Attribute – Semantic Based Access Control Policy Model for IoT
Arun Murugesan1, Balamurali Saminathan2, Maheswari Kanapathy3
1Mr. Arun Murugesan, Deaprtment of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnan Koil (Tamil Nadu), India.
2Dr. Balamurali Saminathan, Deaprtment of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnan Koil (Tamil Nadu), India.
3Dr. Maheswari Kanapathy, Deaprtment of Computer Applications, Kalasalingam Academy of Research and Education College, Krishnan Koil (Tamil Nadu), India.
Manuscript received on 24 November 2019 | Revised Manuscript received on 18 December 2019 | Manuscript Published on 30 December 2019 | PP: 560-564 | Volume-9 Issue-1S4 December 2019 | Retrieval Number: A11241291S419/19©BEIESP | DOI: 10.35940/ijeat.A1124.1291S419
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Internet of Things (IoT) devices under cloud assistance is deployed in different distributed environment. It collects sensed data and outsources the data to remote server and user for sharing. As IoT is used in important fields like healthcare, business and research, the sensed data are sensitive information which needs to be protected. Encryption is usual technique to protect data from adversaries. A fine grained access control is essential for heterogeneous device involved social network. The existing access control policies were defined for predefined identity and role which needs to be changed in dynamic situations. Moreover, all the necessary policies cannot be defined in advance and new policies were demanded for new situational context. To solve these issues, this work design a model which calculate final trust value based on semantic information dynamically referring to ontology. a access control policy is also designed on semantic role of the device. The semantic technology is used for high level reasoning of the context situation.
Keywords: Fog Computing, Access Control, IoT, Semantics, Ontology, Attribute.
Scope of the Article: IoT