Knowledge sharing in virtual enterprises via an ontology-based access control approach

2008 ◽  
Vol 59 (5) ◽  
pp. 502-519 ◽  
Author(s):  
Tsung-Yi Chen
2021 ◽  
Vol 7 ◽  
pp. e455
Author(s):  
Mohammed Amine Bouras ◽  
Boming Xia ◽  
Adnan Omer Abuassba ◽  
Huansheng Ning ◽  
Qinghua Lu

Access control is a critical aspect for improving the privacy and security of IoT systems. A consortium is a public or private association or a group of two or more institutes, businesses, and companies that collaborate to achieve common goals or form a resource pool to enable the sharing economy aspect. However, most access control methods are based on centralized solutions, which may lead to problems like data leakage and single-point failure. Blockchain technology has its intrinsic feature of distribution, which can be used to tackle the centralized problem of traditional access control schemes. Nevertheless, blockchain itself comes with certain limitations like the lack of scalability and poor performance. To bridge the gap of these problems, here we present a decentralized capability-based access control architecture designed for IoT consortium networks named IoT-CCAC. A blockchain-based database is utilized in our solution for better performance since it exhibits favorable features of both blockchain and conventional databases. The performance of IoT-CCAC is evaluated to demonstrate the superiority of our proposed architecture. IoT-CCAC is a secure, salable, effective solution that meets the enterprise and business’s needs and adaptable for different IoT interoperability scenarios.


Author(s):  
Kayalvili S ◽  
Sowmitha V

Cloud computing enables users to accumulate their sensitive data into cloud service providers to achieve scalable services on-demand. Outstanding security requirements arising from this means of data storage and management include data security and privacy. Attribute-based Encryption (ABE) is an efficient encryption system with fine-grained access control for encrypting out-sourced data in cloud computing. Since data outsourcing systems require flexible access control approach Problems arises when sharing confidential corporate data in cloud computing. User-Identity needs to be managed globally and access policies can be defined by several authorities. Data is dual encrypted for more security and to maintain De-Centralization in Multi-Authority environment.


IET Software ◽  
2007 ◽  
Vol 1 (5) ◽  
pp. 206-216
Author(s):  
R. Su ◽  
M.R.V. Chaudron ◽  
J.J. Lukkien

IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 1882-1893 ◽  
Author(s):  
Li Lin ◽  
Ting-Ting Liu ◽  
Shuang Li ◽  
Chathura M. Sarathchandra Magurawalage ◽  
Shan-Shan Tu

2008 ◽  
Vol 15 (5) ◽  
pp. 20-29 ◽  
Author(s):  
P. Pawelczak ◽  
S. Pollin ◽  
Hoi-Sheung So ◽  
A. Bahai ◽  
R. Prasad ◽  
...  

Author(s):  
Poonam N. Railkar ◽  
◽  
Parikshit Mahalle ◽  
Dr. Gitanjali Rahul Shinde ◽  
◽  
...  

IoT is a network of interconnected heterogeneous devices which sense, accumulate the data and forward the same to the cloud platform for analytical purposes. There are various IoT verticals in which huge research is going on. IoT security is the most challenging research area in which researchers are investing a huge number of efforts. The challenges in IoT security include access control, trust management, authentication, authorization, privacy, and secured device to device communication. To overcome these, this paper gives an overview of proposed trust based distributed access control approach in IoT. Some of the challenges and threats can be controlled by blockchain technology. Basically, blockchain is an open and distributed ledger of records that can be verified efficiently and stored permanently. This paper checks the feasibility study of the applicability of blockchain in the IoT ecosystem to apply access control mechanism and privacy-preserving policies. This paper discusses how access control and privacy can be addressed by blockchain without compromising security. This paper consists of rigorous gap analysis which is done on the top of comprehensive literature survey. The paper also addresses the challenges and issues which can be faced while applying access control mechanism using blockchain in the context of IoT.


2011 ◽  
pp. 2699-2711 ◽  
Author(s):  
Maria Manuela Cunha ◽  
Goran D. Putnik

Knowledge is, undoubtedly, an indispensable asset for organizations to compete effectively (Alavi & Leidner, 2001; Murray, 2002). New organizational models, such as the virtual enterprise (VE) model, characterized as dynamically reconfigurable information-based global networked structures, are emerging. New technological environments and solutions are being developed to support them, and the importance of knowledge and the capability of managing it by creating the organizational conditions that facilitate the generation, sharing, and application of knowledge are more and more critical. In a global organization, as defended by Kluge, Stein, and Licht (2001), face-to-face relationships are not possible, giving rise to difficulties in accepting knowledge from outside. This applies more deeply in virtual enterprises (or in virtual organizations) in the interactions among the independent partners who tend more and more to fear the leakage of private knowledge. This situation promotes competition and rivalry and, as suggested by Prahalad and Hamel (1990), impedes collaboration and knowledge sharing, precisely two of the main underlying issues of this organizational model. A supporting environment, such as the market of resources proposed by the authors, is the way to assure effective knowledge management between the members of a virtual enterprise and business strategic alignment enabling the performance improvement of the VE. In an environment to support VE integration, knowledge management is simultaneously a tool and an object. As a tool, knowledge management can be used by the market of resources to reduce transaction costs in VE integration and VE reconfiguration; as an object, knowledge must be protected and knowledge leakage prevented to assure trust and protection of VE participants. The broker (an integrating element of the market of resources) is, besides other attributions, responsible for advising the VE owner in identifying and communicating the role of knowledge management within the VE business plan and for ensuring the permanent alignment between business strategy and knowledge strategy within the network of independent enterprises that constitute the VE. The broker must ensure that the global knowledge sharing is not threatened by deficient knowledge management procedures and, simultaneously, that any instance of the VE (as a reconfigurable network) at a given time, is able to respond to the market requirements with its maximum performance, that is, is business aligned. In this article, we introduce the VE disabling factors and the functionalities for VE integration, briefly present the market of resources as an environment to support VE integration, assuring business alignment and knowledge management, identify the main strengths and problems associated with the implementation of knowledge management functions, and, finally, discuss the main opportunities associated to the implementation and exploitation of the market of resources.


Sign in / Sign up

Export Citation Format

Share Document