skip to main content
10.1145/3007592.3007596acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
poster

Privacy-enhancing Federated Middleware for the Internet of Things

Authors Info & Claims
Published:12 December 2016Publication History

ABSTRACT

OAuthing and IGNITE are federated middleware that together provide an improved model for sharing data from Internet of Things (IoT) devices to Cloud Services. OAuthing provides an identity broker and authorization server that issues OAuth2 anonymised credentials based on upstream identities from the User's Identity Provider. IGNITE is a cloud-based message router that uses identity and authorization policies from OAuthing to instantiate each user a cloud-based container for sharing their data.

The demonstration will show the post-manufacturing process to register a device with OAuthing, together with a user "claiming" a device. Once the device is claimed it will be connected to a third-party cloud service, with full user consent to create an policy. We will then demonstrate the policy in action and the creation of a cloud-instance on behalf of the user.

References

  1. S. Cirani, M. Picone, P. Gonizzi, L. Veltri, and G. Ferrari. IoT-OAS: An OAuth-based Authorization Service Architecture for Secure Services in IoT Scenarios. 2015.Google ScholarGoogle Scholar
  2. H. Desruelle, J. Lyle, S. Isenberg, and F. Gielen. On the challenges of building a web-based ubiquitous application platform. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing, pages 733--736. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Emerson, Y.-K. Choi, D.-Y. Hwang, K.-S. Kim, and K.-H. Kim. An oauth based authentication mechanism for iot networks. In Information and Communication Technology Convergence (ICTC), 2015 International Conference on, pages 1072--1074. IEEE, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  4. P. Fremantle, B. Aziz, P. Scott, and J. Kopecky. Federated Identity and Access Management for the Internet of Things. In 3rd International Workshop on the Secure IoT, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. P. Fremantle, J. Kopecky, and B. Aziz. Web api management meets the internet of things. In Services and Applications over Linked APIs and Data âĂŞ SALAD2015, 2015.Google ScholarGoogle Scholar
  6. IETF. Authentication and authorization for constrained environments (ace) - documents. https://datatracker.ietf.org/wg/ace/documents/. (Accessed on 30th August 2016).Google ScholarGoogle Scholar
  7. A. Niruntasukrat, C. Issariyapat, P. Pongpaibool, K. Meesublak, P. Aiumsupucgul, and A. Panya. Authorization mechanism for mqtt-based internet of things. In 2016 IEEE International Conference on Communications Workshops (ICC), pages 290--295. IEEE, 2016.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    Middleware Posters and Demos '16: Proceedings of the Posters and Demos Session of the 17th International Middleware Conference
    December 2016
    39 pages
    ISBN:9781450346665
    DOI:10.1145/3007592

    Copyright © 2016 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 12 December 2016

    Check for updates

    Qualifiers

    • poster
    • Research
    • Refereed limited
  • Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader