Adaptive Risk-Aware Access Control Model for Internet of Things

Thavy Mony Annanda Rath, Jean-Noël Colin

Résultats de recherche: Contribution dans un livre/un catalogue/un rapport/dans les actes d'une conférenceArticle dans les actes d'une conférence/un colloque

170 Téléchargements (Pure)

Résumé

IoT technology allows people to connect to and control devices remotely anywhere and anytime. However, serious concerns are raised over access control of sensitive IoT devices (e.g. portable health device) and personal information pertaining to them. The static access control model used in conventional system, which does not take into account the profile and behaviour of the agent requesting access to the system to determine the risk associated with the request, does not fit well to be used in some scenarios of some IoT application domains (e.g. smart healthcare). In this paper, we propose an adaptive risk-aware access control and the integration of this concept into the existing access control models, such as attribute-based and privacy-aware role-based access control. The proposed model is designed to address both security and privacy concerns for data sharing in IoT system. A prototype of the access control system implemented in XACML based on the proposed model is also presented in this paper.
langue originaleAnglais
titreProceedings - 2017 International Workshop on Secure Internet of Things, SIoT 2017
EditeurInstitute of Electrical and Electronics Engineers Inc.
Pages40-49
Nombre de pages10
ISBN (Electronique)9781538645413
Les DOIs
Etat de la publicationPublié - 22 juin 2018
Evénement2017 International Workshop on Secure Internet of Things, SIoT 2017 - Oslo, Norvège
Durée: 15 sept. 2017 → …

Série de publications

NomProceedings - 2017 International Workshop on Secure Internet of Things, SIoT 2017

Une conférence

Une conférence2017 International Workshop on Secure Internet of Things, SIoT 2017
Pays/TerritoireNorvège
La villeOslo
période15/09/17 → …

Empreinte digitale

Examiner les sujets de recherche de « Adaptive Risk-Aware Access Control Model for Internet of Things ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation