Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT

In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of eac...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of mobile computing and multimedia communications Vol. 10; no. 4; pp. 13 - 25
Main Authors Nakamura, Shigenari, Enokido, Tomoya, Takizawa, Makoto
Format Journal Article
LanguageEnglish
Published Hershey IGI Global 01.10.2019
Subjects
Online AccessGet full text
ISSN1937-9412
1937-9404
DOI10.4018/IJMCMC.2019100102

Cover

Abstract In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol.
AbstractList In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make the IoT secure, especially devices. In the capability-based access control (CapBAC) model proposed to make IoT devices secure, an owner of each device issues a capability token, i.e. a set of access rights, to a subject. Only a subject holding the capability token is allowed to manipulate the device. However, a subject may get data in a device d1 via another device d2 although the subject holds no capability token to get data from the device d1. Here, the data in the device d1 illegally flow to the subject. In this article, the authors propose the operation interruption (OI) protocol where illegal get operations are interrupted. In the evaluation, the ratio of the number of get operations interrupted to the total number of get operations is kept constant even if the numbers of subjects and access rights granted to each subject increase in the OI protocol.
Audience Academic
Author Nakamura, Shigenari
Enokido, Tomoya
Takizawa, Makoto
AuthorAffiliation Rissho University, Tokyo, Japan
Hosei University, Tokyo, Japan
AuthorAffiliation_xml – name: Rissho University, Tokyo, Japan
– name: Hosei University, Tokyo, Japan
Author_xml – sequence: 1
  givenname: Shigenari
  surname: Nakamura
  fullname: Nakamura, Shigenari
  organization: Hosei University, Tokyo, Japan
– sequence: 2
  givenname: Tomoya
  surname: Enokido
  fullname: Enokido, Tomoya
  organization: Rissho University, Tokyo, Japan
– sequence: 3
  givenname: Makoto
  surname: Takizawa
  fullname: Takizawa, Makoto
  organization: Hosei University, Tokyo, Japan
BookMark eNp9kUtPAyEUhYnRxFd_gLtJ3Gji6OUxgyzrxEeNjZu6JpRhKmYcKtCY_nupUzXxxeYS-A73cs4u2uxcZxA6wHDKAJ-fjW7H1bg6JYAFBsBANtAOFpTnggHb_Nxjso0GITxBWgXjjMMOkqOucf5ZReu67Kp1r1nluuhdm12oYOosncZHk1VqfjGssqNU1dS2Ni7z_n6otQnhQ3ScjV1t2sz2qpGb7KOtRrXBDNZ1Dz1cXU6qm_zu_npUDe9yzXgRc2GgpEVNCqK0IIwa0AoUmWqmtGk0Y4rjUuiSGyVqoWvdNALSB4ihVFBW0z102L879-5lYUKUT27hu9RSEkEJLXmJi0Sd9NRMtUZOF8F2aXrbBTt7jGGmFiHIIS-hoFCSMuG8x7V3IXjTSG3ju1XRK9tKDHLlv-z9l1_-JyX-ppx7-6z88l_Nca-xM_s1_Q9OzusmsTe_sOsc5SpHuY5ErnL6sykG-gaIYay0
CitedBy_id crossref_primary_10_1002_cpe_6311
crossref_primary_10_1109_JIOT_2021_3061687
crossref_primary_10_3390_pr11030723
crossref_primary_10_1002_cpe_5944
crossref_primary_10_1016_j_iot_2022_100542
crossref_primary_10_3390_app13074167
Cites_doi 10.1109/2.241422
10.1016/j.mcm.2013.02.006
10.1504/IJAIS.2015.072139
10.1145/857076.857078
10.1109/ICWS.2005.25
10.1109/TIE.2010.2051393
10.3233/JHS-180593
10.1016/j.elerap.2015.07.001
10.1504/IJSSC.2016.076564
10.4018/IJMCMC.2017100101
10.1109/CISIS.2016.123
10.1016/j.cogsys.2019.03.011
10.1002/cpe.5118
10.1109/2.485845
ContentType Journal Article
Copyright COPYRIGHT 2019 IGI Global
Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Copyright_xml – notice: COPYRIGHT 2019 IGI Global
– notice: Copyright © 2019, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
DBID AAYXX
CITATION
N95
7SC
8FD
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
L7M
L~C
L~D
M7S
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
DOI 10.4018/IJMCMC.2019100102
DatabaseName CrossRef
Gale Business: Insights
Computer and Information Systems Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Materials Science & Engineering
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Engineering Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
Engineering Collection
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest One Community College
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Advanced Technologies Database with Aerospace
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList CrossRef
Computer Science Database

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1937-9404
EndPage 25
ExternalDocumentID A760530626
10_4018_IJMCMC_2019100102
rmation_Flow_Control_Base10_4018_IJMCMC_201910010210
GeographicLocations Japan
GeographicLocations_xml – name: Japan
GroupedDBID 0R
ABEPT
ADEKF
ALMA_UNASSIGNED_HOLDINGS
COVLG
EBS
HZ
JRD
MV1
NEEBM
O9-
RIF
0R~
4.4
AAYVP
AAYXX
ABBKS
ABJCF
ABPHS
AFKRA
ARAPS
BAAKF
BENPR
BGLVJ
BTFVE
BYHXH
CBWLS
CCPQU
CDTDJ
CIGCI
CITATION
CNQXE
CTSEY
EJD
H13
HCIFZ
HZ~
IAO
ICD
ITC
K7-
M7S
N95
PHGZM
PHGZT
PTHSS
7SC
8FD
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
L7M
L~C
L~D
P62
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
ID FETCH-LOGICAL-c475t-9e0635d252ac9243e0ca0a2bc4acefc44a7169c67ea9d9cdcff904702e33934d3
IEDL.DBID 8FG
ISSN 1937-9412
IngestDate Fri Jul 25 11:45:15 EDT 2025
Fri May 23 01:15:06 EDT 2025
Tue Jul 01 04:19:20 EDT 2025
Thu Apr 24 23:12:18 EDT 2025
Tue Jan 05 23:27:00 EST 2021
Fri Jan 15 00:04:31 EST 2021
IsPeerReviewed true
IsScholarly true
Issue 4
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c475t-9e0635d252ac9243e0ca0a2bc4acefc44a7169c67ea9d9cdcff904702e33934d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-1064-4056
0000-0002-7155-0187
PQID 2932367615
PQPubID 2045823
PageCount 13
ParticipantIDs gale_businessinsightsgauss_A760530626
igi_journals_rmation_Flow_Control_Base10_4018_IJMCMC_201910010210
crossref_citationtrail_10_4018_IJMCMC_2019100102
proquest_journals_2932367615
crossref_primary_10_4018_IJMCMC_2019100102
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-10-01
PublicationDateYYYYMMDD 2019-10-01
PublicationDate_xml – month: 10
  year: 2019
  text: 2019-10-01
  day: 01
PublicationDecade 2010
PublicationPlace Hershey
PublicationPlace_xml – name: Hershey
PublicationTitle International journal of mobile computing and multimedia communications
PublicationYear 2019
Publisher IGI Global
Publisher_xml – name: IGI Global
References IJMCMC.2019100102-5
IJMCMC.2019100102-20
IJMCMC.2019100102-10
IJMCMC.2019100102-21
S.Nakamura (IJMCMC.2019100102-8) 2015; 11
IJMCMC.2019100102-9
IJMCMC.2019100102-11
IJMCMC.2019100102-22
M. R.Ogiela (IJMCMC.2019100102-17) 2016
IJMCMC.2019100102-23
IJMCMC.2019100102-13
IJMCMC.2019100102-14
IJMCMC.2019100102-15
IJMCMC.2019100102-16
J. L.Hern’andez-Ramos (IJMCMC.2019100102-7) 2013; 3
T.Saito (IJMCMC.2019100102-19) 2019
E. B.Fernandez (IJMCMC.2019100102-4) 1980
D.Hanes (IJMCMC.2019100102-6) 2018
R.Oma (IJMCMC.2019100102-18) 2018; 1-2
C. J.Date (IJMCMC.2019100102-0) 2003
S.Nakamura (IJMCMC.2019100102-12) 2019
D. E. R.Denning (IJMCMC.2019100102-1) 1982
IJMCMC.2019100102-3
IJMCMC.2019100102-2
References_xml – ident: IJMCMC.2019100102-20
  doi: 10.1109/2.241422
– ident: IJMCMC.2019100102-5
  doi: 10.1016/j.mcm.2013.02.006
– ident: IJMCMC.2019100102-9
  doi: 10.1504/IJAIS.2015.072139
– ident: IJMCMC.2019100102-3
  doi: 10.1145/857076.857078
– start-page: 570
  year: 2019
  ident: IJMCMC.2019100102-19
  article-title: Evaluation of tbc and obc precedent relations among messages
  publication-title: Proceedings of the 33rd International Conference on Advanced Information Networking and Applications Workshops
– ident: IJMCMC.2019100102-23
  doi: 10.1109/ICWS.2005.25
– ident: IJMCMC.2019100102-2
  doi: 10.1109/TIE.2010.2051393
– start-page: 3
  year: 2019
  ident: IJMCMC.2019100102-12
  article-title: Evaluation of an OI (Operation Interruption) Protocol to Prevent Illegal Information Flow in the IoT.
  publication-title: Proceedings of the 22nd International Conference on Network-Based Information Systems
– volume: 3
  start-page: 1
  issue: 3/4
  year: 2013
  ident: IJMCMC.2019100102-7
  article-title: Distributed capability-based access control for the internet of things.
  publication-title: Journal of Internet Services and Information Security
– ident: IJMCMC.2019100102-14
  doi: 10.3233/JHS-180593
– ident: IJMCMC.2019100102-16
  doi: 10.1016/j.elerap.2015.07.001
– volume: 1-2
  start-page: 14
  year: 2018
  ident: IJMCMC.2019100102-18
  article-title: An energy-efficient model for fog computing in the internet of things (iot). Internet of Things
  publication-title: Engineering Cyber Physical Human Systems
– ident: IJMCMC.2019100102-10
  doi: 10.1504/IJSSC.2016.076564
– ident: IJMCMC.2019100102-22
  doi: 10.4018/IJMCMC.2017100101
– volume: 11
  start-page: 263
  issue: 3&4
  year: 2015
  ident: IJMCMC.2019100102-8
  article-title: A flexible read-write abortion protocol to prevent illegal information flow among objects.
  publication-title: Journal of Mobile Multimedia
– year: 1980
  ident: IJMCMC.2019100102-4
  publication-title: Database Security and Integrity
– ident: IJMCMC.2019100102-15
  doi: 10.1109/CISIS.2016.123
– start-page: 1055
  year: 2016
  ident: IJMCMC.2019100102-17
  article-title: On using cognitive models in cryptography.
  publication-title: Proceedings of IEEE the 30th International Conference on Advanced Information Networking and Applications
– ident: IJMCMC.2019100102-11
  doi: 10.1016/j.cogsys.2019.03.011
– ident: IJMCMC.2019100102-13
  doi: 10.1002/cpe.5118
– year: 1982
  ident: IJMCMC.2019100102-1
  publication-title: Cryptography and Data Security
– ident: IJMCMC.2019100102-21
  doi: 10.1109/2.485845
– year: 2003
  ident: IJMCMC.2019100102-0
  publication-title: An Introduction to Database Systems
– year: 2018
  ident: IJMCMC.2019100102-6
  publication-title: Iot fundamentals: networking technologies, protocols, and use cases for the internet of things
SSID ssj0000547470
Score 2.2259145
Snippet In the Internet of Things (IoT), not only computers like servers but also devices with sensor and actuator devices are interconnected. It is critical to make...
SourceID proquest
gale
crossref
igi
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 13
SubjectTerms Access control
Actuators
Devices
Flow control
Information flow
Internet of Things
Title Information Flow Control Based on the CapBAC (Capability-Based Access Control) Model in the IoT
URI http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJMCMC.2019100102
https://www.proquest.com/docview/2932367615
Volume 10
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfR1da9sw8Fjbl71s3Rfz2hUxNtgGorYsf-ipOKZZW0gZo4W-CUWySyAk2ZxS-u97Z8kNpawvNkg6Ye5O96XzHcDXRGWG7AbuVJlzKazlpowNzxwOlFmbp47iHZPz_ORSnl1lVyHg1oW0ykEm9oLaLS3FyA9RLVGxMVTAR6u_nLpG0e1qaKGxBTsJahri83L86yHGguYIWsuxv1guuJKJ8Beb6FSUh6dnk3pSU3aXSvrSao9UUxDQW7Pr2RMx3eue8S68CkYjqzyV38CLZvEWXg8NGVg4n-9Ah5-LCNlsPF_estpnorMRKivHcBTtPVab1aiq2Xd8-yrdd9zPV333xAHoB6NGaXM281Cny4v3cDk-vqhPeOigwK0ssjVXDVogmROZMBYdrbSJrYmNmFppbNNaKQ0Vy7F50RjllHW2bVWMGBNNmqpUuvQDbC-Wi-YjsELgjnmK59-00k1bBChbKdAxj6UVooggHpCnbSgvTl0u5hrdDMK39vjWG3xH8PMBZOVrazy3-BtRRIfenPjoKHrRXZubrtNVgW4Zej8ij-ALkkyHk9g93UivXBtB9WhRoIwmyuiAZE2Y_-_nJHEE-wNXbDbacOmn56f34CVt5tMC92F7_e-m-YzmzXp60PPwAeyMjs9__7kHpinzHQ
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1da9sw8GjTh-1l3Sfz2rVirLANRB1Z_noYw_EakrYJY6TQN02R5BIISVqnlP6p_cadIrmhlPWtLzZYusPcne5L0h3A53YeS-s3UJ1nCeVMKSqzUNJY44csrpJI23zHYJj0zvjxeXy-AX-buzD2WGWjE1eKWs-VzZEfolmyxcbQAP9YXFLbNcrurjYtNJxYnJjbGwzZ6u_9n8jfA8a6R6OyR31XAap4Gi9pbtAqx5rFTCoMPiITKhlKNlZcKlMpzqUtIKOS1Mhc50qrqspDnobMRFEecR0h3k3Y4vZGawu2OkfDX7_vsjroAKF_Hrqt7JTmvM3cViqGMdlh_3hQDkp7nixvr4q53TOG3iRsTi4mDwzDytp1X8IL76aSwsnVK9gws9ew3bSAIF4jvAHhrzNZ9pLudH5DSnf2nXTQPGqCX9HDJKVcdIqSfMG3qwt-S914serX2AB9JbY125RMHFR_PnoLZ09C3XfQms1n5j2QlCHGJEKNIyuuxxUCZBVnZsxCrhhLAwgb4gnlC5rbvhpTgYGNpbdw9BZregfw7Q5k4ap5PDb5wHJE-G6g-KhtvqS-kNd1LYoUA0GMt1gSwCdkmfBrv36ISCx0FUBxb5LnjLCcEZ7IwlL-v7_TDgPYbaRijWi9Lj48PrwPz3qjwak47Q9PduC5RewOJe5Ca3l1bT6ic7Uc73mJJvDnqRfRP__iMMM
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Information+Flow+Control+Based+on+the+CapBAC+%28Capability-Based+Access+Control%29+Model+in+the+IoT&rft.jtitle=International+journal+of+mobile+computing+and+multimedia+communications&rft.au=Nakamura%2C+Shigenari&rft.au=Enokido%2C+Tomoya&rft.au=Takizawa%2C+Makoto&rft.date=2019-10-01&rft.issn=1937-9412&rft.eissn=1937-9404&rft.volume=10&rft.issue=4&rft.spage=13&rft.epage=25&rft_id=info:doi/10.4018%2FIJMCMC.2019100102&rft.externalDocID=rmation_Flow_Control_Base10_4018_IJMCMC_201910010210
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1937-9412&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1937-9412&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1937-9412&client=summon