Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control

被引:35
|
作者
Kayes, A. S. M. [1 ]
Rahayu, Wenny [1 ]
Watters, Paul [1 ]
Alazab, Mamoun [2 ]
Dillon, Tharam [1 ]
Chang, Elizabeth [3 ]
机构
[1] La Trobe Univ, Melbourne, Vic, Australia
[2] Charles Darwin Univ, Darwin, NT, Australia
[3] Univ New South Wales, Canberra, ACT, Australia
关键词
Access control; Fog computing; Cloud computing; Security; Privacy; Cybercrime; Internet of Things;
D O I
10.1016/j.future.2020.02.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the cyberspace environment, access control is one of the foremost fundamental safeguards used to prevent unauthorized access and to minimize the impact from security breaches. Fog computing preserves many benefits for the integration of both internet of things (IoT) and cloud computing platforms. Security in Fog computing environment remains a significant concern among practitioners from academia and industry. The current existing access control models, like the traditional Context-Aware Access Control (CAAC), are limited to access data from centralized sources, and not robust due to lack of semantics and cloud-based service. This major concern has not been addressed in the literature, also literature still lacks a practical solution to control fog data view from multiple sources. This paper critically reviews and investigates the limitations of current fog-based access control. It considers the trade-off between latency and processing overheads which has not been thoroughly studied before. In this paper, a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework is proposed to enable flexible access control data from multiple sources. To fill the gap in the literature this paper introduces (i) a general data model and its associated mapping model to collate data from multiple sources. (ii) a data view model to provide an integrated result to the users, dealing with the privacy requirements of the associated stakeholders, (iii) a unified set of CAAC policies with an access controller to reduce both administrative and processing overheads, and (iv) a data ontology to represent the common classes in the relevant data sets. The applicability of FB-CAAC proposal is demonstrated via a walkthrough of the entire mechanism along with several case studies and a prototype testing. The results show the efficiency, flexibility, effectiveness, and practicality of FB-CAAC for data access control in fog computing environment. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:307 / 323
页数:17
相关论文
共 50 条
  • [21] A Study on Automated Context-aware Access Control Model Using Ontology
    Jang, Bokman
    Jang, Hyokyung
    Choi, Euiin
    [J]. ADVANCED COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2010, 74 : 179 - 186
  • [22] Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
    Zhang, Rui
    Giunchiglia, Fausto
    Crispo, Bruno
    Song, Lingyang
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 5 - 17
  • [23] Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
    Rui Zhang
    Fausto Giunchiglia
    Bruno Crispo
    Lingyang Song
    [J]. Wireless Personal Communications, 2010, 55 : 5 - 17
  • [24] A Trusted Ecosystem For Android Applications Based On Context-Aware Access Control
    Herpich, Markus
    Batyuk, Leonid
    Camtepe, Seyit Ahmet
    Albayrak, Sahin
    [J]. PROCEEDINGS OF THE 2012 7TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE, 2012, : 73 - 78
  • [25] Lightweight Context-Aware Security System for Wireless Internet Access
    Cantali, Gokcan
    Ermis, Orhan
    Gur, Gurkan
    Alagoz, Fatih
    Caglayan, M. Ufuk
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 765 - 766
  • [26] Context-Aware Access Control for Pervasive Access to Process-Based Healthcare Systems
    Koufi, Vassiliki
    Vassilacopoulos, George
    [J]. EHEALTH BEYOND THE HORIZON - GET IT THERE, 2008, 136 : 679 - 684
  • [27] Context-aware distribution of fog applications using deep reinforcement
    Varghese, Blesson
    Wang, Nan
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 203
  • [28] A Survey of Context-Aware Access Control Mechanisms for Cloud and Fog Networks: Taxonomy and Open Research Issues
    Kayes, A. S. M.
    Kalaria, Rudri
    Sarker, Iqbal H.
    Islam, Md. Saiful
    Watters, Paul A.
    Ng, Alex
    Hammoudeh, Mohammad
    Badsha, Shahriar
    Kumara, Indika
    [J]. SENSORS, 2020, 20 (09)
  • [29] Context-aware access control mechanism for ubiquitous applications
    Kim, YG
    Mon, CJ
    Jeong, DW
    Lee, JO
    Song, CY
    Baik, DK
    [J]. ADVANCES IN WEB INTELLIGENCE, PROCEEDINGS, 2005, 3528 : 236 - 242
  • [30] A Context-Aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 425 - +