Abstract
Internet of Things (IoT) has received considerable attention in both industry and academia in recent years. There has been significant research on access control models for IoT in academia, while industrial deployment of several cloud-enabled IoT platforms have already been introduced. However, as yet there is no consensus on a formal access control model for cloud-enabled IoT. Currently, most of the cloud-enabled IoT platforms utilize some customized form of Role-Based Access Control (RBAC), but RBAC by itself is insufficient to address the dynamic requirements of IoT. In this paper, we study one of the commercial cloud-IoT platform, AWS IoT, and develop a formal access control model for it, which we call AWS-IoTAC. We do this by extending AWS cloud’s formal access control (AWSAC) model, previously published in the academic literature, to incorporate the IoT specific components. The AWS-IoTAC model is abstracted from AWS IoT documentation and has been formalized based on AWSAC definitions. We show how this model maps to a recently proposed Access Control Oriented (ACO) architecture for cloud-enabled IoT. We demonstrate a smart-home use case in AWS IoT platform, and inspired by this use case, we propose some Attribute-Based Access Control (ABAC) extensions to the AWS-IoTAC model for enhancing the flexibility of access control in IoT.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amazon Web Services (AWS). https://aws.amazon.com/. Accessed 10 Dec 2016
AWS IoT Platform. http://docs.aws.amazon.com/iot/latest/developerguide/what-is-aws-iot.html. Accessed 8 Jan 2017
AWS SDK for JavaScript in Node.js. https://aws.amazon.com/sdk-for-node-js/. Accessed 10 Aug 2016
Azure IoT. https://docs.microsoft.com/en-us/azure/iot-hub/iot-hub-what-is-iot-hub. Accessed 10 Nov 2016
Build your blueprint for the internet of things, based on ve architecture styles. https://www.gartner.com/doc/2854218/build-blueprint-internet-things-based. Accessed 2 Jan 2017
Google Cloud Platform. https://cloud.google.com/. Accessed 10 Dec 2016
Microsoft Azure. https://azure.microsoft.com/en-us/. Accessed 28 Nov 2016
MQTT.fx - A JavaFX based MQTT Client. http://www.mqttfx.org/. Accessed 10 Sep 2016
Overview of Internet of Things. https://cloud.google.com/solutions/iot-overview/. Accessed 10 Dec 2016
X.509 Certificates. http://searchsecurity.techtarget.com/denition/X509-certificate. Accessed 10 Feb 2017
Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based user-role assignment. In: 18th IEEE Annual Computer Security Applications Conference, pp. 353–362. IEEE (2002)
Alshehri, A., Sandhu, R.: Access control models for cloud-enabled internet of things: a proposed architecture and research agenda. In: 2nd IEEE International Conference on Collaboration and Internet Computing (CIC), pp. 530–538. IEEE (2016)
Ferraiolo, D., Atluri, V., Gavrila, S.: The policy machine: a novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57(4), 412–424 (2011)
Ferraiolo, D., Gavrila, S., Jansen, W.: Policy Machine: features, architecture, and specification. NIST Internal Report 7987 (2014)
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC) 4(3), 224–274 (2001)
Gusmeroli, S., Piccione, S., Rotondi, D.: A capability-based security approach to manage access control in the Internet of Things. Math. Comput. Modell. 58(5), 1189–1205 (2013)
Hernández-Ramos, J.L., Jara, A.J., Marin, L., Skarmeta, A.F.: Distributed capability-based access control for the Internet of Things. J. Internet Serv. Inf. Secur. (JISIS) 3(3/4), 1–16 (2013)
Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800–162 (2014)
Jin, X., Krishnan, R., Sandhu, R.: A unified attribute-based access control model covering DAC, MAC and RBAC. In: Cuppens-Boulahia, N., Cuppens, F., Garcia-Alfaro, J. (eds.) DBSec 2012. LNCS, vol. 7371, pp. 41–55. Springer, Heidelberg (2012). doi:10.1007/978-3-642-31540-4_4
Kaiwen, S., Lihua, Y.: Attribute-role-based hybrid access control in the Internet of Things. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds.) APWeb 2014. LNCS, vol. 8710, pp. 333–343. Springer, Cham (2014). doi:10.1007/978-3-319-11119-3_31
Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding attributes to role-based access control. Computer 43(6), 79–81 (2010)
Liu, J., Xiao, Y., Chen, C.P.: Authentication and access control in the Internet of Things. In: 32nd IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW), pp. 588–592. IEEE (2012)
Mahalle, P.N., Anggorojati, B., Prasad, N.R., Prasad, R.: Identity establishment and capability based access control (IECAC) scheme for Internet of Things. In: 15th IEEE Symposium on Wireless Personal Multimedia Communications (WPMC), pp. 187–191. IEEE (2012)
Nitti, M., Pilloni, V., Colistra, G., Atzori, L.: The virtual object as a major element of the internet of things: a survey. IEEE Commun. Surv. Tutorials 18(2), 1228–1240 (2016)
Ouaddah, A., Mousannif, H., Elkalam, A.A., Ouahman, A.A.: Access control in the Internet of Things: big challenges and new opportunities. Comput. Netw. 112, 237–262 (2017)
Rajpoot, Q.M., Jensen, C.D., Krishnan, R.: Integrating attributes into role-based access control. In: Samarati, P. (ed.) DBSec 2015. LNCS, vol. 9149, pp. 242–249. Springer, Cham (2015). doi:10.1007/978-3-319-20810-7_17
Sandhu, R., Coyne, E.J., Feinstein, H., Youman, C.: Role-based access control models. Computer 29(2), 38–47 (1996)
Zhang, G., Tian, J.: An extended role based access control model for the Internet of Things. In: IEEE International Conference on Information Networking and Automation (ICINA), vol. 1, pp. V1-319–V1-323. IEEE (2010)
Zhang, Y., Patwa, F., Sandhu, R.: Community-based secure information and resource sharing in AWS public cloud. In: 1st IEEE Conference on Collaboration and Internet Computing (CIC), pp. 46–53. IEEE (2015)
Acknowledgments
This research is partially supported by NSF Grants CNS- 1111925, CNS-1423481, CNS-1538418, and DoD ARL Grant W911NF-15-1-0518.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Bhatt, S., Patwa, F., Sandhu, R. (2017). Access Control Model for AWS Internet of Things. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)