Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach

P. NancyAmbritta, P. Railkar, P. Mahalle
{"title":"Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach","authors":"P. NancyAmbritta, P. Railkar, P. Mahalle","doi":"10.13052/JICTS2245-800X.211","DOIUrl":null,"url":null,"abstract":"The Future Internet (FI) sees the world of objects completely connected over the Internet all the time. It is like opening one’s network doors of say home, companies and organizations to the world where it increases efficiency but at any case should not compromise security by exposing sensitive information, presenting tremendous challenge towards access control and identity management in FI. A well-managed identity management system should provide necessary tools for controlling user access and access to critical information. A fitting example will be the IoT (Internet of Things) where every object will be smart and will take advantage of cloud for storage and processing power. In this paper we provide an introduction to Identity and access management in FI followed by a simplified architecture of the FI and its components. We then proceed by providing a short description about the frequent threats to data stored on cloud along with possible mitigation techniques to the threats.We also provide a comparative study of existing work on access control and propose a method to overcome the limitation of the existing techniques where sensitive organizational information (access policy) is exposed to the cloud. We address this issue in IAMFI by extending the Attribute based encryption Journal of ICT, Vol. 2 1, 1–36. doi: 10.13052/jicts2245-800X.211 c © 2014 River Publishers. All rights reserved. 2 Nancy Ambritta P. et al. technique and allowing users to have control over their attribute exposure at the time of requesting access. We also provide a mechanism in IAMFI for distributed attribute and key management for various users thereby reducing the overhead at a single site.","PeriodicalId":394466,"journal":{"name":"J. ICT Stand.","volume":"161 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. ICT Stand.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.13052/JICTS2245-800X.211","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

The Future Internet (FI) sees the world of objects completely connected over the Internet all the time. It is like opening one’s network doors of say home, companies and organizations to the world where it increases efficiency but at any case should not compromise security by exposing sensitive information, presenting tremendous challenge towards access control and identity management in FI. A well-managed identity management system should provide necessary tools for controlling user access and access to critical information. A fitting example will be the IoT (Internet of Things) where every object will be smart and will take advantage of cloud for storage and processing power. In this paper we provide an introduction to Identity and access management in FI followed by a simplified architecture of the FI and its components. We then proceed by providing a short description about the frequent threats to data stored on cloud along with possible mitigation techniques to the threats.We also provide a comparative study of existing work on access control and propose a method to overcome the limitation of the existing techniques where sensitive organizational information (access policy) is exposed to the cloud. We address this issue in IAMFI by extending the Attribute based encryption Journal of ICT, Vol. 2 1, 1–36. doi: 10.13052/jicts2245-800X.211 c © 2014 River Publishers. All rights reserved. 2 Nancy Ambritta P. et al. technique and allowing users to have control over their attribute exposure at the time of requesting access. We also provide a mechanism in IAMFI for distributed attribute and key management for various users thereby reducing the overhead at a single site.
未来互联网中的身份和访问管理(IAMFI):一种行为建模方法
未来互联网(Future Internet, FI)认为世界上所有的物体都是通过互联网完全连接的。这就像打开一个家庭、公司和组织的网络大门,提高了效率,但在任何情况下都不应该因为暴露敏感信息而损害安全,这对FI的访问控制和身份管理提出了巨大的挑战。一个管理良好的身份管理系统应该为控制用户访问和访问关键信息提供必要的工具。一个合适的例子是物联网(IoT),其中每个对象都将是智能的,并将利用云来存储和处理能力。在本文中,我们介绍了FI中的身份和访问管理,然后介绍了FI及其组件的简化架构。然后,我们将简要介绍存储在云上的数据所面临的常见威胁,以及针对这些威胁可能采用的缓解技术。我们还对现有的访问控制工作进行了比较研究,并提出了一种方法来克服现有技术的限制,其中敏感的组织信息(访问策略)暴露于云。我们通过扩展基于属性的加密在IAMFI中解决了这个问题,ICT杂志,Vol. 21, 1 - 36。doi: 10.13052 / jicts2245 - 800 x。211 c©2014 River Publishers。版权所有。2 Nancy Ambritta P. et al.技术,并允许用户在请求访问时控制其属性暴露。我们还在IAMFI中提供了一种机制,用于各种用户的分布式属性和密钥管理,从而减少了单个站点的开销。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信