每个用户访问控制框架的可伸缩性评估

Arata Endo, Chun-Jae Lee, S. Date
{"title":"每个用户访问控制框架的可伸缩性评估","authors":"Arata Endo, Chun-Jae Lee, S. Date","doi":"10.1109/CSCI54926.2021.00291","DOIUrl":null,"url":null,"abstract":"Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.","PeriodicalId":206881,"journal":{"name":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Scalability Evaluation of a Per-User Access Control Framework\",\"authors\":\"Arata Endo, Chun-Jae Lee, S. Date\",\"doi\":\"10.1109/CSCI54926.2021.00291\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.\",\"PeriodicalId\":206881,\"journal\":{\"name\":\"2021 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computational Science and Computational Intelligence (CSCI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSCI54926.2021.00291\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Science and Computational Intelligence (CSCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSCI54926.2021.00291","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

当今的物联网(IoT)设备具有各种各样的安全需求和策略。为了满足各种需求和策略,对这些设备进行了访问控制,但对网络资源进行访问控制的情况很少。针对这种情况,我们在之前的工作中提出了一个每用户访问控制框架,利用软件定义网络实现对网络链路和带宽作为网络资源的访问控制。所建议的框架使网络管理员能够简单地通过将管理员的策略作为所建议框架的输入来对网络资源应用访问控制。然而,人们仍然担心,当物联网设备数量增加时,拟议的框架可能会导致数据传输的重大开销。在本文中,我们通过考虑使用大量物联网设备的实际和实际情况,研究了所提出的框架作为基础设施的可扩展性。我们的评估结果表明,所提出的方法所产生的开销可以忽略不计,特别是在物联网设备传输大容量数据的情况下。此外,评估结果表明,所提出的框架减少了物联网设备对第三方的暴露时间。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Scalability Evaluation of a Per-User Access Control Framework
Today’s Internet of Things (IoT) devices have a variety of security requirements and policies. While an access control is applied to such devices to meet the varieties of requirements and policies, the access control has rarely been used for network resources. Due to this situation, we have proposed a per-user access control framework, which realizes the access control for network links and bandwidth as network resources by using Software-Defined Networking, in our previous work. The proposed framework enables a network administrator to apply access control to network resources simply by giving the administrator’s policy as input to the proposed framework. However, there remains the concern that the proposed framework may cause a significant overhead for the data transfers when the number of IoT devices is increased. In this paper, we investigate how scalable the proposed framework is as infrastructure, by considering the actual and practical situation where lots of IoT devices are used. Our evaluation results imply that the overhead incurred by the proposed method is negligible, especially in the case where IoT devices transfer large-sized data. Also, the evaluation results show that the proposed framework reduces the exposure time of the IoT devices to a third party.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Remote Video Surveillance Effects of Social Distancing Intention, Affective Risk Perception, and Cabin Fever Syndrome on Perceived Value of E-learning : Type of submission: Late Breaking Paper / Most relevant symposium: CSCI-ISED Cybersecurity Integration: Deploying Critical Infrastructure Security and Resilience Topics into the Undergraduate Curriculum Distributed Algorithms for k-Coverage in Mobile Sensor Networks Software Development Methodologies for Virtual Reality
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1