2017
DOI: 10.3390/fi9040064
|View full text |Cite
|
Sign up to set email alerts
|

IAACaaS: IoT Application-Scoped Access Control as a Service

Abstract: access control is a key element when guaranteeing the security of online services. However, devices that make the Internet of Things have some special requirements that foster new approaches to access control mechanisms. Their low computing capabilities impose limitations that make traditional paradigms not directly applicable to sensors and actuators. In this paper, we propose a dynamic, scalable, IoT-ready model that is based on the OAuth 2.0 protocol and that allows the complete delegation of authorization,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
23
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
4

Relationship

3
6

Authors

Journals

citations
Cited by 31 publications
(25 citation statements)
references
References 26 publications
(28 reference statements)
0
23
0
Order By: Relevance
“…IoT access control solutions must support and implement these paradigms and must be consistent with the IoT’s own protocols and architectures. Standards as OAuth 2.0 [ 2 ] or XACML [ 10 ] combined with these paradigms allow creation of a fine-grained access control model over IoT Publish/Subscribe architectures [ 6 , 7 , 8 ]. Moreover, the International Data Spaces created an IIoT standard [ 11 , 12 ] in which they define a vocabulary and data model—implemented with the NGSI FIWARE standard [ 13 ]—that boost and eases the definition of fine-grained access control policies with ABAC or UCON [ 8 , 14 ].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…IoT access control solutions must support and implement these paradigms and must be consistent with the IoT’s own protocols and architectures. Standards as OAuth 2.0 [ 2 ] or XACML [ 10 ] combined with these paradigms allow creation of a fine-grained access control model over IoT Publish/Subscribe architectures [ 6 , 7 , 8 ]. Moreover, the International Data Spaces created an IIoT standard [ 11 , 12 ] in which they define a vocabulary and data model—implemented with the NGSI FIWARE standard [ 13 ]—that boost and eases the definition of fine-grained access control policies with ABAC or UCON [ 8 , 14 ].…”
Section: Related Workmentioning
confidence: 99%
“…The IAACaaS model, proposed in previous works [ 6 , 7 ] and implemented through the FIWARE open-source platform, is based on the OAuth 2.0 protocol and relies on an XACML (eXtensible Access Control Markup Language) architecture to enable the administration of fine-grained policies. As explained before, we use this model to secure communications between IoT devices and a Publish/Subscribe broker.…”
Section: Introductionmentioning
confidence: 99%
“…As we pointed out earlier, the model we propose allows service providers to decide the interface they should serve to the users depending on their functional capabilities. To achieve this, we have considered IAACaaS (IoT Application-Scoped Access Control as a Service) model [46,47] as a starting point. IAACaaS enables the complete delegation of authentication and authorization to enable an as a service access control mechanism for Internet of Things applications.…”
Section: Basic Architecturementioning
confidence: 99%
“…Figure 2 shows the architecture we propose to achieve the Identity and Access Management IDS requirements using FIWARE components. It is based on the work explained in [ 26 , 27 ], where a generic IoT Application-Scoped Access Control as a Service (IAACaaS) mechanism is proposed. Here we extend and adapt it to fit the specific requirements of IDS.…”
Section: Materializing Industrial Data Space Architecture With Fiwmentioning
confidence: 99%