Summary

International Conference on Emerging Technologies for Communications

2020

Session Number:E1

Session:

Number:E1-1

Performance Evaluation of Table-based Access Control List Applied to IoT Data Distribution Method using Fog Computing

Masaki YOSHII,  Ryohei BANNO,  Osamu MIZUNO,  

pp.-

Publication Date:2020/12/2

Online ISSN:2188-5079

DOI:10.34385/proc.63.E1-1

PDF download

PayPerView

Summary:
New services can be created by using fog nodes for the distribution of Internet of Things (IoT) data. To distribute IoT data, we assume a publish/subscribe messaging model is applied to fog computing. A player who wants to own data will be assigned a unique identifier called TagID by a service provider. A TagID matches multiple topics and resolves the naming rule for data acquisition. However, a user may transmit unintended data when placing fog nodes and distributing IoT data through several players. To address this issue, we propose a Table-based Access Control List to manage user fog nodes. The Access Control List decides if users will share data with other players or not using a “Permit/Prohibit” check. To confirm the performance of the proposed method, we conducted a simulation experiment. Simulation results show that the proposed method decreases both the total amount of data received for each TagID and the number of packets cached on user fog nodes.