The Community for Technology Leaders
2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom-BigDataSE) (2018)
New York, NY, USA
Aug 1, 2018 to Aug 3, 2018
ISSN: 2324-9013
ISBN: 978-1-5386-4388-4
pp: 551-559
ABSTRACT
With the proliferation of cloud-based data and services, accessing data from distributed cloud environments and consequently providing integrated results to the users has become a key challenge, often involving large processing overheads and administrative costs. The traditional, spatial, temporal and other context-sensitive access control models have been applied in different environments in order to access such data and information. Recently, fog-based access control models have also been introduced to overcome the latency and processing issues by moving the execution of application logic from the cloud-level to an intermediary-level through adding computational nodes at the edges of the networks. These existing access control models mostly have been used to access data from centralized sources. However, we have been encountering rapid changes in computing technologies over the last few years, and many organizations need to dynamically control context-sensitive access to cloud data resources from distributed environments. In this article, we propose a new generation of fog-based access control approach, combining the benefits of fog computing and context-sensitive access control solutions. We first formally introduce a general data model and its associated policy and mapping models, in order to access data from distributed cloud sources and to provide integrated results to the users. In particular, we present a unified set of fog-based access control policies with the aim of reducing administrative burdens and processing overheads. We then introduce a unified data ontology together with its reasoning capability by realizing our formal approach. We demonstrate the applicability of our proposal through a prototype testing and several case studies. Experiment results demonstrate the good performance of our approach with respect to our earlier context-sensitive access control approach.
INDEX TERMS
authorisation, cloud computing, ontologies (artificial intelligence)
CITATION

A. S. Kayes, W. Rahayu, T. Dillon and E. Chang, "Accessing Data from Multiple Sources Through Context-Aware Access Control," 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom-BigDataSE), New York, NY, USA, 2018, pp. 551-559.
doi:10.1109/TrustCom/BigDataSE.2018.00084
383 ms
(Ver 3.3 (11022016))