The CAP Theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it to reason about access control systems designed for the Internet of Things (IoT). We validate our approach by experimentally investigating alternative architectural designs to enforce access control in a smart lock system using the cloud-edge IoT platform offered by Amazon Web Services. We discuss the trade-off between security and performance that may help IoT designers choose the most suitable architecture supporting their requirements.

Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem / Ahmad, T.; Morelli, U.; Ranise, S.. - (2020), pp. 213-220. (Intervento presentato al convegno 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020 tenutosi a esp nel 2020) [10.1145/3381991.3395617].

Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem

Ranise S.
2020-01-01

Abstract

The CAP Theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it to reason about access control systems designed for the Internet of Things (IoT). We validate our approach by experimentally investigating alternative architectural designs to enforce access control in a smart lock system using the cloud-edge IoT platform offered by Amazon Web Services. We discuss the trade-off between security and performance that may help IoT designers choose the most suitable architecture supporting their requirements.
2020
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
United States
Association for Computing Machinery
9781450375689
Ahmad, T.; Morelli, U.; Ranise, S.
Deploying access control enforcement for IoT in the cloud-edge continuum with the help of the CAP theorem / Ahmad, T.; Morelli, U.; Ranise, S.. - (2020), pp. 213-220. (Intervento presentato al convegno 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020 tenutosi a esp nel 2020) [10.1145/3381991.3395617].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/333092
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 3
  • ???jsp.display-item.citation.isi??? 2
social impact