Premium
Implementation and evaluation of the information flow control for the Internet of Things
Author(s) -
Nakamura Shigenari,
Enokido Tomoya,
Takizawa Makoto
Publication year - 2021
Publication title -
concurrency and computation: practice and experience
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.309
H-Index - 67
eISSN - 1532-0634
pISSN - 1532-0626
DOI - 10.1002/cpe.6311
Subject(s) - computer science , security token , protocol (science) , access control , the internet , subject (documents) , computer security , process (computing) , authorization , resource (disambiguation) , computer network , internet protocol , database , world wide web , operating system , medicine , alternative medicine , pathology
In the Internet of Things, the CBAC (capability‐based access control) model is proposed to make devices securely accessed. Here, an owner of a device issues a capability token, that is, a set of access rights, to a subject. The subject is allowed to manipulate ROs (resource objects) in the device according to access rights in the capability token. In the CBAC model, there is a problem a subject sb i can obtain data of an ROr m kby accessing the data in an ROr n lafter the data are brought to the ROr n leven if the subject sb i is not allowed to obtain the data from the ROr m k. Here, the data in the ROr m killegally flow to the subject sb i . In our previous studies, the OI (operation interruption) protocol where illegal operations are interrupted is proposed and evaluated in the simulation. In this article, we implement the OI protocol and evaluate the authorization process of the OI protocol in terms of the execution time. In the evaluation, we make clear the features of the execution time of authorization processes for GET, PUT, POST, and DELETE operations in the OI protocol.