Skip to main content
Top

2024 | OriginalPaper | Chapter

Understanding Security Challenges and Defending Access Control Models for Cloud-Based Internet of Things Network

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Access control is one of the most important measures for protecting information and system resources because it prevents unauthorized users from gaining access to protected objects and legitimate users from exceeding their access rights. This paper provides an in-depth exploration of the security challenges posed by the confluence of Internet of Things (IoT) networks and cloud-based architectures, with a particular focus on Access Control Models (ACMs). As the integration of IoT devices with cloud services becomes more pervasive, securing access to resources and data has emerged as a critical area of concern. To address this, we delve into the principles of Access Control and their applications within a Cloud-IoT Architecture. The paper dissects popular ACMs, exploring their strengths, limitations, and suitability for securing Cloud-IoT networks. Along with these the comprehensive analysis of the prevalent Cloud Security Challenges are presented, highlighting the vulnerabilities in current ACMs and proposing potential mitigations. In addition, open research challenges are identified, underlining the need for further investigation and development in this area. The goal of this work is to provide a thorough understanding of the issues and threats in this domain and contribute to the advancement of robust, secure, and efficient access control mechanisms for the evolving landscape of Cloud-IoT networks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Hassanalieragh, M., et al.: Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: opportunities and challenges. In: 2015 IEEE International Conference on Services Computing, pp. 285–292. IEEE (2015) Hassanalieragh, M., et al.: Health monitoring and management using Internet-of-Things (IoT) sensing with cloud-based processing: opportunities and challenges. In: 2015 IEEE International Conference on Services Computing, pp. 285–292. IEEE (2015)
2.
go back to reference Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future Internet: the Internet of Things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260. IEEE (2012) Khan, R., Khan, S.U., Zaheer, R., Khan, S.: Future Internet: the Internet of Things architecture, possible applications and key challenges. In: 2012 10th International Conference on Frontiers of Information Technology, pp. 257–260. IEEE (2012)
3.
go back to reference Islam, S.M.R., Hossain, M., Hasan, R., Duong, T.Q.: A conceptual framework for an IoT-based health assistant and its authorization model. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 616–621. IEEE (2018) Islam, S.M.R., Hossain, M., Hasan, R., Duong, T.Q.: A conceptual framework for an IoT-based health assistant and its authorization model. In: 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC), pp. 616–621. IEEE (2018)
4.
go back to reference Sandhu, R.: Rationale for the RBAC96 family of access control models. In: Proceedings of the First ACM Workshop on Role-Based Access Control, pp. 9-es (1996) Sandhu, R.: Rationale for the RBAC96 family of access control models. In: Proceedings of the First ACM Workshop on Role-Based Access Control, pp. 9-es (1996)
5.
go back to reference Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. Status and Prospects, Database Security XI (1998) Thomas, R.K., Sandhu, R.S.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. Status and Prospects, Database Security XI (1998)
6.
go back to reference Karataş, G., Akbulut, A.: Survey on access control mechanisms in cloud computing. J. Cyber Secur. Mobility 7(3), 1–36 (2018) Karataş, G., Akbulut, A.: Survey on access control mechanisms in cloud computing. J. Cyber Secur. Mobility 7(3), 1–36 (2018)
7.
go back to reference Goudarzi, M., Ilager, S., Buyya, R.: Cloud Computing and Internet of Things: recent trends and directions. In: Buyya, R., Garg, L., Fortino, G., Misra, S. (eds.) New Frontiers in Cloud Computing and Internet of Things. Internet of Things. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-05528-7_1 Goudarzi, M., Ilager, S., Buyya, R.: Cloud Computing and Internet of Things: recent trends and directions. In: Buyya, R., Garg, L., Fortino, G., Misra, S. (eds.) New Frontiers in Cloud Computing and Internet of Things. Internet of Things. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-05528-7_​1
8.
go back to reference Sandhu, R.S.: Role-based access control. In: Advances in Computers, vol. 46, pp. 237–286. Elsevier (1998) Sandhu, R.S.: Role-based access control. In: Advances in Computers, vol. 46, pp. 237–286. Elsevier (1998)
9.
go back to reference Kalam, A.A.E., et al.: Organization based access control. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120–131. IEEE (2003) Kalam, A.A.E., et al.: Organization based access control. In: Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120–131. IEEE (2003)
10.
go back to reference Liu, M., Yang, C., Li, H., Zhang, Y.: An efficient attribute-based access control (ABAC) policy retrieval method based on attribute and value levels in multimedia networks. Sensors 20(6), 1741 (2020) Liu, M., Yang, C., Li, H., Zhang, Y.: An efficient attribute-based access control (ABAC) policy retrieval method based on attribute and value levels in multimedia networks. Sensors 20(6), 1741 (2020)
11.
go back to reference Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800-162 (2013) Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations (draft). NIST Spec. Publ. 800-162 (2013)
12.
go back to reference Ye, N., Zhu, Y., Wang, R., Malekian, R., Lin, Q.: An efficient authentication and access control scheme for perception layer of Internet of Things. Appl. Math. Inf. Sci. 8(4), 1617 (2014)CrossRef Ye, N., Zhu, Y., Wang, R., Malekian, R., Lin, Q.: An efficient authentication and access control scheme for perception layer of Internet of Things. Appl. Math. Inf. Sci. 8(4), 1617 (2014)CrossRef
14.
go back to reference Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(4), 351–387 (2005)CrossRef Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(4), 351–387 (2005)CrossRef
15.
go back to reference Park, J., Sandhu, R.: Towards usage control models: beyond traditional access control. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 57–64 (2002) Park, J., Sandhu, R.: Towards usage control models: beyond traditional access control. In: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies, pp. 57–64 (2002)
16.
go back to reference Riad, K., Yan, Z.: Multi-factor synthesis decision-making for trust-based access control on cloud. Int. J. Coop. Inf. Syst. 26(04), 1750003 (2017) Riad, K., Yan, Z.: Multi-factor synthesis decision-making for trust-based access control on cloud. Int. J. Coop. Inf. Syst. 26(04), 1750003 (2017)
17.
go back to reference Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 58(5–6), 1189–1205 (2013)CrossRef Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Model. 58(5–6), 1189–1205 (2013)CrossRef
18.
go back to reference Bouij-Pasquier, I., Ouahman, A.A., El Kalam, A.A., de Montfort, M.O.: SmartOrBAC security and privacy in the Internet of Things. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8. IEEE (2015) Bouij-Pasquier, I., Ouahman, A.A., El Kalam, A.A., de Montfort, M.O.: SmartOrBAC security and privacy in the Internet of Things. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8. IEEE (2015)
19.
go back to reference El Bouanani, S., El Kiram, M.A., Achbarou, O., Outchakoucht, A.: Pervasive-based access control model for IoT environments. IEEE Access 7, 54575–54585 (2019)CrossRef El Bouanani, S., El Kiram, M.A., Achbarou, O., Outchakoucht, A.: Pervasive-based access control model for IoT environments. IEEE Access 7, 54575–54585 (2019)CrossRef
20.
go back to reference Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.-C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 535–544. IEEE (2018) Zhu, Y., Qin, Y., Gan, G., Shuai, Y., Chu, W.C.-C.: TBAC: transaction-based access control on blockchain for resource sharing with cryptographically decentralized authorization. In: 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), vol. 1, pp. 535–544. IEEE (2018)
21.
go back to reference Chatterjee, S., Das, A.K.: An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw. 8(9), 1752–1771 (2015)CrossRef Chatterjee, S., Das, A.K.: An effective ECC-based user access control scheme with attribute-based encryption for wireless sensor networks. Secur. Commun. Netw. 8(9), 1752–1771 (2015)CrossRef
22.
go back to reference Srivastava, S., Chaurasia, B.K., Singh, D.: Blockchain-based IoT security solutions. In: Distributed Computing to Blockchain, pp. 327–339. Academic Press (2023) Srivastava, S., Chaurasia, B.K., Singh, D.: Blockchain-based IoT security solutions. In: Distributed Computing to Blockchain, pp. 327–339. Academic Press (2023)
23.
go back to reference Nižetić, S., Šolić, P., Lopez-de-Ipiña Gonzalez-De, D., Patrono, L.: Internet of Things (IoT): opportunities, issues and challenges towards a smart and sustainable future. J. Cleaner Prod. 274, 122877 (2020)CrossRef Nižetić, S., Šolić, P., Lopez-de-Ipiña Gonzalez-De, D., Patrono, L.: Internet of Things (IoT): opportunities, issues and challenges towards a smart and sustainable future. J. Cleaner Prod. 274, 122877 (2020)CrossRef
Metadata
Title
Understanding Security Challenges and Defending Access Control Models for Cloud-Based Internet of Things Network
Authors
Pallavi Zambare
Ying Liu
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-45882-8_13

Premium Partner