Home
Author Guide
Editor Guide
Reviewer Guide
Special Issues
Special Issue Introduction
Special Issues List
Topics
Published Issues
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2010
2009
2008
2007
2006
journal menu
Aims and Scope
Editorial Board
Indexing Service
Article Processing Charge
Open Access Policy
Publication Ethics
Digital Preservation Policy
Editorial Process
Subscription
Contact Us
General Information
ISSN:
1796-2021 (Online); 2374-4367 (Print)
Abbreviated Title:
J. Commun.
Frequency:
Monthly
DOI:
10.12720/jcm
Abstracting/Indexing:
Scopus
;
DBLP
;
CrossRef
,
EBSCO
,
Google Scholar
;
CNKI,
etc.
E-mail questions
or comments to
editor@jocm.us
Acceptance Rate:
27%
APC:
800 USD
Average Days to Accept:
88 days
3.4
2023
CiteScore
51st percentile
Powered by
Article Metrics in Dimensions
Editor-in-Chief
Prof. Maode Ma
College of Engineering, Qatar University, Doha, Qatar
I'm very happy and honored to take on the position of editor-in-chief of JCM, which is a high-quality journal with potential and I'll try my every effort to bring JCM to a next level...
[Read More]
What's New
2024-10-16
Vol. 19, No. 10 has been published online!
2024-08-20
Vol. 19, No. 8 has been published online!
2024-07-22
Vol. 19, No. 7 has been published online!
Home
>
Published Issues
>
2020
>
Volume 15, No. 1, January 2020
>
Implementing Policy Rules in Attributes Based Access Control with XACML within a Cloud-Enabled IoT Environment
Fatima Sifou
3
, Feda AlShahwan
1
, Mbarek Marwan
2
, Adra Hammoud
3
, and Ahmed Hammouch
3
1. Electronic Engineering Departments, Public Authority for Applied Education and Training, Kuwait
2. LTI Laboratory, ENSA, Chouaib Doukkali University, El Jadida, Morocco
3. LRIT Laboratory, Faculty of Sciences, Mohammed V University, Rabat, Morocco
Abstract
—The Internet of Things (IoT) extends internet connectivity to a wide range of smart devices. However, battery autonomy, computational capability and storage capacity are major technology challenges that hinder increased implementation and adoption. Although the integration of the Internet of Things (IoT) with Cloud Computing is considered as a highly promising solution in overcoming these bottlenecks, it raises security concerns, especially access control. Recently, a variety of access control models have been developed to help protect confidential information and restrict access to sensitive data. Because of its flexibility and scalability, the consensus is that the Attribute Based Access Control (ABAC) is the most appropriate model in a dynamic environment. In the context of IoT, the ABAC model has the ability to enforce data privacy and ensure a secure connection between IoT devices and cloud providers. One of the core components of the ABAC model is access policies, these are used to deny or allow user’ requests. To achieve that, an access policy language is required to implement policy rules in ABAC model. In this study, we propose a method based on EXtensible Access Control Markup Language (XACML) to prevent all unauthorized access to remote resources. This policy language is a particularly efficient and appropriate technique within a context of IoT due to its compatibility with heterogonous platforms.
Index Terms
—cloud computing, internet of things, cloud, ABAC model, XACML language, security policy tool
Cite: Fatima Sifou, Feda AlShahwan, Mbarek Marwan, Adra Hammoud, and Ahmed Hammouch, “Implementing Policy Rules in Attributes Based Access Control with XACML within a Cloud-Enabled IoT Environment,”Journal of Communications vol. 15, no. 1, pp. 107-114, January 2020. Doi: 10.12720/jcm.15.1.107-114
Copyright © 2020 by the authors. This is an open access article distributed under the Creative Commons Attribution License (
CC BY-NC-ND 4.0
), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.
13-CP010
PREVIOUS PAPER
Collaboration Study Case between the Industry and the University: Use of Lightgbm Algorithm for Data Analytics in the Execution History of Scheduled Routines (Job)
NEXT PAPER
Last page