The CAP Theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it to reason about access control systems designed for the Internet of Things (IoT). We validate our approach by experimentally investigating alternative architectural designs to enforce access control in a smart lock system using the cloud-edge IoT platform offered by Amazon Web Services. We discuss the trade-off between security and performance that may help IoT designers choose the most suitable architecture supporting their requirements.
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem / Ahmad, T.; Morelli, U.; Ranise, S.. - (2020), pp. 213-220. (Intervento presentato al convegno 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020 tenutosi a esp nel 2020) [10.1145/3381991.3395617].
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem
Ranise S.
2020-01-01
Abstract
The CAP Theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it to reason about access control systems designed for the Internet of Things (IoT). We validate our approach by experimentally investigating alternative architectural designs to enforce access control in a smart lock system using the cloud-edge IoT platform offered by Amazon Web Services. We discuss the trade-off between security and performance that may help IoT designers choose the most suitable architecture supporting their requirements.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione