Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3176258.3176328acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things

Published: 13 March 2018 Publication History

Abstract

The concept of Internet of Things (IoT) has received considerable attention and development in recent years. There have been significant studies on access control models for IoT in academia, while companies have already deployed several cloud-enabled IoT platforms. However, there is no consensus on a formal access control model for cloud-enabled IoT. The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. Building upon ACO, operational and administrative access control models have been published for virtual object communication in cloud-enabled IoT illustrated by a use case of sensing speeding cars as a running example.
In this paper, we study AWS IoT as a major commercial cloud-IoT platform and investigate its suitability for implementing the afore-mentioned academic models of ACO and VO communication control. While AWS IoT has a notion of digital shadows closely analogous to VOs, it lacks explicit capability for VO communication and thereby for VO communication control. Thus there is a significant mismatch between AWS IoT and these academic models. The principal contribution of this paper is to reconcile this mismatch by showing how to use the mechanisms of AWS IoT to effectively implement VO communication models. To this end, we develop an access control model for virtual objects (shadows) communication in AWS IoT called AWS-IoT-ACMVO. We develop a proof-of-concept implementation of the speeding cars use case in AWS IoT under guidance of this model, and provide selected performance measurements. We conclude with a discussion of possible alternate implementations of this use case in AWS IoT.

References

[1]
Ala Al-Fuqaha, Mohsen Guizani, Mehdi Mohammadi, Mohammed Aledhari, and Moussa Ayyash. 2015. Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Comm. Surveys & Tutorials Vol. 17, 4 (2015), 2347--2376.
[2]
Asma Alshehri and Ravi Sandhu. 2016. Access Control Models for Cloud-Enabled Internet of Things: A Proposed Architecture and Research Agenda. In the 2nd IEEE International Conference on Collaboration and Internet Computing (CIC). IEEE, 530--538.
[3]
Asma Alshehri and Ravi Sandhu. 2017. Access Control Models for Virtual Object Communication in Cloud-Enabled IoT The 18th International Conference on Information Reuse and Integration (IRI). IEEE.
[4]
Jean Bacon, David M Eyers, Jatinder Singh, and Peter R Pietzuch. 2008. Access control in publish/subscribe systems. In the Second International Conference on Distributed Event-Based Systems. ACM, 23--34.
[5]
Smriti Bhatt, Farhan Patwa, and Ravi Sandhu. 2017. Access Control Model for AWS Internet of Things. In International Conference on Network and System Security. Springer, 721--736.
[6]
Alessio Botta, Walter De Donato, Valerio Persico, and Antonio Pescapé. 2014. On the integration of cloud computing and internet of things IEEE Int. Conf. on Future Internet of Things and Cloud (FiCloud). 23--30.
[7]
Li Da Xu, Wu He, and Shancang Li. 2014. Internet of things in industries: A survey. IEEE Trans. on Indust. Informatics Vol. 10, 4 (2014), 2233--2243.
[8]
Patrick Th Eugster and et all. 2003. The many faces of publish/subscribe. ACM computing surveys (CSUR) Vol. 35, 2 (2003), 114--131.
[9]
Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Generation Computer Systems Vol. 29, 7 (2013), 1645--1660.
[10]
Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, and Shahid Khan. 2012. Future internet: the internet of things architecture, possible applications and key challenges. In 10th IEEE Int. Conf. on Frontiers of IT. 257--260.
[11]
Michele Nitti, Virginia Pilloni, Giuseppe Colistra, and Luigi Atzori. 2015. The Virtual Object as a Major Element of the Internet of Things: a Survey. IEEE Communications Surveys & Tutorials Vol. 18, 2 (2015), 1228--1240.
[12]
Pritee Parwekar. 2011. From internet of things towards cloud of things. In 2nd IEEE Int. Conf. on Comp. and Comm. Tech. 329--333.
[13]
BB Prahlada Rao, Paval Saluia, Neetu Sharma, Ankit Mittal, and Shivay Veer Sharma. 2012. Cloud computing for Internet of Things and sensing based applications Sixth IEEE Int. Conference on Sensing Technology (ICST). 374--380.
[14]
Rodrigo Roman, Jianying Zhou, and Javier Lopez. 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks Vol. 57, 10 (2013), 2266--2279.
[15]
Yun Zhang, Farhan Patwa, and Ravi Sandhu. 2015. Community-based secure information and resource sharing in AWS public cloud 2015 IEEE International Conference on Collaboration and Internet Computing (CIC). IEEE, 46--53.

Cited By

View all
  • (2024)Research on IoT Device Access Technology based on the Power IoT Platform2024 39th Youth Academic Annual Conference of Chinese Association of Automation (YAC)10.1109/YAC63405.2024.10598720(1329-1332)Online publication date: 7-Jun-2024
  • (2022)Secure Virtual Objects CommunicationAccess Control Models and Architectures For IoT and Cyber Physical Systems10.1007/978-3-030-81089-4_5(97-124)Online publication date: 4-Feb-2022
  • (2022)Authorization Frameworks for Smart and Connected EcosystemsAccess Control Models and Architectures For IoT and Cyber Physical Systems10.1007/978-3-030-81089-4_3(39-61)Online publication date: 4-Feb-2022
  • Show More Cited By

Index Terms

  1. Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CODASPY '18: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy
      March 2018
      401 pages
      ISBN:9781450356329
      DOI:10.1145/3176258
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 March 2018

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. abac
      2. access control
      3. acl
      4. aws iot
      5. devices
      6. internet of things (iot)
      7. iot architecture
      8. rbac
      9. security
      10. virtual objects

      Qualifiers

      • Research-article

      Funding Sources

      • CNS-1538418
      • NSF CREST Grant HRD-1736209
      • CNS-1423481
      • NSF Grants CNS-1111925

      Conference

      CODASPY '18
      Sponsor:

      Acceptance Rates

      CODASPY '18 Paper Acceptance Rate 23 of 110 submissions, 21%;
      Overall Acceptance Rate 149 of 789 submissions, 19%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)8
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 12 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Research on IoT Device Access Technology based on the Power IoT Platform2024 39th Youth Academic Annual Conference of Chinese Association of Automation (YAC)10.1109/YAC63405.2024.10598720(1329-1332)Online publication date: 7-Jun-2024
      • (2022)Secure Virtual Objects CommunicationAccess Control Models and Architectures For IoT and Cyber Physical Systems10.1007/978-3-030-81089-4_5(97-124)Online publication date: 4-Feb-2022
      • (2022)Authorization Frameworks for Smart and Connected EcosystemsAccess Control Models and Architectures For IoT and Cyber Physical Systems10.1007/978-3-030-81089-4_3(39-61)Online publication date: 4-Feb-2022
      • (2021)Edge Centric Secure Data Sharing with Digital Twins in Smart Ecosystems2021 Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPSISA52974.2021.00008(70-79)Online publication date: Dec-2021
      • (2021)Regulating data sharing across MQTT environmentsJournal of Network and Computer Applications10.1016/j.jnca.2020.102907174(102907)Online publication date: Jan-2021
      • (2020)CIoTAS protocol: CloudIoT available services protocol through autonomic computing against distributed denial of services attacksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-020-02556-014:11(15175-15204)Online publication date: 4-Oct-2020
      • (2019)Design and Implementation of Decoupled IoT Application Store: A Novel Prototype for Virtual Objects Sharing and DiscoveryElectronics10.3390/electronics80302858:3(285)Online publication date: 4-Mar-2019
      • (2019)IoT PassportProceedings of the 24th ACM Symposium on Access Control Models and Technologies10.1145/3322431.3326327(83-92)Online publication date: 28-May-2019

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media