Visible to the public Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things

TitleAccess Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things
Publication TypeConference Paper
Year of Publication2018
AuthorsAlshehri, Asma, Benson, James, Patwa, Farhan, Sandhu, Ravi
Conference NameProceedings of the Eighth ACM Conference on Data and Application Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5632-9
KeywordsABAC, Access Control, ACL, aws iot, composability, Devices, Human Behavior, Internet of Things (IoT), IoT architecture, Metrics, privacy, pubcrawl, RBAC, Resiliency, security, Virtual Objects, virtualization privacy
Abstract

The concept of Internet of Things (IoT) has received considerable attention and development in recent years. There have been significant studies on access control models for IoT in academia, while companies have already deployed several cloud-enabled IoT platforms. However, there is no consensus on a formal access control model for cloud-enabled IoT. The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. Building upon ACO, operational and administrative access control models have been published for virtual object communication in cloud-enabled IoT illustrated by a use case of sensing speeding cars as a running example. In this paper, we study AWS IoT as a major commercial cloud-IoT platform and investigate its suitability for implementing the afore-mentioned academic models of ACO and VO communication control. While AWS IoT has a notion of digital shadows closely analogous to VOs, it lacks explicit capability for VO communication and thereby for VO communication control. Thus there is a significant mismatch between AWS IoT and these academic models. The principal contribution of this paper is to reconcile this mismatch by showing how to use the mechanisms of AWS IoT to effectively implement VO communication models. To this end, we develop an access control model for virtual objects (shadows) communication in AWS IoT called AWS-IoT-ACMVO. We develop a proof-of-concept implementation of the speeding cars use case in AWS IoT under guidance of this model, and provide selected performance measurements. We conclude with a discussion of possible alternate implementations of this use case in AWS IoT.

URLhttp://doi.acm.org/10.1145/3176258.3176328
DOI10.1145/3176258.3176328
Citation Keyalshehri_access_2018