Abstract
Real-world things are increasingly becoming fully qualified members of the Web. From, pacemakers and medical records to children’s toys and sneakers, things are connected over the Web and publish information that is available for the whole world to see. It is crucial that there is secure access to this Web of Things (WoT) and to the related information published by things on the Web. In this paper, we introduce an architecture that encompasses Web-enabled things in a secure and scalable manner. Our architecture utilizes the features of the well-known role-based access control (RBAC) to specify the access control policies to the WoT, and we use cryptographic keys to enforce such policies. This approach enables prescribers to WoT services to control who can access what things and how access can continue or should terminate, thereby enabling privacy and security of large amount of data that these things are poised to flood the future Web with.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-based access control (RBAC): Features and motivations. In: Proceedings of 11th Annual Computer Security Application Conference, pp. 241–248 (1995)
Ferraiolo, D., Kuhn, D.R., Chandramouli, R.: Role-based access control. Artech House (2003)
Ferraiolo, D., Kuhn, D.R.: Role-based access controls, arXiv preprint arXiv:0903.2171 (2009)
Guinard, D., Trifa, V.: Towards the web of things: Web mashups for embedded devices, Workshop on Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM 2009). In: Proceedings of WWW (International World Wide Web Conferences), Madrid, Spain (2009)
Mathew, S.S., Atif, Y., Sheng, Q.Z., Maamar, Z.: Towards an Efficient Sales Pitch with the Web of Things. In: ICEBE, 2013, pp. 377–384 (2013)
Mathew, S.S., Atif, Y., Sheng, Q.Z., Maamar, Z.: Building sustainable parking lots with the Web of Things. In: Personal and Ubiquitous Computing, 2013, pp. 1–13. Springer, Heidelberg (2013)
Mathew, S.S., Atif, Y., Sheng, Q.Z., Maamar, Z.: Ambient things on the Web. Journal of Ubiquitous Systems and Pervasive Networks (JUSPN) 1(1), 1–8 (2010, 2013)
Mathew, S.S.: Classifying and Clustering the Web of Things, University of Adelaide, School of Computer Science (2013), http://hdl.handle.net/2440/83366
Mathew, S.S., Atif, Y., Sheng, Q.Z., Maamar, Z.: The Web of Things - Challenges and Enabling Technologies. In: Bessis, N., Xhafa, F., Varvarigou, D., Hill, R., Li, M. (eds.) Internet of Things & Inter-cooperative Comput. Technol. SCI, vol. 460, pp. 1–24. Springer, Heidelberg (2013)
Mathew, S.S., Atif, Y., Sheng, Q.Z., Maamar, Z.: Web of Things: Description, Discovery and Integration. In: International Conference on Internet of Things and Cyber, Physical and Social Computing (iThings/CPSCom), pp. 9–15. IEEE (2013)
Müldner, T., Miziolek, J.K., Leighton, G.: Succinct Access Control Policies for Published XML Datasets. In: ICEIS, vol. (1), pp. 380–385 (2008)
Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC) 3, 85–106 (2000)
Oh, S., Park, S.: Task–role-based access control model, Information Systems, vol. 28, pp. 533–562. Elsevier (2003)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer Society 29(2), 38–47 (1996)
Security frameworks for open systems: Access control framework, Technical Report ISO/IEC 10181-3, ISO (1996), http://www.iso.org/iso/catalogue_detail.htm?csnumber=18199
Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In: DBSec, 1997, vol. 113, pp. 166–181 (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Barka, E., Mathew, S.S., Atif, Y. (2015). Securing the Web of Things with Role-Based Access Control. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E. (eds) Codes, Cryptology, and Information Security. C2SI 2015. Lecture Notes in Computer Science(), vol 9084. Springer, Cham. https://doi.org/10.1007/978-3-319-18681-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-18681-8_2
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18680-1
Online ISBN: 978-3-319-18681-8
eBook Packages: Computer ScienceComputer Science (R0)