The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Vues en texte intégral
141
De nouveaux services peuvent utiliser des nœuds Fog pour distribuer des données Internet des objets (IoT). Pour distribuer les données IoT, nous appliquons le modèle de messagerie de publication/abonnement à un système de brouillard informatique. Un fournisseur de services attribue un identifiant unique, appelé ID de balise, à un joueur qui doit des données. UN ID de balise correspond à plusieurs identifiants et résout la règle de dénomination pour l’acquisition de données. Cependant, lorsque les utilisateurs configurent leur nœud Fog et distribuent des données IoT à plusieurs acteurs, les données distribuées peuvent contenir des informations privées. Nous proposons une liste de contrôle d'accès (ACL) basée sur des tables pour gérer les autorisations de transmission de données afin de résoudre ce problème. Il est possible d'éviter la transmission inutile de données privées en utilisant une ACL basée sur une table. De plus, comme il y a moins de transmissions de données, les ACL basées sur des tables réduisent le trafic. Par conséquent, le délai de traitement moyen du système global peut être réduit. Les performances de la méthode proposée ont été confirmées par les résultats de simulation. Les listes de contrôle d'accès basées sur des tables, en particulier, pourraient réduire le délai de traitement d'environ 25 % dans certaines conditions. Nous nous sommes également concentrés sur la sécurité du système. La méthode proposée a été utilisée et une évaluation qualitative a été réalisée pour démontrer que la sécurité est garantie.
Masaki YOSHII
Kogakuin University Graduate School
Ryohei BANNO
Kogakuin University
Osamu MIZUNO
Kogakuin University Graduate School
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Masaki YOSHII, Ryohei BANNO, Osamu MIZUNO, "Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method" in IEICE TRANSACTIONS on Communications,
vol. E105-B, no. 11, pp. 1390-1399, November 2022, doi: 10.1587/transcom.2021TMP0007.
Abstract: New services can use fog nodes to distribute Internet of Things (IoT) data. To distribute IoT data, we apply the publish/subscribe messaging model to a fog computing system. A service provider assigns a unique identifier, called a Tag ID, to a player who owes data. A Tag ID matches multiple IDs and resolves the naming rule for data acquisition. However, when users configure their fog node and distribute IoT data to multiple players, the distributed data may contain private information. We propose a table-based access control list (ACL) to manage data transmission permissions to address this issue. It is possible to avoid unnecessary transmission of private data by using a table-based ACL. Furthermore, because there are fewer data transmissions, table-based ACL reduces traffic. Consequently, the overall system's average processing delay time can be reduced. The proposed method's performance was confirmed by simulation results. Table-based ACL, particularly, could reduce processing delay time by approximately 25% under certain conditions. We also concentrated on system security. The proposed method was used, and a qualitative evaluation was performed to demonstrate that security is guaranteed.
URL: https://global.ieice.org/en_transactions/communications/10.1587/transcom.2021TMP0007/_p
Copier
@ARTICLE{e105-b_11_1390,
author={Masaki YOSHII, Ryohei BANNO, Osamu MIZUNO, },
journal={IEICE TRANSACTIONS on Communications},
title={Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method},
year={2022},
volume={E105-B},
number={11},
pages={1390-1399},
abstract={New services can use fog nodes to distribute Internet of Things (IoT) data. To distribute IoT data, we apply the publish/subscribe messaging model to a fog computing system. A service provider assigns a unique identifier, called a Tag ID, to a player who owes data. A Tag ID matches multiple IDs and resolves the naming rule for data acquisition. However, when users configure their fog node and distribute IoT data to multiple players, the distributed data may contain private information. We propose a table-based access control list (ACL) to manage data transmission permissions to address this issue. It is possible to avoid unnecessary transmission of private data by using a table-based ACL. Furthermore, because there are fewer data transmissions, table-based ACL reduces traffic. Consequently, the overall system's average processing delay time can be reduced. The proposed method's performance was confirmed by simulation results. Table-based ACL, particularly, could reduce processing delay time by approximately 25% under certain conditions. We also concentrated on system security. The proposed method was used, and a qualitative evaluation was performed to demonstrate that security is guaranteed.},
keywords={},
doi={10.1587/transcom.2021TMP0007},
ISSN={1745-1345},
month={November},}
Copier
TY - JOUR
TI - Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method
T2 - IEICE TRANSACTIONS on Communications
SP - 1390
EP - 1399
AU - Masaki YOSHII
AU - Ryohei BANNO
AU - Osamu MIZUNO
PY - 2022
DO - 10.1587/transcom.2021TMP0007
JO - IEICE TRANSACTIONS on Communications
SN - 1745-1345
VL - E105-B
IS - 11
JA - IEICE TRANSACTIONS on Communications
Y1 - November 2022
AB - New services can use fog nodes to distribute Internet of Things (IoT) data. To distribute IoT data, we apply the publish/subscribe messaging model to a fog computing system. A service provider assigns a unique identifier, called a Tag ID, to a player who owes data. A Tag ID matches multiple IDs and resolves the naming rule for data acquisition. However, when users configure their fog node and distribute IoT data to multiple players, the distributed data may contain private information. We propose a table-based access control list (ACL) to manage data transmission permissions to address this issue. It is possible to avoid unnecessary transmission of private data by using a table-based ACL. Furthermore, because there are fewer data transmissions, table-based ACL reduces traffic. Consequently, the overall system's average processing delay time can be reduced. The proposed method's performance was confirmed by simulation results. Table-based ACL, particularly, could reduce processing delay time by approximately 25% under certain conditions. We also concentrated on system security. The proposed method was used, and a qualitative evaluation was performed to demonstrate that security is guaranteed.
ER -