Managing Security Services in Heterogenous Networks
eBook - ePub

Managing Security Services in Heterogenous Networks

Confidentiality, Integrity, Availability, Authentication, and Access Control

  1. 182 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Managing Security Services in Heterogenous Networks

Confidentiality, Integrity, Availability, Authentication, and Access Control

About this book

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control.

The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at:



  • Access control methods in cloud-enabled Internet of Things


  • Secure routing algorithms for mobile ad-hoc networks


  • Building security trust in mobile ad-hoc networks using soft computing methods


  • The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain


  • Password authentication and keystroke biometrics


  • Health care data analytics over Big Data


  • Bluetooth: and its open issues for managing security services in heterogenous networks

Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Managing Security Services in Heterogenous Networks by R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N Jeyanthi, R. Thandeeswaran,Thinagaran Perumal,Kun Ma,N Jeyanthi in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

1
Access Control Methods in the Cloud-Enabled Internet of Things

B. Ravinder Reddy, T. Adilakshmi, and C. Pavan Kumar
Department of Computer Science and Engineering, Anurag Group of Institutions, Hyderabad, Telangana
Department of Computer Science and Engineering, Vasavi College of Engineering, Hyderabad, Telangana
Department of Computer Science and Engineering, Indian Institute of Information Technology Dharwad, Karnataka
Contents
1.1 Introduction
1.1.1 The Network of Things
1.2 The IoT Application Domain
1.3 Cloud Computing
1.3.1 Essential Characteristics
1.3.2 Deployment Models
1.3.3 Service Models
1.4 Motivation
1.5 Preliminaries
1.5.1 Role-Based Access Control
1.5.2 Capability-Based Access Control
1.5.3 Attribute-Based Access Control
1.6 Access Control Methods in the CEIoT
1.6.1 The Cloud-Enabled Internet of Things
1.6.1.1 CEIoT for Wearable Devices
1.6.1.2 Authorization in the Cloud-Based IoT
1.6.1.3 Amazon Web Services–Enabled IoT
1.6.2 Capability-Based Access Control in the IoT
1.6.2.1 Centralized Capability-Based IoT
1.6.2.2 Distributed Capability-Based IoT
1.7 Future Scope
1.8 Conclusion
References
The Internet of Things (IoT) happens to be one of the most promising technologies in recent research. Collecting data from multiple heterogeneous devices, as well as storage and analysis of the collected data, has applications in many domains such as healthcare, transportation, home automation, etc., drawing the attention of researchers from various domains. Even though data are collected from different heterogeneous devices, these data are stored in the cloud. In case of the cloud-enabled Internet of Things, it offers multitenancy as one of its characteristics. Simultaneously securing such data and offering a good access control policy over the cloud without compromising on user data and privacy is a challenging task. Access control policies provide an efficient access control mechanism for users to access data over the cloud. In this chapter, an extensive overview of existing access control policies proposed in the context of the cloud and IoT are discussed in detail. Also, the possibilities of future research directions are outlined.

1.1 Introduction

The IoT is state-of-the-art technology that not only requires the development of infrastructure and software but also the design and deployment of services capable of supporting multiple scalable, interoperable, and secure applications. In the process of designing the secure communication architecture for IoT data, many have realized that a common problem to be addressed is the security of the information, with an emphasis on access control policies so that data can be used effectively by a wide range of users based on their requirements. In this chapter, we review and summarize recent trends and challenges in access control related to data in the cloud and IoT and discuss various models that support data accessibility, taking the IoT and cloud computing as reference examples of application domains.
The Internet Society [31] describes the IoT as follows: ā€œIoT refers to scenarios in which network connectivity and computing capability to extend it to objects, sensors and devices not normally considered computing devices, allowing these to generate exchange and utilize data with no human interventionā€.
Mattern and Floerkemeier [23] visualized IoT technology as ā€œThe Internet of Things represents a vision in which the Internet extends into the real world embracing everyday objects. Physical items are no longer disconnected from the virtual world, but can be controlled remotely and can act as physical access points to Internet servicesā€.

1.1.1 The Network of Things

The National Institute of Standards and Technology (NIST) defines the following five primitives for the ā€œNetwork of Thingsā€ that includes IoT as well [35]:
  1. Sensors that measure the physical parameters that are of interest such as temperature, humidity, pressure, weight, etc.
  2. Aggregators that convert the raw data into processed or aggregated data.
  3. Communication channel that allows data transmission among the entities involved.
  4. External utilities include external components required for the computation.
  5. Decision triggera are predicates that have true values used to initiate a command or action.
The IoT may or may not utilize all the primitives defined for the Network of Things, dor example, a cyber physical system that can operate without the help of sensors. Another essential primitive component required for the IoT (not listed in the NIST primitives) is ā€œsmartnessā€. Research in IoT is evolving in multiple directions with the research progress in the IoT primitives and manufacture of energy-efficient, low-cost hardware communication devices [20]. However, the heterogeneity of underlying devices and communication technologies, interoperability, and security requirements in different layers is a challenge for generic IoT solutions to be developed on a larger scale.
Xu et al. [11] proposed a four-layered architecture for IoT comprising the following:
  1. Sensing Layer – Acts as an interface between the physical world and cyber world, sensing and collecting data with the help of sensors, cameras, radio frequency identification (RFID), etc.
  2. Networking Layer – Provides networking support for data transmission and collection and control applications.
  3. Service Layer – Acts as middleware to support business logic and service integration.
  4. Interface Layer – Provides an interface to seamlessly integrate the service layer with end users.

1.2 The IoT Application Domain

The IoT has applications in various domains. Figure 1.1 represents an overview of IoT application areas ranging from personal gadgets to industries.
image
Figure 1.1 Application of IoT in various domains.

1.3 Cloud Computing

The IoT infrastructure collects data and stores them over networked servers like the cloud. According to NIST, cloud computing [24] is defined as ā€œa model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interactionā€.
Also, NIST suggests essential characteristics, deployment models, and service models for cloud computing [24].

1.3.1 Essential Characteristics

a. On-demand self service
b. Broad network access
c. Resource pooling
d. Rapid elasticity
e. Measured service

1.3.2 Deployment Models

a. Public cloud
b. Private cloud
c. Hybrid cloud
d. Community cloud

1.3.3 Service Models

a. Software as a Service (SaaS)
b. Platform as a Service (PaaS)
c. Infrastructure as a Service (IaaS)
The connected things ecosystem can utilize any of the previously mentioned cloud deployment and service models in combination to store data to form the Cloud-Enabled Internet of Things (CEIoT). In CEIoT, the cloud infrastructure is used as the medium of storage for the data sensed through IoT devices; many challenges arise due to this combination of IoT and cloud. The most common issue that needs to be ensured at both ends is security and privacy, as both the cloud and IoT deal with the storage and collection of data, respectively. In this chapter, we will emphasize one of the security features, access control, with respect to CEIoT, which validates the righteousness of the user in accessing stored data on the cloud. Throughout this chapter we have provided an overview of existing methods that make use of access control methods.

1.4 Motivation

The main motivation behind this chapter is the basic concept that heterogeneous data collected through sensing devices are stored on the cloud infrastructure and need the utmost care in terms of providing security and privacy of personal data [9,15,27,29,38]. The cloud being a multitenant and heterogeneous environment, it will be storing different types of data collected through various sources. Ensuring security to such data is of the utmost priority, as a simple breach can lead to discrepancies in business entities that trust the infrastructure as a medium of storage. CIA (confidentiality, integrity, and availability) traits are the essential components to ensure the security of data. These features are also important for providing proper access control, which determines information security [21,30,32,37].

1.5 Preliminaries

The primitives used in defining secure access control policies are discussed in this section.

1.5.1 Role-Based Access Control

Role-based access control (RBAC) methods have been predominantly used since the UNIX operating system days to specify permission to a specific set of users to access files [12]. With the recent awareness and advances in the technology, many of the commercial applications or vendors have come up with their own access control policies suitable for their products or organizations. RBAC has evolved from mandatory access control (MAC) and discretionary access control (DAC).
DAC refers to restricting or permitting access based on the group to which the initiator of the action belongs. For example, a user belonging to group A may or may not be given permission to access some set of files based on his or her membership in ...

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Contents
  6. Chapter 1 Access Control Methods in the Cloud-Enabled Internet of Things
  7. Chapter 2 an Intelligent Weighted Fuzzy Cluster-Based Secure Routing Algorithm for Mobile ad-hoc Networks
  8. Chapter 3 Ensuring Security through Trust in Mobile ad-hoc Networks Using Soft Computing Methods
  9. Chapter 4 Proof of Virtue: Nonce-Free Hash Generation in Blockchain
  10. Chapter 5 Password Authentication Using Keystroke Biometric
  11. Chapter 6 Healthcare Data Analytics over Big Data
  12. Chapter 7 Bluetooth: State of the Art, Taxonomy, and Open Issues for Managing Security Services in Heterogeneous Networks
  13. Index