Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT
In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of eac...
Saved in:
Published in | International journal of mobile computing and multimedia communications Vol. 10; no. 4; pp. 13 - 25 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Hershey
IGI Global
01.10.2019
|
Subjects | |
Online Access | Get full text |
ISSN | 1937-9412 1937-9404 |
DOI | 10.4018/IJMCMC.2019100102 |
Cover
Abstract | In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol. |
---|---|
AbstractList | In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol. |
Audience | Academic |
Author | Nakamura, Shigenari Enokido, Tomoya Takizawa, Makoto |
AuthorAffiliation | Rissho University, Tokyo, Japan Hosei University, Tokyo, Japan |
AuthorAffiliation_xml | – name: Rissho University, Tokyo, Japan – name: Hosei University, Tokyo, Japan |
Author_xml | – sequence: 1 givenname: Shigenari surname: Nakamura fullname: Nakamura, Shigenari organization: Hosei University, Tokyo, Japan – sequence: 2 givenname: Tomoya surname: Enokido fullname: Enokido, Tomoya organization: Rissho University, Tokyo, Japan – sequence: 3 givenname: Makoto surname: Takizawa fullname: Takizawa, Makoto organization: Hosei University, Tokyo, Japan |
BookMark | eNp9kUtPAyEUhYnRxFd_gLtJ3Gji6OUxgyzrxEeNjZu6JpRhKmYcKtCY_nupUzXxxeYS-A73cs4u2uxcZxA6wHDKAJ-fjW7H1bg6JYAFBsBANtAOFpTnggHb_Nxjso0GITxBWgXjjMMOkqOucf5ZReu67Kp1r1nluuhdm12oYOosncZHk1VqfjGssqNU1dS2Ni7z_n6otQnhQ3ScjV1t2sz2qpGb7KOtRrXBDNZ1Dz1cXU6qm_zu_npUDe9yzXgRc2GgpEVNCqK0IIwa0AoUmWqmtGk0Y4rjUuiSGyVqoWvdNALSB4ihVFBW0z102L879-5lYUKUT27hu9RSEkEJLXmJi0Sd9NRMtUZOF8F2aXrbBTt7jGGmFiHIIS-hoFCSMuG8x7V3IXjTSG3ju1XRK9tKDHLlv-z9l1_-JyX-ppx7-6z88l_Nca-xM_s1_Q9OzusmsTe_sOsc5SpHuY5ErnL6sykG-gaIYay0 |
CitedBy_id | crossref_primary_10_1002_cpe_6311 crossref_primary_10_1109_JIOT_2021_3061687 crossref_primary_10_3390_pr11030723 crossref_primary_10_1002_cpe_5944 crossref_primary_10_1016_j_iot_2022_100542 crossref_primary_10_3390_app13074167 |
Cites_doi | 10.1109/2.241422 10.1016/j.mcm.2013.02.006 10.1504/IJAIS.2015.072139 10.1145/857076.857078 10.1109/ICWS.2005.25 10.1109/TIE.2010.2051393 10.3233/JHS-180593 10.1016/j.elerap.2015.07.001 10.1504/IJSSC.2016.076564 10.4018/IJMCMC.2017100101 10.1109/CISIS.2016.123 10.1016/j.cogsys.2019.03.011 10.1002/cpe.5118 10.1109/2.485845 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2019 IGI Global Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. |
Copyright_xml | – notice: COPYRIGHT 2019 IGI Global – notice: Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. |
DBID | AAYXX CITATION N95 7SC 8FD 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V L7M L~C L~D M7S P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PTHSS |
DOI | 10.4018/IJMCMC.2019100102 |
DatabaseName | CrossRef Gale Business: Insights Computer and Information Systems Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Materials Science & Engineering ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Engineering Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering Collection |
DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | CrossRef Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1937-9404 |
EndPage | 25 |
ExternalDocumentID | A760530626 10_4018_IJMCMC_2019100102 rmation_Flow_Control_Base10_4018_IJMCMC_201910010210 |
GeographicLocations | Japan |
GeographicLocations_xml | – name: Japan |
GroupedDBID | 0R ABEPT ADEKF ALMA_UNASSIGNED_HOLDINGS COVLG EBS HZ JRD MV1 NEEBM O9- RIF 0R~ 4.4 AAYVP AAYXX ABBKS ABJCF ABPHS AFKRA ARAPS BAAKF BENPR BGLVJ BTFVE BYHXH CBWLS CCPQU CDTDJ CIGCI CITATION CNQXE CTSEY EJD H13 HCIFZ HZ~ IAO ICD ITC K7- M7S N95 PHGZM PHGZT PTHSS 7SC 8FD 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V L7M L~C L~D P62 PKEHL PQEST PQGLB PQQKQ PQUKI |
ID | FETCH-LOGICAL-c475t-9e0635d252ac9243e0ca0a2bc4acefc44a7169c67ea9d9cdcff904702e33934d3 |
IEDL.DBID | 8FG |
ISSN | 1937-9412 |
IngestDate | Fri Jul 25 11:45:15 EDT 2025 Fri May 23 01:15:06 EDT 2025 Tue Jul 01 04:19:20 EDT 2025 Thu Apr 24 23:12:18 EDT 2025 Tue Jan 05 23:27:00 EST 2021 Fri Jan 15 00:04:31 EST 2021 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 4 |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c475t-9e0635d252ac9243e0ca0a2bc4acefc44a7169c67ea9d9cdcff904702e33934d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-1064-4056 0000-0002-7155-0187 |
PQID | 2932367615 |
PQPubID | 2045823 |
PageCount | 13 |
ParticipantIDs | gale_businessinsightsgauss_A760530626 igi_journals_rmation_Flow_Control_Base10_4018_IJMCMC_201910010210 crossref_citationtrail_10_4018_IJMCMC_2019100102 proquest_journals_2932367615 crossref_primary_10_4018_IJMCMC_2019100102 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2019-10-01 |
PublicationDateYYYYMMDD | 2019-10-01 |
PublicationDate_xml | – month: 10 year: 2019 text: 2019-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Hershey |
PublicationPlace_xml | – name: Hershey |
PublicationTitle | International journal of mobile computing and multimedia communications |
PublicationYear | 2019 |
Publisher | IGI Global |
Publisher_xml | – name: IGI Global |
References | IJMCMC.2019100102-5 IJMCMC.2019100102-20 IJMCMC.2019100102-10 IJMCMC.2019100102-21 S.Nakamura (IJMCMC.2019100102-8) 2015; 11 IJMCMC.2019100102-9 IJMCMC.2019100102-11 IJMCMC.2019100102-22 M. R.Ogiela (IJMCMC.2019100102-17) 2016 IJMCMC.2019100102-23 IJMCMC.2019100102-13 IJMCMC.2019100102-14 IJMCMC.2019100102-15 IJMCMC.2019100102-16 J. L.Hern’andez-Ramos (IJMCMC.2019100102-7) 2013; 3 T.Saito (IJMCMC.2019100102-19) 2019 E. B.Fernandez (IJMCMC.2019100102-4) 1980 D.Hanes (IJMCMC.2019100102-6) 2018 R.Oma (IJMCMC.2019100102-18) 2018; 1-2 C. J.Date (IJMCMC.2019100102-0) 2003 S.Nakamura (IJMCMC.2019100102-12) 2019 D. E. R.Denning (IJMCMC.2019100102-1) 1982 IJMCMC.2019100102-3 IJMCMC.2019100102-2 |
References_xml | – ident: IJMCMC.2019100102-20 doi: 10.1109/2.241422 – ident: IJMCMC.2019100102-5 doi: 10.1016/j.mcm.2013.02.006 – ident: IJMCMC.2019100102-9 doi: 10.1504/IJAIS.2015.072139 – ident: IJMCMC.2019100102-3 doi: 10.1145/857076.857078 – start-page: 570 year: 2019 ident: IJMCMC.2019100102-19 article-title: Evaluation of tbc and obc precedent relations among messages publication-title: Proceedings of the 33rd International Conference on Advanced Information Networking and Applications Workshops – ident: IJMCMC.2019100102-23 doi: 10.1109/ICWS.2005.25 – ident: IJMCMC.2019100102-2 doi: 10.1109/TIE.2010.2051393 – start-page: 3 year: 2019 ident: IJMCMC.2019100102-12 article-title: Evaluation of an OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT. publication-title: Proceedings of the 22nd International Conference on Network-Based Information Systems – volume: 3 start-page: 1 issue: 3/4 year: 2013 ident: IJMCMC.2019100102-7 article-title: Distributed capability-based access control for the internet of things. publication-title: Journal of Internet Services and Information Security – ident: IJMCMC.2019100102-14 doi: 10.3233/JHS-180593 – ident: IJMCMC.2019100102-16 doi: 10.1016/j.elerap.2015.07.001 – volume: 1-2 start-page: 14 year: 2018 ident: IJMCMC.2019100102-18 article-title: An energy-efficient model for fog computing in the internet of things (iot). Internet of Things publication-title: Engineering Cyber Physical Human Systems – ident: IJMCMC.2019100102-10 doi: 10.1504/IJSSC.2016.076564 – ident: IJMCMC.2019100102-22 doi: 10.4018/IJMCMC.2017100101 – volume: 11 start-page: 263 issue: 3&4 year: 2015 ident: IJMCMC.2019100102-8 article-title: A flexible read-write abortion protocol to prevent illegal information flow among objects. publication-title: Journal of Mobile Multimedia – year: 1980 ident: IJMCMC.2019100102-4 publication-title: Database Security and Integrity – ident: IJMCMC.2019100102-15 doi: 10.1109/CISIS.2016.123 – start-page: 1055 year: 2016 ident: IJMCMC.2019100102-17 article-title: On using cognitive models in cryptography. publication-title: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications – ident: IJMCMC.2019100102-11 doi: 10.1016/j.cogsys.2019.03.011 – ident: IJMCMC.2019100102-13 doi: 10.1002/cpe.5118 – year: 1982 ident: IJMCMC.2019100102-1 publication-title: Cryptography and Data Security – ident: IJMCMC.2019100102-21 doi: 10.1109/2.485845 – year: 2003 ident: IJMCMC.2019100102-0 publication-title: An Introduction to Database Systems – year: 2018 ident: IJMCMC.2019100102-6 publication-title: Iot fundamentals: networking technologies, protocols, and use cases for the internet of things |
SSID | ssj0000547470 |
Score | 2.2259145 |
Snippet | In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make... |
SourceID | proquest gale crossref igi |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 13 |
SubjectTerms | Access control Actuators Devices Flow control Information flow Internet of Things |
Title | Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT |
URI | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMCMC.2019100102 https://www.proquest.com/docview/2932367615 |
Volume | 10 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfR1da9sw8Fjbl71s3Rfz2hUxNtgGorYsf-ipOKZZW0gZo4W-CUWySyAk2ZxS-u97Z8kNpawvNkg6Ye5O96XzHcDXRGWG7AbuVJlzKazlpowNzxwOlFmbp47iHZPz_ORSnl1lVyHg1oW0ykEm9oLaLS3FyA9RLVGxMVTAR6u_nLpG0e1qaKGxBTsJahri83L86yHGguYIWsuxv1guuJKJ8Beb6FSUh6dnk3pSU3aXSvrSao9UUxDQW7Pr2RMx3eue8S68CkYjqzyV38CLZvEWXg8NGVg4n-9Ah5-LCNlsPF_estpnorMRKivHcBTtPVab1aiq2Xd8-yrdd9zPV333xAHoB6NGaXM281Cny4v3cDk-vqhPeOigwK0ssjVXDVogmROZMBYdrbSJrYmNmFppbNNaKQ0Vy7F50RjllHW2bVWMGBNNmqpUuvQDbC-Wi-YjsELgjnmK59-00k1bBChbKdAxj6UVooggHpCnbSgvTl0u5hrdDMK39vjWG3xH8PMBZOVrazy3-BtRRIfenPjoKHrRXZubrtNVgW4Zej8ij-ALkkyHk9g93UivXBtB9WhRoIwmyuiAZE2Y_-_nJHEE-wNXbDbacOmn56f34CVt5tMC92F7_e-m-YzmzXp60PPwAeyMjs9__7kHpinzHQ |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1da9sw8GjTh-1l3Sfz2rVirLANRB1Z_noYw_EakrYJY6TQN02R5BIISVqnlP6p_cadIrmhlPWtLzZYusPcne5L0h3A53YeS-s3UJ1nCeVMKSqzUNJY44csrpJI23zHYJj0zvjxeXy-AX-buzD2WGWjE1eKWs-VzZEfolmyxcbQAP9YXFLbNcrurjYtNJxYnJjbGwzZ6u_9n8jfA8a6R6OyR31XAap4Gi9pbtAqx5rFTCoMPiITKhlKNlZcKlMpzqUtIKOS1Mhc50qrqspDnobMRFEecR0h3k3Y4vZGawu2OkfDX7_vsjroAKF_Hrqt7JTmvM3cViqGMdlh_3hQDkp7nixvr4q53TOG3iRsTi4mDwzDytp1X8IL76aSwsnVK9gws9ew3bSAIF4jvAHhrzNZ9pLudH5DSnf2nXTQPGqCX9HDJKVcdIqSfMG3qwt-S914serX2AB9JbY125RMHFR_PnoLZ09C3XfQms1n5j2QlCHGJEKNIyuuxxUCZBVnZsxCrhhLAwgb4gnlC5rbvhpTgYGNpbdw9BZregfw7Q5k4ap5PDb5wHJE-G6g-KhtvqS-kNd1LYoUA0GMt1gSwCdkmfBrv36ISCx0FUBxb5LnjLCcEZ7IwlL-v7_TDgPYbaRijWi9Lj48PrwPz3qjwak47Q9PduC5RewOJe5Ca3l1bT6ic7Uc73mJJvDnqRfRP__iMMM |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+Flow+Control+Based+on+the+CapBAC+%28Capability-Based+Access+Control%29+Model+in+the+IoT&rft.jtitle=International+journal+of+mobile+computing+and+multimedia+communications&rft.au=Nakamura%2C+Shigenari&rft.au=Enokido%2C+Tomoya&rft.au=Takizawa%2C+Makoto&rft.date=2019-10-01&rft.issn=1937-9412&rft.eissn=1937-9404&rft.volume=10&rft.issue=4&rft.spage=13&rft.epage=25&rft_id=info:doi/10.4018%2FIJMCMC.2019100102&rft.externalDocID=rmation_Flow_Control_Base10_4018_IJMCMC_201910010210 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1937-9412&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1937-9412&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1937-9412&client=summon |