595,939 research outputs found

    Smart object-oriented access control: Distributed access control for the Internet of Things

    Get PDF
    Ensuring that data and devices are secure is of critical importance to information technology. While access control has held a key role in traditional computer security, its role in the evolving Internet of Things is less clear. In particular, the access control literature has suggested that new challenges, such as multi-user controls, fine-grained controls, and dynamic controls, prompt a foundational re-thinking of access control. We analyse these challenges, finding instead that the main foundational challenge posed by the Internet of Things involves decentralization: accurately describing access control in Internet of Things environments (e.g., the Smart Home) requires a new model of multiple, independent access control systems. To address this challenge, we propose a meta-model (i.e., a model of models): Smart Object-Oriented Access Control (SOOAC). This model is an extension of the XACML framework, built from principles relating to modularity adapted from object-oriented programming and design. SOOAC draws attention to a new class of problem involving the resolution of policy conflicts that emerge from the interaction of smart devices in the home. Contrary to traditional (local) policy conflicts, these global policy conflicts emerge when contradictory policies exist across multiple access control systems. We give a running example of a global policy conflict involving transitive access. To automatically avoid global policy conflicts before they arise, we extend SOOAC with a recursive algorithm through which devices communicate access requests before allowing or denying access themselves. This algorithm ensures that both individual devices and the collective smart home are secure. We implement SOOAC within a prototype smart home and assess its validity in terms of effectiveness and efficiency. Our analysis shows that SOOAC is successful at avoiding policy conflicts before they emerge, in real time. Finally, we explore improvements that can be made to SOOAC and suggest directions for future work

    ACCESS CONTROL FOR THE INTERNET OF THINGS

    Get PDF
    Access control for the internet of things controlli i qasjes ne koncept Ă«shtĂ« siguria qĂ« minimizon rrezikun pĂ«r biznes apo organizata tĂ« ndryshme tĂ« qasjes sĂ« paautorizuar nĂ« sistemet fizike dhe logjike. Ndryshe mundemi tĂ« themi se Ă«shtĂ« njĂ« teknik qĂ« rregullon cilĂ«t persona çfarĂ« munden te shikojnĂ« dhe çfarĂ« munden tĂ« perdorin nĂ« njĂ« mjedis informatikĂ«. Interneti i gjerave mundĂ«son shĂ«rbime qĂ« do ta pĂ«rmisojnĂ« jetĂ«n e pĂ«rditshme tĂ« njerzĂ«ve, do tĂ« krijojnĂ« biznese tĂ« reja dhe do tĂ« bĂ«jnĂ« ndĂ«rtesa, qytete dhe transportin mĂ« te zgjuar. Internet of things ka ardhur pĂ«r tĂ« pĂ«rshkruar njĂ« numer tĂ« teknologjive dhe diciplinave kĂ«rkimore qĂ« mundĂ«sojnĂ« internet pĂ«r tĂ« arritu jashtĂ« botĂ«s reale tĂ« objekteve fizike. “Things” ka identitet qĂ« vepron nĂ« hapsira tĂ« zgjuara duke pĂ«rdorur ndĂ«rfaqe intelegjente pĂ«r tĂ« lidhur dhe komunikuar brenda sociales, mjedisit rrethues dhe kontekstit tĂ« pĂ«rdoruesve. NdĂ«rsa po lĂ«vizim nga Things nĂ« rrjet nĂ« Internetin e GjĂ«rat (IoT), lindin kĂ«rkesa tĂ« reja tĂ« sigurisĂ«. Kontrolli i qasjes ne kete mjedis Ă«shtĂ« njĂ« problem i vĂ«shtir dhe sfidues, njĂ« sistem i kontrollit tĂ« qasjes duhet tĂ« jete i mjaftueshem pĂ«r tĂ« mbuluar kerkesat e aplikacioneve qĂ« perhapen pĂ«rmes IOT. Nga ana tjetĂ«r ky sistem duhet tĂ« jetĂ« i lehtĂ« i qas’shĂ«m dhe i zbatueshem. NĂ« kĂ«tĂ« dokument do tĂ« shpejgohet mĂ«nyra e pĂ«rdorimit tĂ« internet of things nĂ« access control, mĂ«nyra e pĂ«rdorimit dhe zbatitmi nĂ« aplikacionet qĂ« neve na nevoitet. Do tĂ« spjegojme mĂ«nyrĂ«n si tĂ« punojme pa çelĂ«sa publikĂ« dhe tĂ« krijojm njĂ« çelĂ«s simetrik tĂ« pĂ«rbashkĂ«t tĂ« enkriptimit qĂ« mund tĂ« pĂ«rdoret pĂ«r tĂ« siguruar komunikimin midis pĂ«rdoruesve tĂ« autorizuar dhe Things . Kjo formĂ« mundĂ«son privatĂ«sine e pĂ«rdoruesit dhe lehtĂ«son krijimin e aplikacionĂ«ve tĂ« reja

    After the Gold Rush: The Boom of the Internet of Things, and the Busts of Data-Security and Privacy

    Get PDF
    This Article addresses the impact that the lack of oversight of the Internet of Things has on digital privacy. While the Internet of Things is but one vehicle for technological innovation, it has created a broad glimpse into domestic life, thus triggering several privacy issues that the law is attempting to keep pace with. What the Internet of Things can reveal is beyond the control of the individual, as it collects information about every practical aspect of an individual’s life, and provides essentially unfettered access into the mind of its users. This Article proposes that the federal government and the state governments bend toward consumer protection while creating a cogent and predictable body of law surrounding the Internet of Things. Through privacy-by-design or self-help, it is imperative that the Internet of Things—and any of its unforeseen progeny—develop with an eye toward safeguarding individual privacy while allowing technological development

    An access control management protocol for Internet of things devices

    Get PDF
    Internet enabled computing devices are increasingly at risk of misuse by individuals or malware. Initially such misuse was targeted mainly at computers, however there is increasing targeting of tablet and smartphone devices. In this paper we examine an access control management protocol for Internet of things devices in order to attempt to provide some protection against misuse of such devices. Although anti-malware software is commonly used in computers, and is increasingly being used for tablets and smartphones, this may be a less practicable approach for Internet of things devices. The access control management protocol for Internet of things devices examined in this paper involves the use of physical proximity ‘registration’ for remote control of such devices, encryption of communications, verification of geo-location of the mobile device used to control the IoT device, safe operation controls, and exception reporting as a means of providing a tiered security approach for such devices

    Identity driven Capability based Access Control (ICAC) Scheme for the Internet of Things

    Get PDF
    • 

    corecore