skip to main content
10.1145/3589608.3595082acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
poster

Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices

Published:24 May 2023Publication History

ABSTRACT

The significant rise in the usage of IoT devices and their security issues has created a demand for improved security for these systems. Unfortunately, no standard IoT architecture exists, making the development of security solutions for IoT systems difficult. Towards this end, we leverage an IoT framework to create a generic IoT software architecture and integrate it with an extension of the RBAC model incorporating the time and location of users to determine access to different IoT resources. We provide a prototype implementation of the integrated architecture to show its feasibility.

References

  1. Ramadan Abdunabi, Mustafa Al-Lail, Indrakshi Ray, and Robert B France. 2013. Specification, validation, and enforcement of a generalized spatio-temporal role-based access control model. IEEE Systems Journal 7, 3 (2013), 501--515.Google ScholarGoogle ScholarCross RefCross Ref
  2. Monjur Ahmed and Alan T. Litchfield. 2018. Taxonomy for Identification of Security Issues in Cloud Computing Environments. Journal of Computer Information Systems 58, 1 (2018), 79--88. https://doi.org/10.1080/08874417.2016.1192520 arXiv:https://doi.org/10.1080/08874417.2016.1192520Google ScholarGoogle ScholarCross RefCross Ref
  3. Asma Alshehri and Ravi Sandhu. 2016. Access control models for cloud-enabled internet of things: A proposed architecture and research agenda. In 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). IEEE, 530--538.Google ScholarGoogle ScholarCross RefCross Ref
  4. Alessio Botta, Walter De Donato, Valerio Persico, and Antonio Pescapé. 2016. Integration of cloud computing and internet of things: a survey. Future generation computer systems 56 (2016), 684--700.Google ScholarGoogle Scholar
  5. Martin Fowler. 2004. UML distilled: a brief guide to the standard object modeling language. Addison-Wesley Professional.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi. 2013. A capability- based security approach to manage access control in the internet of things. Mathematical and Computer Modelling 58, 5--6 (2013), 1189--1205.Google ScholarGoogle ScholarCross RefCross Ref
  7. Parikshit N Mahalle, Bayu Anggorojati, Neeli R Prasad, and Ramjee Prasad. 2013. Identity authentication and capability based access control (iacac) for the internet of things. Journal of Cyber Security and Mobility 1, 4 (2013), 309--348.Google ScholarGoogle Scholar
  8. Michele Nitti, Virginia Pilloni, Giuseppe Colistra, and Luigi Atzori. 2015. The virtual object as a major element of the internet of things: a survey. IEEE Communications Surveys & Tutorials 18, 2 (2015), 1228--1240.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Chayan Sarkar, Akshay Uttama Nambi SN, R Venkatesha Prasad, Abdur Rahim, Ricardo Neisse, and Gianmarco Baldini. 2014. DIAT: A scalable distributed architecture for IoT. IEEE Internet of Things journal 2, 3 (2014), 230--239.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies
            May 2023
            218 pages
            ISBN:9798400701733
            DOI:10.1145/3589608

            Copyright © 2023 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 May 2023

            Check for updates

            Qualifiers

            • poster

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%
          • Article Metrics

            • Downloads (Last 12 months)45
            • Downloads (Last 6 weeks)2

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader