Highly distributed smart environments, such as Smart Cities, require scalable architectures to support a large number of stakeholders that share Internet of Things (IoT) resources and services. We focus on authorization solutions that regulate access of users to smart objects and consider scenarios where a large number of smart objects owners want to share the resources of their devices in a secure way. A popular solution is to delegate third parties, such as public Cloud services, to mediate authorization procedures among users and smart objects. This approach has the disadvantage of assuming third parties as trusted proxies that guarantee correctness of all authorization procedures. In this paper, we propose a system that allows to audit authorizations managed by third parties, to detect and expose their misbehaviors to users, smart objects owners and, possibly, to the public. The proposed system is inspired by the transparency projects used to monitor Web Certification Authorities, but improves over existing proposals through a twofold contribution. First, it is specifically designed for IoT devices, provided with little resources and distributed in constrained environments. Second, it complies to current standard authorization protocols and available open-source software, making it ready to be deployed.

Authorization transparency for accountable access to IoT services / Ferretti, L.; Longo, F.; Colajanni, M.; Merlino, G.; Tapas, N.. - (2019), pp. 91-99. (Intervento presentato al convegno 4th IEEE International Congress on Internet of Things, ICIOT 2019 tenutosi a ita nel 2019) [10.1109/ICIOT.2019.00027].

Authorization transparency for accountable access to IoT services

Ferretti L.
;
Colajanni M.;
2019

Abstract

Highly distributed smart environments, such as Smart Cities, require scalable architectures to support a large number of stakeholders that share Internet of Things (IoT) resources and services. We focus on authorization solutions that regulate access of users to smart objects and consider scenarios where a large number of smart objects owners want to share the resources of their devices in a secure way. A popular solution is to delegate third parties, such as public Cloud services, to mediate authorization procedures among users and smart objects. This approach has the disadvantage of assuming third parties as trusted proxies that guarantee correctness of all authorization procedures. In this paper, we propose a system that allows to audit authorizations managed by third parties, to detect and expose their misbehaviors to users, smart objects owners and, possibly, to the public. The proposed system is inspired by the transparency projects used to monitor Web Certification Authorities, but improves over existing proposals through a twofold contribution. First, it is specifically designed for IoT devices, provided with little resources and distributed in constrained environments. Second, it complies to current standard authorization protocols and available open-source software, making it ready to be deployed.
2019
4th IEEE International Congress on Internet of Things, ICIOT 2019
ita
2019
91
99
Ferretti, L.; Longo, F.; Colajanni, M.; Merlino, G.; Tapas, N.
Authorization transparency for accountable access to IoT services / Ferretti, L.; Longo, F.; Colajanni, M.; Merlino, G.; Tapas, N.. - (2019), pp. 91-99. (Intervento presentato al convegno 4th IEEE International Congress on Internet of Things, ICIOT 2019 tenutosi a ita nel 2019) [10.1109/ICIOT.2019.00027].
File in questo prodotto:
File Dimensione Formato  
ferretti_iciot2019(1).pdf

Accesso riservato

Descrizione: Articolo
Tipologia: Versione dell'autore revisionata e accettata per la pubblicazione
Dimensione 479.49 kB
Formato Adobe PDF
479.49 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

Licenza Creative Commons
I metadati presenti in IRIS UNIMORE sono rilasciati con licenza Creative Commons CC0 1.0 Universal, mentre i file delle pubblicazioni sono rilasciati con licenza Attribuzione 4.0 Internazionale (CC BY 4.0), salvo diversa indicazione.
In caso di violazione di copyright, contattare Supporto Iris

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11380/1183076
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? 4
social impact