scholarly journals Dynamic biometrics: The case for a real-time solution to the problem of access control, privacy and security

Author(s):  
Steven J. Simske
2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


Author(s):  
С.В. Шевелев ◽  
А.Б. Семенов

Рассмотрены принципы обеспечения заданного уровня качества обслуживания QoS в беспроводных сетях, позволяющие достигнуть устойчивого функционирования программных приложений реального времени за счет тонкой настройки приоритезации генерируемого ими трафика. Основное внимание уделяется механизму управления доступом на основе конкуренции и контролируемого доступа, а также их расширениям. Затронуты вопросы инкапсуляции базовых механизмов управления в решения более высоких уровней EDCA и TXOP. Приведены расчетные значения соответствующих параметров. The principles of ensuring a given level of quality of QoS service in wireless networks are considered, which allow achieving the stable functioning of real-time software applications by fine-tuning the prioritization of the traffic generated by them. The main focus is on the competition-based access control mechanism and controlled access, as well as their extensions. The issues of encapsulation of basic control mechanisms in solutions of higher levels of EDCA and TXOP are touched upon. The calculated values of the corresponding parameters are given.


2021 ◽  
Author(s):  
Narayanan Ramanathan ◽  
Allison Beach ◽  
Robert Hastings ◽  
Weihong Yin ◽  
Sima Taheri ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document