ABSTRACT
Edge computing and the Internet of Things (IoT) are inextricably linked, and much work has been devoted to strengthening their symbiotic relationship, providing better coverage and quality of service. These solutions are typically vertically tailored, provider-specific and bound to work within one administrative domain, as they presume direct deployment and ownership of the resources controlled in a centralised fashion. This model has effectively created a myriad of physically interconnected elements, logically broken down into separate domain-specific islands, each possibly applying different security/privacy policies, device and process control mechanisms, service access and provisioning schemes etc. To address this data and service balkanization phenomena, complex and time-consuming interactions between multiple providers are required to set up and operate federation of resources across domains and/or providers. Without loss of generality, we envision a scenario where stakeholders in a Smart Tourism ecosystem participate in resource federations to enrich their services and exploit complementarities. In this context, we present a decentralized architecture, relying on Distributed Ledger Technology (DLT), providing a flexible and effective federated access control mechanism to data and services.
- Daniel Abadi. 2012. Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story. Computer 45, 2 (2012), 37–42.Google ScholarDigital Library
- Shorouq Alansari, Federica Paci, and Vladimiro Sassone. 2017. A Distributed Access Control System for Cloud Federations. In Proc. of IEEE Conference on Distributed Computing Systems (ICDCS). 2131–2136.Google ScholarCross Ref
- Abdulrahman Almutairi, Muhammad Sarfraz, Saleh Basalamah, Walid Aref, and Arif Ghafoor. 2012. A Distributed Access Control Architecture for Cloud Computing. IEEE Software 29, 2 (2012), 36–44.Google ScholarDigital Library
- Paolo Bellavista, Dimitri Belli, Stefano Chessa, and Luca Foschini. 2019. A Social-Driven Edge Computing Architecture for Mobile Crowd Sensing Management. IEEE Communications Magazine 57, 4 (2019), 68–73.Google ScholarCross Ref
- Eric A. Brewer. 2000. Towards Robust Distributed Systems. In Proc. of Annual ACM Symposium on Principles of Distributed Computing (Portland, Oregon, USA) (PODC ’00). ACM, New York, NY, USA, 7.Google ScholarDigital Library
- Armir Bujari, Claudio Bergamini, Antonio Corradi, Luca Foschini, Claudio E. Palazzi, and Andrea Sabbioni. 2020. A Geo-Distributed Architectural Approach Favouring Smart Tourism Development in the 5G Era. In Proc. of EAI International Conference on Smart Objects and Technologies for Social Good (Antwerp, Belgium). ACM, New York, NY, USA, 12–17.Google ScholarDigital Library
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In Proc. of IEEE P2P. 1–10.Google ScholarCross Ref
- Damiano Di Francesco Maesa, Paolo Mori, and Laura Ricci. 2017. Blockchain Based Access Control. In Distributed Applications and Interoperable Systems. Springer International Publishing, 206–220.Google Scholar
- Francis Asuncion et al.2021. Connecting supplier and DoD Blockchains for Transparent Part Tracking. Blockchain: Research and Applications 2, 3 (2021).Google Scholar
- Fariba Ghaffari, Emmanuel Bertin, Julien Hatin, and Noel Crespi. 2020. Authentication and Access Control based on Distributed Ledger Technology: A survey. In Proc. of Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS). 79–86.Google ScholarCross Ref
- Florian Glaser and Luis Bezzenberger. 2015. Beyond Cryptocurrencies - A Taxonomy of Decentralized Consensus Systems. In European Conference on Information Systems.Google Scholar
- J. Göbel and A.E. Krzesinski. 2017. Increased block size and Bitcoin blockchain dynamics. In Proc. of International Telecommunication Networks and Applications Conference (ITNAC). 1–6.Google Scholar
- Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2019. What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs. In HICSS.Google Scholar
- Ana Klimovic, Yawen Wang, Christos Kozyrakis, Patrick Stuedi, Jonas Pfefferle, and Animesh Trivedi. 2018. Understanding Ephemeral Storage for Serverless Analytics. In Proc. of USENIX Annual Technical Conference (USENIX ATC). USENIX Association, Boston, MA, 789–794.Google Scholar
- Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, and Shoji Kasahara. 2020. IOTA-Based Access Control Framework for the Internet of Things. In 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS). 87–95.Google Scholar
- Andrea Sabbioni, Thomas Villano, and Antonio Corradi. 2022. An Architecture for Service Integration to Fully Support Novel Personalized Smart Tourism Offerings. Sensors 22, 4 (2022).Google Scholar
- Sehrish Shafeeq, Masoom Alam, and Abid Khan. 2019. Privacy aware decentralized access control system. Future Generation Computer Systems 101 (2019), 420–433.Google ScholarDigital Library
- Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, and Elisa Bertino. 2013. Collaboration in multicloud computing environments: Framework and security issues. Computer 46, 2 (2013), 76–84.Google ScholarDigital Library
- Bojan Suzic, Bernd Prünster, Dominik Ziegler, Alexander Marsalek, and Andreas Reiter. 2016. Balancing Utility and Security: Securing Cloud Federations of Public Entities. In Proc. of OTM 2016 Conferences, Christophe Debruyne, Hervé Panetto, Robert Meersman, Tharam Dillon, eva Kühn, Declan O’Sullivan, and Claudio Agostino Ardagna (Eds.). Springer International Publishing, Cham, 943–961.Google Scholar
- Shangping Wang, Yinglong Zhang, and Yaling Zhang. 2018. A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems. IEEE Access 6(2018), 38437–38450.Google ScholarCross Ref
- Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, and Muhammad Imran. 2020. An Overview on Smart Contracts: Challenges, Advances and Platforms. Future Generation Computer Systems 105 (2020), 475–491.Google ScholarDigital Library
Index Terms
- A Decentralized Architecture for Dynamic and Federated Access Control Facilitating Smart Tourism Services
Recommendations
A dynamic context-aware access control architecture for e-services
The universal adoption of the Internet and the emerging web services technologies constitutes the infrastructure that enables the provision of a new generation of e-services and applications. However, the provision of e-services through the Internet ...
Attribute Based Access Control (ABAC)-Based Cross-Domain Access Control in Service-Oriented Architecture (SOA)
CSSS '12: Proceedings of the 2012 International Conference on Computer Science and Service SystemThe traditional role-based access control model (RBAC) can not meet the requirements of Service Oriented Architectures (SOA) on the distribution and openness, Attribute-Based Access Control (ABAC), which is more fine-grained in access control, is more ...
Access control for the services oriented architecture
SWS '07: Proceedings of the 2007 ACM workshop on Secure web servicesFederated Identity Management (FIdM) is being applied to Services Oriented Architecture (SOA) deployments that cross enterprise boundaries. Though federation is essential in order to address the distributed nature of SOA, these FIdM solutions have been ...
Comments