Cape: Continuous Access Policy Enforcement For Iot Deployments

2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC)(2019)

引用 1|浏览8
暂无评分
摘要
Advancements and convergence in IoT enabling technologies along with ubiquitous connectivity have led to the generation of new wave of smart services and applications based on real-time data access. The popularity of ubiquitous data access and accelerated adoption of these services pose significant challenges on user and data privacy. Thus, controlling access to such services in highly dynamic environments with continuously changing context becomes even more challenging. The wide adoption of IoT in our everyday life in many vital domains such as healthcare and military operations requires continuous and tight access control to prevent unauthorized and unintended access. A delay in making access decisions when context changes may result in consequences that cause harm and property damage. Therefore, continuity in access policy enforcement becomes a necessity in highly dynamic IoT environments for the entire access session not only at the time of request. This paper presents CAPE, a continuous access policy enforcement framework for IoT deployments. CAPE describes access control elements using predicates, and stores them as primitive facts in a K Dimensional tree data structure. Our algorithms automatically match access requests with primitive facts, generate access policies, make context-aware access decisions at run time and continuously monitor access control parameters based on which access decisions were made. Performance evaluation of CAPE demonstrates that this framework efficiently controls access in highly dynamic IoT environments.
更多
查看译文
关键词
highly dynamic IoT environments,CAPE,IoT deployments,convergence,IoT enabling technologies,ubiquitous connectivity,smart services,real-time data access,ubiquitous data access,data privacy,highly dynamic environments,continuously changing context,continuous access control,tight access control,unauthorized access,unintended access,context changes,continuous access policy enforcement framework,access control elements,primitive facts,access requests,access policies,context-aware access decisions,access control parameters,K dimensional tree data structure,access session
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要