2015
DOI: 10.3745/ktsde.2015.4.9.409
|View full text |Cite
|
Sign up to set email alerts
|

Access Control Policy of Data Considering Varying Context in Sensor Fusion Environment of Internet of Things

Abstract: In order to delivery of the correct information in IoT environment, it is important to deduce collected information according to a user's situation and to create a new information. In this paper, we propose a control access scheme of information through context-aware to protect sensitive information in IoT environment. It focuses on the access rights management to grant access in consideration of the user's situation, and constrains(access control policy) the access of the data stored in network of unauthorize… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 5 publications
0
4
0
Order By: Relevance
“…It focuses on the management of access privileges which allow or deny access depending on user context, with access control policies that deny access to the data stored in the network for unauthorized users. To that end they analyzed a previously-studied context data access control scheme based on CP-ABE, included dynamic situations within the scope of context data and proposed an extended access control policy that reflects extended multi-dimensional context attributes [18][19][20][21].…”
Section: Figure 1 Concept Map Of Cyber-physical Systemmentioning
confidence: 99%
“…It focuses on the management of access privileges which allow or deny access depending on user context, with access control policies that deny access to the data stored in the network for unauthorized users. To that end they analyzed a previously-studied context data access control scheme based on CP-ABE, included dynamic situations within the scope of context data and proposed an extended access control policy that reflects extended multi-dimensional context attributes [18][19][20][21].…”
Section: Figure 1 Concept Map Of Cyber-physical Systemmentioning
confidence: 99%
“…Song, YJ et al [2] emphasized the importance of generating new information, i.e., contextual information, by deducing information collected according to the user's situation in the Internet environment of things. In order to protect sensitive information that is sensed in the Internet environment of objects, information access control technique through context awareness is needed.…”
Section: Access Control Policymentioning
confidence: 99%
“…It is emerging as a hot topic in various applications such as the Internet of Things and self-driving cars in financial transactions that can reduce virtual currency functions and transaction fees. In addition, various projects are underway in the energy sector and many changes in existing power trading and supply systems are expected when commercialized [4][5][6][7] [8]. Blockchain-based technologies are applied to transaction systems that compensate for solar power production in a "Solar Coin," prosumer trading systems that produce solar energy and trade surplus electricity between neighbors, and electric vehicle charging stations.…”
Section: Related Work 21 Blockchain For Power Tradingmentioning
confidence: 99%