Fine-grained Trusted Control Methods for IoT Boundary Access
Main Article Content
Abstract
In order to solve the problems of coarse-grained access policies, weak auditability, lack of access process control, and excessive privileges exhibited by existing IoT access control technologies, the author proposes a fine-grained trusted control method for IoT boundary access. The author elaborated on the CcBAC model framework and formalized its definition; At the same time, specific descriptions of the functions in the model were provided, and the access control process of this model in general application scenarios was presented; After rigorous testing, it was found that as the number of requests increased, there was a slight uptick in the average time it took for the function to process them, but beyond a certain point, this time plateaued and even began to decrease gradually. Meanwhile, the system's throughput increased steadily with more requests until it reached a stable level, showing no significant drop even with additional clients. The proposed CcBAC access control model showcased remarkable performance in handling large-scale requests while ensuring fine-grained, autonomous authorization, security, and auditability. It effectively achieved consensus in distributed systems and maintained data consistency. In conclusion, this model empowers resource owners with full control over their resources' access, while also accounting for the detailed and traceable nature of access control.
Article Details
This work is licensed under a Creative Commons Attribution 4.0 International License.