Browse > Article
http://dx.doi.org/10.3745/KTSDE.2015.4.9.337

The Access Control Platform of the IoT Service Using the CapSG  

Kim, Jin-Bo (목포대학교 정보보호기술학협동과정)
Jang, Deresa (목포대학교 정보보호기술학협동과정)
Kim, Mi-Sun (목포대학교 정보보호학과)
Seo, Jae-Hyun (목포대학교 정보보호학과)
Publication Information
KIPS Transactions on Software and Data Engineering / v.4, no.9, 2015 , pp. 337-346 More about this Journal
Abstract
There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.
Keywords
IoT; Capability Access Control; Security; Access Control;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L Sancheza, L Munoza, Jose Antonio Galachea, P Sotresa, J R. Santanaa, V Gutierreza, R Ramdhanyb, A Gluhakc, S Krcod, E Theodoridise, and D Pfistererf, "SmartSantander: IoT experimentation over a smart city testbed," Computer Networks, Vol.61, pp.217-238, 2014.   DOI
2 L Atzoria, A Ierab, and G Morabito, "The internet of things: A survey," Computer Networks, Vol. 4, Issue.15, pp.2787-2805, 2010.
3 Rolf H. Weber, "Internet of Things-New security and privacy challenges," Computer Law & Security Review, Vol. 26, Issue.1, pp.23-30, 2010.   DOI   ScienceOn
4 S. Gusmeroli, S. Piccione, and D. Rotondi, "IoT access control issues: a capability based approach," IMIS-2012, pp.787-792, 2012.
5 Bum-Ki Lee, Mi-Sun Kim, and Jae-Hyun Seo, "Design and Implementation of The Capability Token based Access Control System in the Internet of Things," Journal of The Korea Institute of Information Security & Cryptology, Vol.25, No.2, pp.439-448, 2015.   DOI
6 Romuald Thion, "Access Control Models," in Cyber Warfare and Cyber Terrorism, Hershey, pp.318-326, 2008.
7 Pierangela Samarati and Sabrina De Capitani di Vimercati, "Access Control: Policies, Models, and Mechanisms," in Foundations of Security Analysis and Design, pp.137-196, 2001.
8 Chao Lee, Yunchuan Guo, and Lihua Yin, "A Location Temporal based Access Control Model for IoTs," AASRI Procedia, Vol.5, pp.15-20, 2013.   DOI
9 Sergio Gusmeroli, Salvatore Piccione, and Domenico Rotondi, "A capability-based security approach to manage access control in the Internet of Things," Mathematical and Computer Modelling, Vol.58, pp.1189-1205, 2013.   DOI
10 Jose L. Hernandez-Ramos, Antonio J. Jara, Leandro Marin, and Antonio F. Skarmetal, "Distributed Capabilitybased Access Control for the Internet of Things," Journal of Internet Services and Information Security, Vol.3, Num.3/4, pp.1-16, 2013.   DOI
11 L. Fang, D. Gannon, and F. Siebenlist, "XPOLA-an extensible capability based authorization infrastructure for grids," 4th Annual PKI R&D Workshop, pp.30-40, 2005.
12 Mark S. Miller, Ka-Ping Yee, and J. Shapiro, "Capability Myths Demolished," Systems Research Laboratory, Johns Hopkins University, Tech.Report SRL 2003-02, 2003.