Challenges and Opportunities in Applying Semantics to Improve Access Control in the Field of Internet of Things (original) (raw)
Related papers
Attribute - Semantic Based Access Control Policy Model for IoT
International Journal of Engineering and Advanced Technology
Internet of Things (IoT) devices under cloud assistance is deployed in different distributed environment. It collects sensed data and outsources the data to remote server and user for sharing. As IoT is used in important fields like healthcare, business and research, the sensed data are sensitive information which needs to be protected. Encryption is usual technique to protect data from adversaries. A fine grained access control is essential for heterogeneous device involved social network. The existing access control policies were defined for predefined identity and role which needs to be changed in dynamic situations. Moreover, all the necessary policies cannot be defined in advance and new policies were demanded for new situational context. To solve these issues, this work design a model which calculate final trust value based on semantic information dynamically referring to ontology. a access control policy is also designed on semantic role of the device. The semantic technology...
Context-Sensitive Policy Based Security in Internet of Things
2016 IEEE International Conference on Smart Computing (SMARTCOMP), 2016
According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities. The storage and computing power of these devices is often limited and their designs currently focus on ensuring functionality and largely ignore other requirements, including security and privacy concerns. We present the design of a framework that allows IoT devices to capture, represent, reason with, and enforce information sharing policies. We use Semantic Web technologies to represent the policies, the information to be shared or protected, and the IoT device context. We discuss use-cases where our design will help in creating an "intelligent" IoT device and ensuring data security and privacy using context-sensitive information sharing policies.
Bridging the Policy Gap in Pervasive Access Control: A Semantic Web Approach
Access control is a means to protect unauthorized access to services. Controlling access in pervasive environments is crucial and a significant challenge. Users and devices are mobile and can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access policies for these types of situations are required to conform to high-level business agreements. In other words, there needs to be a policy system that fully understands and interprets high-level notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted correctly to maintain proper access control. It is necessary to have a formal representation of the context that can be shared and understood by the policy system. The policy system must also be able to change the access rights in response to a change in the situation. This paper addresses these issues by using a semantic web approach to represent domain knowledge and access control policies in a meaningful way.
Lightweight Data-Security Ontology for IoT
Sensors, 2020
Although current estimates depict steady growth in Internet of Things (IoT), many works portray an as yet immature technology in terms of security. Attacks using low performance devices, the application of new technologies and data analysis to infer private data, lack of development in some aspects of security offer a wide field for improvement. The advent of Semantic Technologies for IoT offers a new set of possibilities and challenges, like data markets, aggregators, processors and search engines, which rise the need for security. New regulations, such as GDPR, also call for novel approaches on data-security, covering personal data. In this work, we present DS4IoT, a data-security ontology for IoT, which covers the representation of data-security concepts with the novel approach of doing so from the perspective of data and introducing some new concepts such as regulations, certifications and provenance, to classical concepts such as access control methods and authentication mechan...
A Survey on Challenges of Semantics Application in the Internet of Things Domain
Applied Computer Systems, 2017
The Internet of Things (IoT), a global Internet-based system of computing devices and machines, is one of the most significant trends in the information technology area. An accepted unified communication approach would be a prerequisite for its mass adoption. Semantic technologies (Semantic Web) have been advocated as enablers of unified communication. However, while there are particular advancements in research on application of Semantic Web in the IoT domain, the dynamic and complex nature of the IoT often requires case specific solutions hard to be applied widely. In the present survey, the semantic technology challenges in the IoT domain are amalgamated to provide background for further studies in the use of semantic technologies in the IoT.
Semantic Web and Internet of Things: Challenges, Applications and Perspectives
Journal of ICT Standardization
The apparent growth of the internet of things (IoT) has allowed its deployment in many domains. The IoT devices sense their surroundings and transmit the data via the Web. According to statistics, due to the proliferation of smart devices, the number of active IoT devices is expected to exceed 25.4 billion by 2030.1 A large number of IoT objects gather an enormous amount of raw data. The data generated by various IoT objects and sensors are heterogeneous, with varying types and formats. Therefore, it is difficult for IoT systems to share and reuse raw IoT data, which causes the problem of lack of interoperability. The lack of interoperability in IoT systems creates a problematic issue that prevents IoT systems from performing well. To address this issue, data modeling and knowledge representation using semantic web technologies may be an appropriate solution to give meaning to raw IoT data and convert it to an enriched data format. The primary goal of this research section is to hig...
Context-aware Automatic Access Policy Specification for IoT Environments
2018
Data privacy becomes a primary impediment to the realization of the IoT vision. One approach to the IoT security and privacy problem is to restrict access to sensitive data via access control and authorization models. Yet access context in IoT changes frequently raising the need for flexible and dynamic access control policies. Towards developing dynamic access control policies, context-based access control techniques are being investigated due to their robustness in assigning dynamic access permissions according to changes in context. In this paper, we propose to automate the generation of access control policies to overcome the inflexibility in traditional access policy specification techniques, and improve its adaptability to dynamic IoT environments. In our framework, we use context, attributes, and predication to describe the core access control elements. In response to access requests, our algorithm automatically produces conflict-free access control policies and makes the fin...
Utilizing Semantic Knowledge for Access Control in Pervasive and Ubiquitous Systems
Mobile Networks and Applications, 2010
Controlling access in pervasive environments is crucial and a significant challenge because users and devices can connect from anywhere which results in users and resources becoming available at any point of time and location depending on the situation. Access control policies for this type of environment are required to conform to high-level business notions. In pervasive environments, these high-level notions refer to contexts of the situation which can change unpredictably and must be interpreted semantically to maintain proper access control. Therefore, it is necessary to have a formal representation that represents semantics of the contexts, reflects the change of the situation, and can be shared and understood by a policy system. This paper addresses these issues by introducing a context management system that uses a semantic web approach as an underlying mechanism to model and represent semantics of the contexts. The system stores current contexts in a semantic knowledge base which is used
Annals of Telecommunications, 2019
The Internet of Things operates in a personal-data-rich sector, which makes security and privacy an increasing concern for consumers. Access control is thus a vital issue to ensure trust in the IoT. Several access-control models are today available, each of them coming with various features, making them more or less suitable for the IoT. This article provides a comprehensive survey of these different models, focused both on access control models (e.g., DAC, MAC, RBAC, ABAC) and on access control architectures and protocols (e.g., SAML and XACML, OAuth 2.0, ACE, UMA, LMW2M, AllJoyn). The suitability of each model or framework for IoT is discussed. In conclusion, we provide future directions for research on access control for the IoT: scalability, heterogeneity, openness and flexibility, identity of objects, personal data handling, dynamic access control policies and usable security. Index Terms-Access Control (AC), Internet of Things (IoT),
Journal of Communications
The Internet of Things (IoT) extends internet connectivity to a wide range of smart devices. However, battery autonomy, computational capability and storage capacity are major technology challenges that hinder increased implementation and adoption. Although the integration of the Internet of Things (IoT) with Cloud Computing is considered as a highly promising solution in overcoming these bottlenecks, it raises security concerns, especially access control. Recently, a variety of access control models have been developed to help protect confidential information and restrict access to sensitive data. Because of its flexibility and scalability, the consensus is that the Attribute Based Access Control (ABAC) is the most appropriate model in a dynamic environment. In the context of IoT, the ABAC model has the ability to enforce data privacy and ensure a secure connection between IoT devices and cloud providers. One of the core components of the ABAC model is access policies, these are used to deny or allow user' requests. To achieve that, an access policy language is required to implement policy rules in ABAC model. In this study, we propose a method based on EXtensible Access Control Markup Language (XACML) to prevent all unauthorized access to remote resources. This policy language is a particularly efficient and appropriate technique within a context of IoT due to its compatibility with heterogonous platforms. Index Terms-cloud computing, internet of things, cloud, ABAC model, XACML language, security policy tool