2020 IEEE 6th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Sma 2020
DOI: 10.1109/bigdatasecurity-hpsc-ids49724.2020.00044
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Model for Google Cloud IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
4
2

Relationship

4
6

Authors

Journals

citations
Cited by 42 publications
(20 citation statements)
references
References 23 publications
0
18
0
Order By: Relevance
“…Building IDS on top of the cloud environment brings several advantages. Cloud environments enable the identification of malicious network activities from different perspectives and overcome the classical intrusion detection deficiency [107]. In addition, using public and private clouds gives the opportunity to detect various types of network attacks in parallel with high performance.…”
Section: E Cloud Basedmentioning
confidence: 99%
“…Building IDS on top of the cloud environment brings several advantages. Cloud environments enable the identification of malicious network activities from different perspectives and overcome the classical intrusion detection deficiency [107]. In addition, using public and private clouds gives the opportunity to detect various types of network attacks in parallel with high performance.…”
Section: E Cloud Basedmentioning
confidence: 99%
“…Attribute-based access control (ABAC) [3,4,27] supports fine grained authorization capabilities for resources offering flexibility in a distributed multi-entity environment where the attributes of entities along with contextual information are used for access and communication authorization decisions. Several cloud service platforms including AWS and Google Cloud provide policy based [28,29] security solutions to control among different smart entities and applications in the connected ecosystem. In the past, numerous access control models [19,[30][31][32][33] and mechanisms [34,35] have been proposed to address authorization needs in both edge and cloud assisted IoT and CPS architectures.…”
Section: Access Control Requirements In Smart and Connected Ecosystemsmentioning
confidence: 99%
“…This model was developed based on AWS Cloud Access Control (AWSAC) model [10]. Gupta et al developed access control models for Google Cloud Platform (GCP) and GCP IoT, known as GCPAC and GCP-IoTAC model respective [28]. Another access control model is developed for Azure IoT cloud which is known as Priority-Attribute-Based RBAC Model for Azure IoT Cloud (PARBAC) [29].…”
Section: Comparison With Existing Access Control Modelsmentioning
confidence: 99%