The Internet of Things (IoT) has become a global sensory network that links physical and virtual objects by communicating and exploiting data and initiating physical actions. The evolution of this paradigm is already threatened by security issues, which constitute major risk factors that demand efficient solutions adapted to the IoT context. In this paper, we put forward a logical approach and systemic analysis that enables us to present the key aspects of new access control (AC) model for the IoT environments, called a pervasive-based access control model (PerBAC). Our approach is based on the study of important, reputable AC models that we use as a background for our proposed model. PerBAC is defined here based on a representation of the decision-making algorithm, a description of the abstract entities using the attributes as a fundamental concept and the collaboration aspects necessary to handle the case of multiple organizations. These attributes are the perfect recipient of the information collected by IoT environments from the physical world and allow optimal access control decisions to be taken according to dynamic rules and entities based on the algorithm. Our interpretation of the attributes, the dynamic entities and their exploitation by our proposed algorithm produce a new AC model adapted to the IoT paradigm.
The Internet of things is no longer a concept; it is a reality already changing our lives. It aims to interconnect almost all daily used devices to help them exchange contextualized data in order to offer services adequately. Based on the existing Internet, IoT suffers indisputably from security issues that could threaten its evolution and its users' interests. Starting from this fact, we try to define the main security threats for the IoT perimeter and propose some pertinent solutions. To do so, we first establish a state of the art concerning the IoT definition, protocols, environment, architecture and security. Then, we expose a case study of a standard IoT platform to illustrate the impact of security on all IoT layers. Furthermore, the paper presents the results of a security audit on our implemented platform. Finally, based on our evaluation, we highlight many solutions as well as possible directions for future research.
-Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs) for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.