A proposal of a distributed access control over Fog computing: The ITS use case

Internet of Things (IoT) raises many security challenges in relation with the different applications that can be deployed over these environments. IoT access control systems must respond to the new IoT requirements such as scalability, dynamicity, real-time interaction and resources constraint. The goal of this paper is to propose an approach based on Fog and Distributed Hash Table (DHT) toward access control for the Internet of Things. To evaluate the performances of our access solution, we used NS-3 and SUMO. The preliminary obtained results show acceptable overhead for the considered Intelligent Transport System (ITS) scenario.

[1]  Guillaume Urvoy-Keller,et al.  Data indexing in peer-to-peer DHT networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[2]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[3]  Antonio F. Gómez-Skarmeta,et al.  Distributed Capability-based Access Control for the Internet of Things , 2013, J. Internet Serv. Inf. Secur..

[4]  Alexander V. Smirnov,et al.  Context-based access control model for smart space , 2013, 2013 5th International Conference on Cyber Conflict (CYCON 2013).

[5]  Srdjan Vukmirovic,et al.  Role-Based Access Control Model Supporting Regional Division in Smart Grid System , 2013, 2013 Fifth International Conference on Computational Intelligence, Communication Systems and Networks.

[6]  Bruce Christianson,et al.  A Survey of Access Control Models in Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.

[7]  Ru-chuan Wang,et al.  An efficient authentication and access control scheme for perception layer of Internet of Things , 2014 .

[8]  Sang-Soo Yeo,et al.  Dynamic Access Control Model for Security Client Services in Smart Grid , 2014, Int. J. Distributed Sens. Networks.

[9]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[10]  Andrea Zanella,et al.  Internet of Things for Smart Cities , 2014, IEEE Internet of Things Journal.

[11]  Hamid Mcheick,et al.  Toward an Access Control Model for IOTCollab , 2015, ANT/SEIT.

[12]  Dimitris Gritzalis,et al.  Access Control Issues in Utilizing Fog Computing for Transport Infrastructure , 2015, CRITIS.

[13]  Tom H. Luan,et al.  Fog Computing: Focusing on Mobile Users at the Edge , 2015, ArXiv.

[14]  Lingyun Jiang,et al.  Task-role-based Access Control Model in Smart Health-care System , 2015 .

[15]  K. R. Venugopal,et al.  Token Based Privacy Preserving Access Control in Wireless Sensor Networks , 2015, 2015 International Conference on Advanced Computing and Communications (ADCOM).

[16]  Fang Gao,et al.  Access Features Analysis of Things in the Internet of Things , 2016, 2016 3rd International Conference on Information Science and Control Engineering (ICISCE).

[17]  Hella Kaffel Ben Ayed,et al.  Generic Access Control System for Ad Hoc MCC and Fog Computing , 2016, CANS.

[18]  Vladimir A. Oleshchuk,et al.  An attribute based access control scheme for secure sharing of electronic health records , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).

[19]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[20]  Suat Özdemir,et al.  A fog computing based smart grid model , 2016, 2016 International Symposium on Networks, Computers and Communications (ISNCC).

[21]  Arslan Munir,et al.  IFCIoT: Integrated Fog Cloud IoT Architectural Paradigm for Future Internet of Things , 2017, ArXiv.

[22]  Xin Wang,et al.  A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing , 2017, Sensors.

[23]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[24]  Ahmed Barnawi,et al.  Attribute Based Access Control (ABAC) for HER in Fog Computing Environment , 2017 .

[25]  Hella Kaffel Ben Ayed,et al.  An IDMS approach towards privacy and new requirements in IoT , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[26]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.