Access control model for virtual objects (Shadows) communication for AWS internet of things

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The concept of Internet of Things (IoT) has received considerable attention and development in recent years. There have been significant studies on access control models for IoT in academia, while companies have already deployed several cloud-enabled IoT platforms. However, there is no consensus on a formal access control model for cloud-enabled IoT. The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. Building upon ACO, operational and administrative access control models have been published for virtual object communication in cloud-enabled IoT illustrated by a use case of sensing speeding cars as a running example. In this paper, we study AWS IoT as a major commercial cloud-IoT platform and investigate its suitability for implementing the afore-mentioned academic models of ACO and VO communication control. While AWS IoT has a notion of digital shadows closely analogous to VOs, it lacks explicit capability for VO communication and thereby for VO communication control. Thus there is a significant mismatch between AWS IoT and these academic models. The principal contribution of this paper is to reconcile this mismatch by showing how to use the mechanisms of AWS IoT to effectively implement VO communication models. To this end, we develop an access control model for virtual objects (shadows) communication in AWS IoT called AWS-IoT-ACMVO. We develop a proof-of-concept implementation of the speeding cars use case in AWS IoT under guidance of this model, and provide selected performance measurements. We conclude with a discussion of possible alternate implementations of this use case in AWS IoT.

Original languageEnglish
Title of host publicationCODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery, Inc
Pages175-185
Number of pages11
ISBN (Electronic)9781450356329
DOIs
StatePublished - 13 Mar 2018
Externally publishedYes
Event8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018 - Tempe, United States
Duration: 19 Mar 201821 Mar 2018

Publication series

NameCODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy
Volume2018-January

Conference

Conference8th ACM Conference on Data and Application Security and Privacy, CODASPY 2018
Country/TerritoryUnited States
CityTempe
Period19/03/1821/03/18

Keywords

  • ABAC
  • ACL
  • AWS IoT
  • Access Control
  • Devices
  • Internet of Things (IoT)
  • IoT Architecture
  • RBAC
  • Security
  • Virtual Objects

Fingerprint

Dive into the research topics of 'Access control model for virtual objects (Shadows) communication for AWS internet of things'. Together they form a unique fingerprint.

Cite this