information
    Lachmund, Sven
    Walter, Thomas
    Bussard, Laurent
    Gomez, Laurent
    Olk, Eddy
    [J]. 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, 2006, : 484 - 491
  • [10] Context-aware access control - Making access control decisions based on context information
    Lachmund, Sven
    Walter, Thomas
    Bussard, Laurent
    Gomez, Laurent
    Olk, Eddy
    [J]. 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, 2006, : 470 - +