{"title":"下一代计算:使用UCON和CapBAC模型实现多级集中访问控制,以保护物联网网络","authors":"Ankur Lohachab, Karambir","doi":"10.1109/IC3IOT.2018.8668191","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).","PeriodicalId":155587,"journal":{"name":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks\",\"authors\":\"Ankur Lohachab, Karambir\",\"doi\":\"10.1109/IC3IOT.2018.8668191\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).\",\"PeriodicalId\":155587,\"journal\":{\"name\":\"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"volume\":\"43 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3IOT.2018.8668191\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Communication, Computing and Internet of Things (IC3IoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3IOT.2018.8668191","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Next Generation Computing: Enabling Multilevel Centralized Access Control using UCON and CapBAC Model for securing IoT Networks
Internet of Things (IoT) with its advance processing, storage and communication approaches has become a prominent area of research to comply with the needs of various applications. Cloud computing and its extensively accepted services, are facilitating wide scale deployment of IoT devices through integration with edge or Fog computing, along with various others initiatives, such as Software Defined Networks (SDN) and Network Function Virtualization (NFV). In this paper, we utilize these technologies to propose hybrid access control architecture based on the integration of Usage and Capability based access model for authorizing the legitimate network entities to access resources and to ensure better security of these networks. We also specify, implement and test the correctness of our model using Access Control Policy Tool (ACPT).