Achieving adaptively secure data access control with privacy protection for lightweight IoT devices

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy Protection Data Access Control

For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...

متن کامل

Privacy Preserving Dynamic Access Control Model with Access Delegation for eHealth

eHealth is the concept of using the stored digital data to achieve clinical, educational, and administrative goals and meet the needs of patients, experts, and medical care providers. Expansion of the utilization of information technology and in particular, the Internet of Things (IoT) in eHealth, raises various challenges, where the most important one is security and access control. In this re...

متن کامل

Purpose based access control for privacy protection

Enforcement of the Sticky-policy requirement. Investigation of Fine-grained Access Control. <{G}, {T}> 94037 CA S. F. 9898 First Ave 1003 <{G}, > 46464 IL Chicago 433 State Road 1002 <{G}, {A, M}> 47907 IN W.Lafayette 232 Oval Drive 1001 addr_ip zip state city street c_id <{G}, {T}> [email protected] <{G}, > Jack <{G}, > 1003 <{G}, > [email protected] <{G}, > Paul <{G}, > 1002 <{P, S}, {M}> [email protected] ...

متن کامل

Sponge-Based Control-Flow Protection for IoT Devices

Embedded devices in the Internet of Things (IoT) face a wide variety of security challenges. For example, software attackers perform code injection and code-reuse attacks on their remote interfaces, and physical access to IoT devices allows to tamper with code in memory, steal confidential Intellectual Property (IP), or mount fault attacks to manipulate a CPU’s control flow. In this work, we pr...

متن کامل

A lightweight secure data transmission protocol for resource constrained devices

In this paper we present a lightweight but robust security protocol based on the forward and backward property of RC4 stream cipher. The proposed protocol offers data confidentiality, data authentication, data integrity, and data freshness with less operation and low overhead. Also, it allows data packets to be received in any arbitrary order and achieves semantic security. Furthermore, it elim...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science China Information Sciences

سال: 2021

ISSN: 1674-733X,1869-1919

DOI: 10.1007/s11432-020-2957-5