首页> 外文期刊>Information Systems >Security towards the edge: Sticky, policy enforcement for networked smart objects
【24h】

Security towards the edge: Sticky, policy enforcement for networked smart objects

机译:边缘安全:网络智能对象的粘性策略实施

获取原文
获取原文并翻译 | 示例
       

摘要

One of the hottest topics in the Internet of Things (IoT) domain relates to the ability of enabling computation and storage at the edges of the network. This is becoming a key feature in order to ensure the ability of managing in a scalable way service requests with low response times. This means being able to acquire, store, and process loT-generated data closer to the data producers and data consumers. In this scenario, also security and privacy solutions must be applied in a capillary way at the edges of the network. In particular, a control on access to data generated by IoT devices is necessary for guaranteeing proper levels of security and privacy as well as for preventing violation attempts, while allowing data owners to monitor and control their information. In this paper, a sticky policy apprrwh is proposed as a strategy for efficiently managing the access to JoT resources within an existing distributed middleware architecture. As demonstrated in the experimental evaluation, sticky policies represent a promising and efficient technique to increase the robustness (in a security perspective) of the loT system. (C) 2017 Elsevier Ltd. All rights reserved.
机译:物联网(IoT)域中最热门的主题之一涉及在网络边缘启用计算和存储的能力。这已成为一项关键功能,以确保以可伸缩的方式管理具有低响应时间的服务请求的能力。这意味着能够更靠近数据生产者和数据消费者获取,存储和处理物联网生成的数据。在这种情况下,安全和隐私解决方案也必须以毛细管方式应用于网络边缘。尤其是,有必要对物联网设备生成的数据的访问进行控制,以确保适当级别的安全性和隐私并防止违规尝试,同时允许数据所有者监视和控制其信息。在本文中,提出了一种粘性策略方法,作为一种在现有分布式中间件体系结构中有效管理对JoT资源的访问的策略。如实验评估所示,粘性策略代表了一种有前途且有效的技术,可以提高loT系统的鲁棒性(从安全性角度而言)。 (C)2017 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号