A Cloud Based Conceptual Identity Management Model for Secured Internet of Things Operation

Authors

  • Abubakar Bello Western Sydney University, Penrith, NSW 2751, Australia
  • Venkatesh Mahadevan Melbourne Institute of Technology, Melbourne, VIC 3000, Australia

DOI:

https://doi.org/10.13052/2245-1439.813

Keywords:

Internet of Things, IoT Security, Identity of Things, Cloud IoT, Identity Management

Abstract

An era ago, projecting artificial intelligence as the pillar of next-generation technology would have been technically difficult. Today, machines are getting smarter, sparking a new wave of technology that resulted to Internet of Things (IoT). With IoT in play, individuals are able to connect more electronic devices other than smartphones and computers to the Internet. The vision is to create the possibility to manage electronic appliances via the Internet with the most minimal human intervention. IoT promises the application of computing to anything anywhere, and anyone at any time. Thus, it has been estimated that over 100 billion devices will be running the IoT model – drawing the power of cloud processing to create a massive network of devices that are bound to change the essential facets of life in various dimensions. However, several obstacles remain to fulfill this vision, among them is security concerns from an Identity of Things (IDoT) management perspective. IoT devices and users are already under cyber attacks, and any lapse in identity management will propagate these attacks. This paper examined how identity management for IoT is likely to play out in a world where the Internet and cloud technologies are expected to take center stage in the running of day-to-day activities. The paper analyses the identity of things challenges in IoT, followed by a proposal of cloud identity management model for IoT.

 

Downloads

Download data is not yet available.

Author Biographies

Abubakar Bello, Western Sydney University, Penrith, NSW 2751, Australia

Abubakar Bello received his doctorate in IT with a technical, business and social focus on Cyber Security and Privacy, MBA with specialisation in ICT, and MSc and BSc (Software Engineering) in Computer Science. Dr. Abubakar has extensive research and teaching experience across information systems security management, and also worked across several corporations, privately held entities and government organisations where he provided security and privacy audit and risk management services. He also has a strong expertise in behavioural security analysis and continues to play a key role in security design innovation.

Venkatesh Mahadevan, Melbourne Institute of Technology, Melbourne, VIC 3000, Australia

Venkatesh Mahadevan gained his Bachelor’s and Master’s in Engineering, and Doctorate in Management Information Systems. Associate Professor Venkatesh has extensive teaching and research experience around the security of information systems, including many expert evaluations of different business management systems (such as Patient Management Information System, Hotel Management Information System and Remotely Accessible Management Information System for Vehicle Inspectors). Also, he has strong expertise in the end-to-end delivery of customer centric technology innovation and continues to play a major role in the planning and development of several IT management security-centric solutions.

References

Atzori, L., Iera, A., and Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787–2805.

Aijaz, A., and Aghvami, A. H. (2015). Cognitive machine-to-machine communications for Internet-of-Things: A protocol stack perspective. IEEE Internet of Things Journal, 2(2), 103–112.

Holler, J., Boyle, D., Tsiatsis, V., Mulligan, C., and Karnouskos, S. (2014). From Machine-to-machine to the Internet of Things: Introduction to a New Age of Intelligence. Academic Press. 2.

O’Neill, M. (2016). Insecurity by design: Today’s IoT device security problem. Engineering, 2(1), 48–49.

Lee, J. H., and Kim, H. (2017). Security and privacy challenges in the internet of things [security and privacy matters]. IEEE Consumer Electronics Magazine, 6(3), 134–136.

Morgan, J. (2014). A simple explanation of ‘The Internet of Things’. Available: https://www.forbes.com/sites/jacobmorgan/2014/05/13/simple-explanation-internet-things-that-anyone-can-understand/#415debcc1d09/

Granjal, J., Monteiro, E., and Silva, J. S. (2010). Enabling network-layer security on IPv6 wireless sensor networks. In 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010), 1–6. IEEE.

Batool, K., and Niazi, M. A. (2017). Modeling the internet of things: a hybrid modeling approach using complex networks and agent-based models. Complex Adaptive Systems Modeling, 5(1), 4.

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., and Ayyash, M. (2015). Internet of things: A survey on enabling technologies, protocols, and applications. IEEE Communications Surveys & Tutorials, 17(4), 2347–2376.

Lee, J. Y., Lin, W. C., and Huang, Y. H. (2014). A lightweight authentication protocol for internet of things. In 2014 International Symposium on Next-Generation Electronics (ISNE), 1–2. IEEE.

Porambage, P., Schmitt, C., Kumar, P., Gurtov, A., and Ylianttila, M. (2014). Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. In 2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728–2733. IEEE.

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S. L., Kumar, S. S., and Wehrle, K. (2011). Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), 527–542.

Black, D., and McGrew, D. (2008). Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange version 2 (IKEv2) Protocol (No. RFC 5282).

Fremantle, P., Aziz, B., Kopecký, J., and Scott, P. (2014). Federated identity and access management for the internet of things. In 2014 International Workshop on Secure Internet of Things (SIoT), 10–17. IEEE.

Ndibanje, B., Lee, H. J., and Lee, S. G. (2014). Security analysis and improvements of authentication and access control in the internet of things. Sensors, 14(8), 14786–14805.

Aazam, M., Khan, I., Alsaffar, A. A., and Huh, E. N. (2014). Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. In 2014 11th International Bhurban Conference on Applied Sciences and Technology (IBCAST), 414–419. IEEE.

Bandyopadhyay, D., and Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.

Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey on trust management for Internet of Things. Journal of network and computer applications, 42, 120–134.

Horrow, S., and Sardana, A. (2012). Identity management framework for cloud based internet of things. In Proceedings of the First International Conference on Security of Internet of Things, 200–203. ACM.

Manyika, J. (2015). The Internet of Things: Mapping the value beyond the hype. McKinsey Global Institute.

Farooq, M. U., Waseem, M., Khairi, A., and Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).

Lam, K. Y., and Chi, C. H. (2016). Identity in the Internet-of-Things (IoT): New challenges and opportunities. In International Conference on Information and Communications Security, 18–26. Springer, Cham.

Friese, I., Heuer, J., and Kong, N. (2014) “Challenges from the Identities of Things: Introduction of the Identities of Things discussion group within Kantara initiative,” in Internet of Things (WF-IoT), 2014 IEEE World Forum on, 1–4: IEEE.

Vasilomanolakis, E., Daubert, J., Luthra, M., Gazis, V., Wiesmaier, A., and Kikiras, P. (2015). On the security and privacy of internet of things architectures and systems. In 2015 International Workshop on Secure Internet of Things (SIoT), 49–57). IEEE.

Ashton, K. (2009). That ‘internet of things’ thing. RFID journal, 22(7), 97–114.

Kolias, C., Kambourakis, G., Stavrou, A., and Voas, J. (2017). DDoS in the IoT: Mirai and other botnets. Computer, 50(7), 80–84.

Gudymenko, I., Borcea-Pfitzmann, K., and Tietze, K. (2011). Privacy implications of the internet of things. In International Joint Conference on Ambient Intelligence, 280–286. Springer, Berlin, Heidelberg.

Dimov, D. (2013). Privacy Implications of the Internet of Things. InfoSec Institute, 14.

Botta, A., De Donato, W., Persico, V., and Pescape, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684–700.

Jiang, L., Da Xu, L., Cai, H., Jiang, Z., Bu, F., and Xu, B. (2014). An IoT-oriented data storage framework in cloud computing platform. IEEE Transactions on Industrial Informatics, 10(2), 1443–1451.

Li, F., Vögler, M., Claeßens, M., and Dustdar, S. (2013). Efficient and scalable IoT service delivery on cloud. In IEEE Sixth International Conference on Cloud Computing (CLOUD), 740–747. IEEE.

Moosavi, S. R., et al. (2015). SEA: a secure and efficient authentication and authorization architecture for IoT-based healthcare using smart gateways. Procedia Computer Science, 52, 452–459.

Ren, W., Yu, L., Ma, L., and Ren, Y. (2013). How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack. International Journal of Distributed Sensor Networks, 9(2), 679450.

Xue, K., Ma, C., Hong, P., and Ding, R. (2013). A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks. Journal of Network and Computer Applications, 36(1), 316–323.

Hayashi, E., Das, S., Amini, S., Hong, J., and Oakley, I. (2013). CASA: context-aware scalable authentication. In Proceedings of the Ninth Symposium on Usable Privacy and Security, 3. ACM.

Kayacik, H. G., Just, M., Baillie, L., Aspinall, D., and Micallef, N. (2014). Data driven authentication: On the effectiveness of user behaviour modelling with mobile device sensors. arXiv preprint arXiv:1410.7743.

Shi, E., Niu, Y., Jakobsson, M., and Chow, R. (2010). Implicit authentication through learning user behavior. In International Conference on Information Security, 99–113. Springer, Berlin, Heidelberg.

Chun, S., Jung, J., Jin, X., Cho, G., and Lee, K. H. (2014). Semantically enriched object identification for Internet of Things. In 2014 IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 141–142. IEEE.

Ning, H., and Wang, Z. (2011). Future internet of things architecture: like mankind neural system or social organization framework? IEEE Communications Letters, 15(4), 461–463.

Singhanat, K., Harris, N. R., and Merrett, G. V. (2016). Experimental validation of opportunistic direct interconnection between different Wireless Sensor Networks. In 2016 IEEE Sensors Applications Symposium (SAS), 1–6. IEEE.

Ding, D., Li, M., and Zhu, Z. (2018). Object Naming Service Supporting Heterogeneous Object Code Identification for IoT System. In 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), 545–554. IEEE.

Zhang, H., and Zhu, L. (2011). Internet of Things: Key technology, architecture and challenging problems. In 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE), 4, 507–512. IEEE.

Khoo, B. (2011). RFID as an Enabler of the Internet of Things: Issues of Security and Privacy. In Internet of Things (iThings/CPSCom), 2011 international conference on and 4th international conference on cyber, physical and social computing, 709–712. IEEE.

Liu, C. H., Yang, B., and Liu, T. (2014). Efficient naming, addressing and profile services in Internet-of-Things sensory environments. Ad Hoc Networks, 18, 85–101.

Roman, R., Najera, P., and Lopez, J. (2011). Securing the internet of things. Computer, 44(9), 51–58.

López, T. S., Brintrup, A., Isenberg, M. A., and Mansfeld, J. (2011). Resource management in the Internet of Things: Clustering, synchronisation and software agents. In Architecting the Internet of Things, 159–193. Springer, Berlin, Heidelberg.

Hong, S., Kim, D., Ha, M., Bae, S., Park, S. J., Jung, W., and Kim, J. E. (2010). SNAIL: an IP-based wireless sensor network approach to the internet of things. IEEE Wireless Communications, 17(6).

Lee, J. J., Hong, Y. S., and Lee, K. Y. (2015). An authentication scheme based on elliptic curve cryptosystem and openID in the internet of things. In Proceedings of the International Conference on Security and Management (SAM), 192. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).

Mahalle, P. N., and Railkar, P. N. (2015). Identity management for internet of things, 39. River Publishers.

Beltran, M. (2018). Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things. Computers & Security.

Kamath, S. H., Pandey, S., and Tanisha, K. (2017). Security Issues in Internet of Things. International Journal of Emerging Research in Management & Technology, 6(5), 260–264.

Dihal, S., Bouwman, H., de Reuver, M., Warnier, M., and Carlsson, C. (2013). Mobile cloud computing: state of the art and outlook. info, 15(1), 4–16.

Fazio, M., Celesti, A., Villari, M., and Puliafito, A. (2014). The need of a hybrid storage approach for iot in paas cloud federation. In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 779–784. IEEE.

Walraven, S., Truyen, E., and Joosen, W. (2011). A middleware layer for flexible and cost-efficient multi-tenant applications. In ACM/IFIP/USENIX International Conference on Distributed Systems Platforms and Open Distributed Processing, 370–389. Springer, Berlin, Heidelberg.

Chen, S. L., Chen, Y. Y., and Hsu, C. (2014). A new approach to integrate internet-of-things and software-as-a-service model for logistic systems: A case study. Sensors, 14(4), 6144–6164.

Butzin, B., Konieczek, B., Golatowski, F., Timmermann, D., and Fiehe, C. (2016). Applying the BaaS reference architecture on different classes of devices. In 2016 2nd International Workshop on Modelling, Analysis, and Control of Complex CPS (CPS Data), 1–6. IEEE.

Khajeh-Hosseini, A., Greenwood, D., and Sommerville, I. (2010). Cloud migration: A case study of migrating an enterprise it system to iaas. In 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), 450–457. IEEE.

Limoncelli, T., Chalup, S. R., and Hogan, C. J. (2014). The Practice of Cloud System Administration: Designing and Operating Large Distributed Systems, 2. Pearson Education.

Chen, D., and Zhao, H. (2012). Data security and privacy protection issues in cloud computing. In 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE), 1, 647–651. IEEE.

Ferreira, J. A. L., and da Silva, A. R. (2014). Mobile cloud computing. Open Journal of Mobile Computing and Cloud Computing, 1(2), 59–77.

Celesti, A., Tusa, F., Villari, M., and Puliafito, A. (2010). Security and cloud computing: Intercloud identity management infrastructure. In 2010 19th IEEE International Workshop on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE), 263–265. IEEE.

Naik, N., and Jenkins, P. (2016). A secure mobile cloud identity: Criteria for effective identity and access management standards. In 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 89–90. IEEE.

Downloads

Published

2018-07-11

How to Cite

1.
Bello A, Mahadevan V. A Cloud Based Conceptual Identity Management Model for Secured Internet of Things Operation. JCSANDM [Internet]. 2018 Jul. 11 [cited 2024 Nov. 23];8(1):53-74. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5319

Issue

Section

Articles