2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC) 2019
DOI: 10.1109/fmec.2019.8795309
|View full text |Cite
|
Sign up to set email alerts
|

Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0
1

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(11 citation statements)
references
References 23 publications
0
10
0
1
Order By: Relevance
“…The opinions of an IT professional were obtained in interview format with Dr. Robert Vinaja; he had plenty of insight to offer since he had previously worked at Aetna, a medical insurance company. The basics of what makes a device secure were found to include CIA+, which stands for Confidentiality, Integrity, Availability, Authentication, Access-Control, and Non-Repudiation [11]. Once we satisfy the requirements to fulfill those security basics, we can ensure our homes and privacy to be secure.…”
Section: Discussionmentioning
confidence: 99%
“…The opinions of an IT professional were obtained in interview format with Dr. Robert Vinaja; he had plenty of insight to offer since he had previously worked at Aetna, a medical insurance company. The basics of what makes a device secure were found to include CIA+, which stands for Confidentiality, Integrity, Availability, Authentication, Access-Control, and Non-Repudiation [11]. Once we satisfy the requirements to fulfill those security basics, we can ensure our homes and privacy to be secure.…”
Section: Discussionmentioning
confidence: 99%
“…In this subsection, we elaborate three different scenarios within the context of smart homes which can offer a more connected ecosystem to mitigate contagious disease spread, as shown in Figure 4 . Moreover, various aspects of smart home for health have been investigated in the literature [21] , [36] , [37] , [38] , [39] , [40] , [41] , [42] , [43] , [44] , [45] , [46] , [47] , [48] , [49] .
Fig.
…”
Section: Future Smart Connected Ecosystem and Technological Solutionsmentioning
confidence: 99%
“…Traditional access control models are not adequate in addressing dynamic and evolving access control requirements in IoT. Attribute-Based Access Control (ABAC) [102] , [103] , [104] , [105] , offers a flexible and dynamic access control model, which fits more into distributed IoT environments, such as smart home [49] , connected vehicles [88] , [106] , and wearable IoT devices [21] , [107] .…”
Section: Open Challenges and Future Directionsmentioning
confidence: 99%
“…More recently, in [41], authors proposed a convergent access control framework to enable synergistic convergence between access control models, such as RBAC, ABAC, relationship-based access control (ReBAC) [42], [43], and other access control models, such as Usage Control (UCON) [44], as per the access control requirements of specific domains. Authorizations in several cloud-enabled IoT domains along with current trends and several use cases are presented in [45]. Moreover, an attribute-based communication control (ABCC) is developed to secure data communication and data flow between various components in cloud-enabled IoT architectures [46].…”
Section: Comparison With Existing Access Control Modelsmentioning
confidence: 99%