Research on SPKI/SDSI Cridencials and RT0 Cridencials

2011 ◽  
Vol 403-408 ◽  
pp. 2176-2179
Author(s):  
Xiu Hua Geng ◽  
Xiao Lei Zhang

Trust management is a distributed access control mechanism for open, large-scale network. SPKI/SDSI and RT0 are typical trust management systems. This paper compares the different crendentials in those systems essentially, and the result shows that although RT0 crendentials are relatively simple, they are expressively eauivalent to SPKI/SDSI crendentials.

Author(s):  
Poonam N. Railkar ◽  
◽  
Parikshit Mahalle ◽  
Dr. Gitanjali Rahul Shinde ◽  
◽  
...  

IoT is a network of interconnected heterogeneous devices which sense, accumulate the data and forward the same to the cloud platform for analytical purposes. There are various IoT verticals in which huge research is going on. IoT security is the most challenging research area in which researchers are investing a huge number of efforts. The challenges in IoT security include access control, trust management, authentication, authorization, privacy, and secured device to device communication. To overcome these, this paper gives an overview of proposed trust based distributed access control approach in IoT. Some of the challenges and threats can be controlled by blockchain technology. Basically, blockchain is an open and distributed ledger of records that can be verified efficiently and stored permanently. This paper checks the feasibility study of the applicability of blockchain in the IoT ecosystem to apply access control mechanism and privacy-preserving policies. This paper discusses how access control and privacy can be addressed by blockchain without compromising security. This paper consists of rigorous gap analysis which is done on the top of comprehensive literature survey. The paper also addresses the challenges and issues which can be faced while applying access control mechanism using blockchain in the context of IoT.


Author(s):  
Lokesh B. Bhajantri ◽  
Tabassum N. Mujawar

Cloud computing is the most prevailing paradigm, which provides computing resources and services over the Internet. Due to immense development in services provided by cloud computing, the trend to share large-scale and confidential data on cloud has been increased. Though cloud computing provides many benefits, ensuring security of the data stored in cloud is the biggest challenge. The security concern about the data becomes main barrier for adoption of cloud. One of the important security aspects is fine grained access control mechanism. The most widely used and efficient access control scheme for cloud computing is Attribute Based Encryption (ABE). The Attribute Based Encryption (ABE) scheme provides a new technique for embedding access policies cryptographically into encryption process. The article presents an overview of various existing attribute-based encryption schemes and traditional access control models. Also, the comparison of existing ABE schemes for cloud computing, on basis of various criteria is presented in the article.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3041
Author(s):  
Shizra Sultan ◽  
Christian D. Jensen

The amount of data generated in today’s world has a fair share of personal information about individuals that helps data owners and data processors in providing them with personalized services. Different legal and regulatory obligations apply to all data owners collecting personal information, specifying they use it only for the agreed-upon purposes and in a transparent way to preserve privacy. However, it is difficult to achieve this in large-scale and distributed infrastructures as data is continuously changing its form, such as through aggregation with other sources or the generation of new transformed resources, resulting often in the loss or misinterpretation of the collection purpose. In order to preserve the authorized collection purposes, we propose data is added as a part of immutable and append-only resource metadata (provenance), to be retrieved by an access control mechanism when required for data-usage verification. This not only ensures purpose limitation in large-scale infrastructures but also provides transparency for individuals and auditing authorities to track how personal information is used.


Author(s):  
Jing Qiu ◽  
Chunlai Du ◽  
Shen Su ◽  
Qi Zuo ◽  
Zhihong Tian

With the development of IoT technology, various information resources, such as social resources and physical resources, are deeply integrated for different comprehensive applications. Social networking, car networking, medical services, video surveillance and other forms of IoT information Service model gradually change people's daily life. Facing the vast amounts of IoT information data, IoT search technology is used to quickly find accurate information to meet real-time search needs of users. However, IoT search requires to use a large number of user privacy Information, such as personal health information, location information, social relations information, to provide personalized services. User privacy information will meet security problems if an effective access control mechanism is missing during the IoT search process. Access control mechanism can effectively monitor the access activities of resources, and ensure authorized users to access information resources under legitimate conditions. This survey examines the growing literature on access control for IoT search. Problems and challenges of access control mechanism are analyzed to facilitate the adoption of access control solutions in real-life settings. This paper aims to provides theoretical, methodological and technical guidance for IoT search access control mechanism in large-scale dynamic heterogeneous environment. Based on the literature study, we also analyzed future development direction of access control in the age of IoT.


Sign in / Sign up

Export Citation Format

Share Document