A Location Temporal Based Access Control Model for IoTs

被引:1
|
作者
Lee, Chao [1 ]
Guo, Yunchuan [1 ]
Yin, Lihua [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100185, Peoples R China
关键词
Access Control; Internet of Thinas; Location; Temporal; Infommtion policy;
D O I
10.1016/j.aasri.2013.10.053
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoTs) is a hot topic in recent years, and its various applications have been applied in several fields. The essence of IoTs is to connect all the things including the devices embedded RFID, sensors, etc. together, to help people utilizing the information from the things to improve their life. The things are always located at different places at different times, and the information of the thing may have different access right at different location during different time. Therefore, the access control mechanism in IoTs should consider location and temporary constraints in order to enhance the security of an application. In this paper, we propose a model that combines location and time with security level to control access to the information within the sensing layer of the IoTs. This model is called Location-Temporal Access Control Model(LTAC). The main principle of LTAC is its use of a lattice approach to decrease the size of policy bases. We show that how the different components in the model are related with location and how this location information can be used to determine whether a subject has access to a given object. (C) 2013 The Authors. Published by Elsevier B.V.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [1] An access control model for Location Based Services
    Dunne, Cameron Ross
    Candebat, Thibault
    Gray, David
    [J]. WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 49 - 58
  • [2] A Temporal Semantic-Based Access Control Model
    Ravari, Ali Noorollahi
    Amini, Morteza
    Jalili, Rasool
    [J]. ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 559 - 568
  • [3] Towards a location-based mandatory access control model
    Ray, I
    Kumar, M
    [J]. COMPUTERS & SECURITY, 2006, 25 (01) : 36 - 44
  • [4] Spatio Temporal Emergency Role Based Access Control (STEM-RBAC) A Time and Location Aware Role Based Access Control Model with a Break the Glass Mechanism
    Georgakakis, Emmanouil
    Nikolidakis, Stefanos A.
    Vergados, Dimitrios D.
    Douligeris, Christos
    [J]. 2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
  • [5] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [6] GTHBAC: A Generalized Temporal History Based Access Control Model
    Ali Noorollahi Ravari
    Jafar Haadi Jafarian
    Morteza Amini
    Rasool Jalili
    [J]. Telecommunication Systems, 2010, 45 : 111 - 125
  • [7] GTHBAC: A Generalized Temporal History Based Access Control Model
    Ravari, Ali Noorollahi
    Jafarian, Jafar Haadi
    Amini, Morteza
    Jalili, Rasool
    [J]. TELECOMMUNICATION SYSTEMS, 2010, 45 (2-3) : 111 - 125
  • [8] A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)
    Xu, Ronghua
    Chen, Yu
    Blasch, Erik
    Chen, Genshe
    [J]. SENSORS AND SYSTEMS FOR SPACE APPLICATIONS XI, 2018, 10641
  • [9] A Dynamic Privacy Aware Access Control Model for Location Based Services
    Karimi, Leila
    Palanisamy, Balaji
    Joshi, James
    [J]. 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 554 - 557
  • [10] Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs
    Chen, Hsing-Chung
    Chang, Chia-Hui
    Leu, Fang-Yie
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 120 - 125