Enhanced dynamic team access control for collaborative Internet of Things using context

Periodicals(2021)

引用 2|浏览1
暂无评分
摘要
AbstractSummaryThe development of the Internet of Things (IoT) aims to overcome security issues especially in critical areas that require integrity, confidentiality and a high level of privacy of the data. Among security challenges, the access control model should be well defined and adapted to the characteristics and security requirements of IoT applications. The work presented here proposes big enforcement of security for dynamic team access control using context information in order to provide granular and secure authorizations with different access control levels related to collaborative IoT. The enhanced dynamic team access control (EDTMAC) model introduces a formal theoretical model which relies on the top of the role‐based access control model. The use of different context information with a global context information security policy and security rules raised the model strength against unauthorized access and avoided security breaches such as the leak of information by providing the least privileges for the users. The result of EDTMAC analysis shows that the model is well adapted to IoT dynamic nature and collaborative IoT activities for teams. Moreover, the model is flexible and scalable, user‐driven, reliable, and secure against unauthorized access requests. The developed model supports the well‐known least‐privilege principle and separation of duties for the team members. In addition, it allows easy management of the teams, provides fine‐grained access control authorizations and supports delegation.This paper provides an Enhanced dynamic team access control for collaborative internet of things using context, in which EDTMAC model is formally presented and implemented. Its security is investigated and outlined in different figures. Also, it is compared to other models which are provided in a table. The results show that there are no security breaches or unauthorized access that guarantee the confidentiality and privacy of data. Furthermore, the model is inspected from IoT characteristics where the result is summarized in the table. View Figure
更多
查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要