skip to main content
10.1145/3524458.3547125acmconferencesArticle/Chapter ViewAbstractPublication PagesgooditConference Proceedingsconference-collections
Work in Progress

A Decentralized Architecture for Dynamic and Federated Access Control Facilitating Smart Tourism Services

Authors Info & Claims
Published:07 September 2022Publication History

ABSTRACT

Edge computing and the Internet of Things (IoT) are inextricably linked, and much work has been devoted to strengthening their symbiotic relationship, providing better coverage and quality of service. These solutions are typically vertically tailored, provider-specific and bound to work within one administrative domain, as they presume direct deployment and ownership of the resources controlled in a centralised fashion. This model has effectively created a myriad of physically interconnected elements, logically broken down into separate domain-specific islands, each possibly applying different security/privacy policies, device and process control mechanisms, service access and provisioning schemes etc. To address this data and service balkanization phenomena, complex and time-consuming interactions between multiple providers are required to set up and operate federation of resources across domains and/or providers. Without loss of generality, we envision a scenario where stakeholders in a Smart Tourism ecosystem participate in resource federations to enrich their services and exploit complementarities. In this context, we present a decentralized architecture, relying on Distributed Ledger Technology (DLT), providing a flexible and effective federated access control mechanism to data and services.

References

  1. Daniel Abadi. 2012. Consistency Tradeoffs in Modern Distributed Database System Design: CAP is Only Part of the Story. Computer 45, 2 (2012), 37–42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Shorouq Alansari, Federica Paci, and Vladimiro Sassone. 2017. A Distributed Access Control System for Cloud Federations. In Proc. of IEEE Conference on Distributed Computing Systems (ICDCS). 2131–2136.Google ScholarGoogle ScholarCross RefCross Ref
  3. Abdulrahman Almutairi, Muhammad Sarfraz, Saleh Basalamah, Walid Aref, and Arif Ghafoor. 2012. A Distributed Access Control Architecture for Cloud Computing. IEEE Software 29, 2 (2012), 36–44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Paolo Bellavista, Dimitri Belli, Stefano Chessa, and Luca Foschini. 2019. A Social-Driven Edge Computing Architecture for Mobile Crowd Sensing Management. IEEE Communications Magazine 57, 4 (2019), 68–73.Google ScholarGoogle ScholarCross RefCross Ref
  5. Eric A. Brewer. 2000. Towards Robust Distributed Systems. In Proc. of Annual ACM Symposium on Principles of Distributed Computing (Portland, Oregon, USA) (PODC ’00). ACM, New York, NY, USA, 7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Armir Bujari, Claudio Bergamini, Antonio Corradi, Luca Foschini, Claudio E. Palazzi, and Andrea Sabbioni. 2020. A Geo-Distributed Architectural Approach Favouring Smart Tourism Development in the 5G Era. In Proc. of EAI International Conference on Smart Objects and Technologies for Social Good (Antwerp, Belgium). ACM, New York, NY, USA, 12–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the Bitcoin network. In Proc. of IEEE P2P. 1–10.Google ScholarGoogle ScholarCross RefCross Ref
  8. Damiano Di Francesco Maesa, Paolo Mori, and Laura Ricci. 2017. Blockchain Based Access Control. In Distributed Applications and Interoperable Systems. Springer International Publishing, 206–220.Google ScholarGoogle Scholar
  9. Francis Asuncion et al.2021. Connecting supplier and DoD Blockchains for Transparent Part Tracking. Blockchain: Research and Applications 2, 3 (2021).Google ScholarGoogle Scholar
  10. Fariba Ghaffari, Emmanuel Bertin, Julien Hatin, and Noel Crespi. 2020. Authentication and Access Control based on Distributed Ledger Technology: A survey. In Proc. of Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS). 79–86.Google ScholarGoogle ScholarCross RefCross Ref
  11. Florian Glaser and Luis Bezzenberger. 2015. Beyond Cryptocurrencies - A Taxonomy of Decentralized Consensus Systems. In European Conference on Information Systems.Google ScholarGoogle Scholar
  12. J. Göbel and A.E. Krzesinski. 2017. Increased block size and Bitcoin blockchain dynamics. In Proc. of International Telecommunication Networks and Applications Conference (ITNAC). 1–6.Google ScholarGoogle Scholar
  13. Niclas Kannengießer, Sebastian Lins, Tobias Dehling, and Ali Sunyaev. 2019. What Does Not Fit Can be Made to Fit! Trade-Offs in Distributed Ledger Technology Designs. In HICSS.Google ScholarGoogle Scholar
  14. Ana Klimovic, Yawen Wang, Christos Kozyrakis, Patrick Stuedi, Jonas Pfefferle, and Animesh Trivedi. 2018. Understanding Ephemeral Storage for Serverless Analytics. In Proc. of USENIX Annual Technical Conference (USENIX ATC). USENIX Association, Boston, MA, 789–794.Google ScholarGoogle Scholar
  15. Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, and Shoji Kasahara. 2020. IOTA-Based Access Control Framework for the Internet of Things. In 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS). 87–95.Google ScholarGoogle Scholar
  16. Andrea Sabbioni, Thomas Villano, and Antonio Corradi. 2022. An Architecture for Service Integration to Fully Support Novel Personalized Smart Tourism Offerings. Sensors 22, 4 (2022).Google ScholarGoogle Scholar
  17. Sehrish Shafeeq, Masoom Alam, and Abid Khan. 2019. Privacy aware decentralized access control system. Future Generation Computer Systems 101 (2019), 420–433.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, and Elisa Bertino. 2013. Collaboration in multicloud computing environments: Framework and security issues. Computer 46, 2 (2013), 76–84.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bojan Suzic, Bernd Prünster, Dominik Ziegler, Alexander Marsalek, and Andreas Reiter. 2016. Balancing Utility and Security: Securing Cloud Federations of Public Entities. In Proc. of OTM 2016 Conferences, Christophe Debruyne, Hervé Panetto, Robert Meersman, Tharam Dillon, eva Kühn, Declan O’Sullivan, and Claudio Agostino Ardagna (Eds.). Springer International Publishing, Cham, 943–961.Google ScholarGoogle Scholar
  20. Shangping Wang, Yinglong Zhang, and Yaling Zhang. 2018. A Blockchain-Based Framework for Data Sharing With Fine-Grained Access Control in Decentralized Storage Systems. IEEE Access 6(2018), 38437–38450.Google ScholarGoogle ScholarCross RefCross Ref
  21. Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, and Muhammad Imran. 2020. An Overview on Smart Contracts: Challenges, Advances and Platforms. Future Generation Computer Systems 105 (2020), 475–491.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Decentralized Architecture for Dynamic and Federated Access Control Facilitating Smart Tourism Services

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        GoodIT '22: Proceedings of the 2022 ACM Conference on Information Technology for Social Good
        September 2022
        436 pages
        ISBN:9781450392846
        DOI:10.1145/3524458

        Copyright © 2022 Owner/Author

        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 September 2022

        Check for updates

        Qualifiers

        • Work in Progress
        • Research
        • Refereed limited

        Upcoming Conference

        GoodIT '24
      • Article Metrics

        • Downloads (Last 12 months)36
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format