Skip to main content

Access Control Issues in Utilizing Fog Computing for Transport Infrastructure

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9578))

Abstract

The integration of the information and communication technologies of cloud computing, Software Defined Networking (SDN) and Internet of Things (IoT) into traditional transportation infrastructures enables the evolution of Intelligent Transportation Systems (ITS). Moreover, the specific requirements for real-time applications and service provision near to consumers introduce the utilization of fog computing as an extension of cloud. However, such a movement affects security aspects and poses new access control challenges. In this paper, we study the operational characteristics of a proposed ITS paradigm utilizing fog computing and identify corresponding access control issues. To address these issues in such a versatile and highly distributed environment, we present the key pointers of an attribute-based access control scheme suitable for fog computing. This paper aims to set a basis for further work in refining, verifying and validating the proposed solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abowd, G.D., Dey, A.K., Brown, P.J., Davies, N., Smith, M., Steggles, P.: Towards a better understanding of context and context-awareness. In: Gellersen, H.-W. (ed.) HUC 1999. LNCS, vol. 1707, pp. 304–307. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)

    Article  Google Scholar 

  3. Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54, 2787–2805 (2010)

    Article  MATH  Google Scholar 

  4. Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the Internet of Things. In: Proceedings of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM, USA (2012)

    Google Scholar 

  5. ETSI - Intelligent Transport. http://www.etsi.org/technologies-clusters/technologies/intelligent-transport. Accessed 20 May 2015

  6. Hakiri, A., Gokhale, A., Berthou, P., Schmidt, D.C., Gayraud, T.: Software-defined networking: challenges and research opportunities for Future Internet. Comput. Netw. 75(Part A), 453–471 (2014)

    Google Scholar 

  7. Hu, V.C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, K., Miller, R., Scarfone, K.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. National Institute of Standards and Technology (2014)

    Google Scholar 

  8. Kim, H., Feamster, N.: Improving network management with software defined networking. IEEE Commun. Mag. 51, 114–119 (2013)

    Article  Google Scholar 

  9. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. Int. J. Crit. Infrastruct. 9, 93–110 (2013)

    Article  Google Scholar 

  10. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Interdependencies between critical infrastructures: analyzing the risk of cascading effects. In: Bologna, S., Hämmerli, B., Gritzalis, D., Wolthusen, S. (eds.) CRITIS 2011. LNCS, vol. 6983, pp. 104–115. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  11. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. In: Proceedings of the 13th ACM Symposium on Operating Systems Principles, pp. 165–182. ACM, USA (1991)

    Google Scholar 

  12. Luan, T.H., Gao, L., Li, Z., Xiang, Y., Sun, L.: Fog Computing: Focusing on Mobile Users at the Edge. arXiv:1502.01815 [cs] (2015)

  13. Marx, G.T.: Murky conceptual waters: the public and the private. Ethics Inf. Technol. 3, 157–169 (2001)

    Article  Google Scholar 

  14. Mavridis, I., Georgiadis, C., Pangalos, G.: Access-rule certificates for secure distributed healthcare applications over the Internet. Health Inf. J. 8, 127–137 (2002)

    Article  Google Scholar 

  15. Mavridis, I., Pangalos, G.: Security issues in a mobile computing paradigm. Commun. Multimedia Secur. 3, 60–76 (1997)

    Google Scholar 

  16. Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of things: vision, applications and research challenges. Ad Hoc Netw. 10, 1497–1516 (2012)

    Article  Google Scholar 

  17. Sandhu, R.S., Samarati, P.: Access control: principle and practice. IEEE Commun. Mag. 32, 40–48 (1994)

    Article  Google Scholar 

  18. Theoharidou, M., Kandias, M., Gritzalis, D.: Securing transportation-critical infrastructures: trends and perspectives. In: Georgiadis, C.K., Jahankhani, H., Pimenidis, E., Bashroush, R., Al-Nemrat, A., (eds.) Global Security, Safety and Sustainability & e-Democracy. pp. 171–178. Springer (2012)

    Google Scholar 

  19. Truong, N.B., Lee, G.M., Ghamri-Doudane, Y.: Software defined networking-based vehicular Adhoc Network with Fog Computing. In: 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pp. 1202–1207 (2015)

    Google Scholar 

  20. Vázquez-Gómez, J.: Multidomain security. Comput. Secur. 13, 161–184 (1994)

    Article  Google Scholar 

  21. Weiser, M.: The computer for the 21st century. Sci. Am. 265, 94–104 (1991)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dimitris Gritzalis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Salonikias, S., Mavridis, I., Gritzalis, D. (2016). Access Control Issues in Utilizing Fog Computing for Transport Infrastructure. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science(), vol 9578. Springer, Cham. https://doi.org/10.1007/978-3-319-33331-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33331-1_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33330-4

  • Online ISBN: 978-3-319-33331-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics