A Location Temporal Based Access Control Model for IoTs

被引:1
|
作者
Lee, Chao [1 ]
Guo, Yunchuan [1 ]
Yin, Lihua [1 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100185, Peoples R China
关键词
Access Control; Internet of Thinas; Location; Temporal; Infommtion policy;
D O I
10.1016/j.aasri.2013.10.053
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of things (IoTs) is a hot topic in recent years, and its various applications have been applied in several fields. The essence of IoTs is to connect all the things including the devices embedded RFID, sensors, etc. together, to help people utilizing the information from the things to improve their life. The things are always located at different places at different times, and the information of the thing may have different access right at different location during different time. Therefore, the access control mechanism in IoTs should consider location and temporary constraints in order to enhance the security of an application. In this paper, we propose a model that combines location and time with security level to control access to the information within the sensing layer of the IoTs. This model is called Location-Temporal Access Control Model(LTAC). The main principle of LTAC is its use of a lattice approach to decrease the size of policy bases. We show that how the different components in the model are related with location and how this location information can be used to determine whether a subject has access to a given object. (C) 2013 The Authors. Published by Elsevier B.V.
引用
收藏
页码:15 / 20
页数:6
相关论文
共 50 条
  • [21] Wireless LAN Location-based Access Control
    Lagzdinyte-Budnike, I.
    Petrauskiene, R.
    Sarafiniene, N.
    Vilutis, G.
    Budnikas, A.
    [J]. ELEKTRONIKA IR ELEKTROTECHNIKA, 2012, 18 (09) : 105 - 108
  • [22] Blockchain-enabled Access Control with Fog Nodes for Independent IoTs
    Khaydaraliev, Mukhammaddiyor
    Rhie, Min-Hyung
    Kim, Ki-Hyung
    [J]. 36TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2022), 2022, : 78 - 83
  • [23] On the formalization and analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 399 - 452
  • [24] On the formal analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
  • [25] Spatio-Temporal Role Based Access Control for Physical Access Control Systems
    Geepalla, Emsaieb
    Bordbar, Behzad
    Du, Xiaofeng
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2013, : 39 - 42
  • [26] Privacy access control model with location constraints for XML services
    Zheng, Yi
    Chen, Yongming
    Hung, Patrick C. K.
    [J]. 2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOP, VOLS 1-2, 2007, : 371 - +
  • [27] Safeness Discussions on TRBAC and GTRBAC Model and an Improved Temporal Role-Based Access Control Model
    Liu, Meng
    Wang, Xuan
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (08): : 23 - 34
  • [28] Short paper: Towards a location-aware role-based access control model
    Ray, I
    Yu, LJ
    [J]. FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS, 2005, : 234 - 236
  • [29] STRoBAC - Spatial Temporal Role Based Access Control
    Kim Tuyen Le Thi
    Tran Khanh Dang
    Kuonen, Pierre
    Drissi, Houda Chabbi
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE - TECHNOLOGIES AND APPLICATIONS, PT II, 2012, 7654 : 201 - 211
  • [30] Security analysis for temporal role based access control
    Uzun, Emre
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    Ferrara, Anna
    Parlato, Gennaro
    Madhusudan, P.
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 961 - 996