Efficient Fine Grained Access Control for RFID Inter-Enterprise System
DOI:
https://doi.org/10.13052/jcsm2245-1439.232Keywords:
access control, policy, security, RFID, IoTAbstract
Access control management is a very challenging task in an inter-enterprise RFID system due to huge amounts of information about things or objects that can be collected and accessed to and from the system. Furthermore, the information stored in the inter-enterprise RFID system contains sensitive and confidential data related to the activities of the organization involved around the RFID system. Hence, the efficiency and high-granularity are critical in the design of access control for such system. This paper presents a novel access control model which is efficient and fine grained for such a system. A detail definition and mechanism of the access control model are described in the paper. A system implementation is developed for the evaluation purpose. An important performance measure in big data processing is delay in processing time, thus the evaluation aims at measuring the access control processing time. The evaluation results show that the model is consistent, and is able to achieve less delay than the inter-enterprise RFID system without access control at a certain point.
Downloads
References
Anggorojati, P. N. Mahalle, N. R. Prasad, and R. Prasad. Secure access control and authority delegation based on capability and context awareness for federated iot. In Fabrice Theoleyre and Ai-Chun Pang, editors, Internet of Things and M2M Communications. River Publisher, 2013.
ASPIRE. http://wiki.aspire.ow2.org.
L. Atzori, A. Iera, and G. Morabito. The internet of things: A survey. Computer Networks, 54(15):2787-2805, 2010.
E. Bertino, P. A. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191-233, August 2001.
R. Bhatti, E. Bertino, and A. Ghafoor. A trust-based context-aware access control model for web-services. In Web Services, 2004. Proceedings. IEEE International Conference on, pages 184-191, july 2004.
R. Bhatti, A. Ghafoor, E. Bertino, and J. B. D. Joshi. X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur., 8(2): 187-227, May 2005.
EPCglobal. Epc information services (epcis) version 1.0.1 specification. September 2007.
EPCglobal. Gs1 epc tag data standard 1.6 – ratified standard. September 2011.
E. Grummt and M. Muller. Fine-grained access control for epc information services. In Proceedings of the 1st International Conference on The Internet of Things, IOT'08, pages 35-49, Berlin, Heidelberg, 2008. Springer-Verlag.
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor. Ageneralized temporal role-based access control model. Knowledge and Data Engineering, IEEE Transactions on, 17(1):4-23, jan. 2005.
T. Karygiannis, B. Eydt, G. Barber, Lynn Bunn, and T. Phillips. Guidelines for securing radio frequency identification (rfid) systems – recommendations of the national institute of standards and technology. NIST Special Publication, April 2007.
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E.Youman. Role-based access control models. Computer, 29(2):38-47, feb 1996.