Achieving security scalability and flexibility using Fog-Based Context-Aware Access Control

被引:35
|
作者
Kayes, A. S. M. [1 ]
Rahayu, Wenny [1 ]
Watters, Paul [1 ]
Alazab, Mamoun [2 ]
Dillon, Tharam [1 ]
Chang, Elizabeth [3 ]
机构
[1] La Trobe Univ, Melbourne, Vic, Australia
[2] Charles Darwin Univ, Darwin, NT, Australia
[3] Univ New South Wales, Canberra, ACT, Australia
关键词
Access control; Fog computing; Cloud computing; Security; Privacy; Cybercrime; Internet of Things;
D O I
10.1016/j.future.2020.02.001
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the cyberspace environment, access control is one of the foremost fundamental safeguards used to prevent unauthorized access and to minimize the impact from security breaches. Fog computing preserves many benefits for the integration of both internet of things (IoT) and cloud computing platforms. Security in Fog computing environment remains a significant concern among practitioners from academia and industry. The current existing access control models, like the traditional Context-Aware Access Control (CAAC), are limited to access data from centralized sources, and not robust due to lack of semantics and cloud-based service. This major concern has not been addressed in the literature, also literature still lacks a practical solution to control fog data view from multiple sources. This paper critically reviews and investigates the limitations of current fog-based access control. It considers the trade-off between latency and processing overheads which has not been thoroughly studied before. In this paper, a new generation of Fog-Based Context-Aware Access Control (FB-CAAC) framework is proposed to enable flexible access control data from multiple sources. To fill the gap in the literature this paper introduces (i) a general data model and its associated mapping model to collate data from multiple sources. (ii) a data view model to provide an integrated result to the users, dealing with the privacy requirements of the associated stakeholders, (iii) a unified set of CAAC policies with an access controller to reduce both administrative and processing overheads, and (iv) a data ontology to represent the common classes in the relevant data sets. The applicability of FB-CAAC proposal is demonstrated via a walkthrough of the entire mechanism along with several case studies and a prototype testing. The results show the efficiency, flexibility, effectiveness, and practicality of FB-CAAC for data access control in fog computing environment. (C) 2020 Elsevier B.V. All rights reserved.
引用
收藏
页码:307 / 323
页数:17
相关论文
共 50 条
  • [41] A Context-aware Access Control Model for Pervasive Environments
    Al-Rwais, Sumayah
    Al-Muhtadi, Jalal
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (05) : 371 - 379
  • [42] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    [J]. SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [43] An Ontology-Based Approach to Context-Aware Access Control for Software Services
    Kayes, A. S. M.
    Han, Jun
    Colman, Alan
    [J]. WEB INFORMATION SYSTEMS ENGINEERING - WISE 2013, PT I, 2013, 8180 : 410 - 420
  • [44] Context-Aware Security Using Internet of Things Devices
    Trnka, Michal
    Tomasek, Martin
    Cerny, Tomas
    [J]. INFORMATION SCIENCE AND APPLICATIONS 2017, ICISA 2017, 2017, 424 : 706 - 713
  • [45] A context-aware role-based access control model for Web services
    Shen, HB
    Hong, F
    [J]. ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223
  • [46] Context-aware role-based access control model for Web services
    Feng, X
    Jun, M
    Hao, H
    Li, X
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 430 - 436
  • [47] Context-Aware Operation-Based Access Control for Internet of Things Applications
    Genc, Didem
    Tomur, Emrah
    Erten, Yusuf Murat
    [J]. 2019 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC 2019), 2019,
  • [48] Context-aware access control with imprecise context characterization for cloud-based data resources
    Kayes, A. S. M.
    Rahayu, Wenny
    Dillon, Tharam
    Chang, Elizabeth
    Han, Jun
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 237 - 255
  • [49] A fog-based security framework for intelligent traffic light control system
    Tauqeer Khalid
    Abdul Nasir Khan
    Mazhar Ali
    Adil Adeel
    Atta ur Rehman Khan
    Junaid Shuja
    [J]. Multimedia Tools and Applications, 2019, 78 : 24595 - 24615
  • [50] iPri: Context-Aware Access Control and Privacy Policy Recommendation
    Li, Guoyun
    Zhang, Yaozhi
    Yu, Xianqi
    Sun, Yuqing
    [J]. IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 370 - 370