Adaptive Risk-Aware Access Control Model for Internet of Things

Thavy Mony Annanda Rath, Jean-Noël Colin

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

168 Downloads (Pure)

Abstract

IoT technology allows people to connect to and control devices remotely anywhere and anytime. However, serious concerns are raised over access control of sensitive IoT devices (e.g. portable health device) and personal information pertaining to them. The static access control model used in conventional system, which does not take into account the profile and behaviour of the agent requesting access to the system to determine the risk associated with the request, does not fit well to be used in some scenarios of some IoT application domains (e.g. smart healthcare). In this paper, we propose an adaptive risk-aware access control and the integration of this concept into the existing access control models, such as attribute-based and privacy-aware role-based access control. The proposed model is designed to address both security and privacy concerns for data sharing in IoT system. A prototype of the access control system implemented in XACML based on the proposed model is also presented in this paper.
Original languageEnglish
Title of host publicationProceedings - 2017 International Workshop on Secure Internet of Things, SIoT 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages40-49
Number of pages10
ISBN (Electronic)9781538645413
DOIs
Publication statusPublished - 22 Jun 2018
Event2017 International Workshop on Secure Internet of Things, SIoT 2017 - Oslo, Norway
Duration: 15 Sept 2017 → …

Publication series

NameProceedings - 2017 International Workshop on Secure Internet of Things, SIoT 2017

Conference

Conference2017 International Workshop on Secure Internet of Things, SIoT 2017
Country/TerritoryNorway
CityOslo
Period15/09/17 → …

Keywords

  • access control
  • IoT
  • risk-aware

Fingerprint

Dive into the research topics of 'Adaptive Risk-Aware Access Control Model for Internet of Things'. Together they form a unique fingerprint.

Cite this