Summary
International Conference on Emerging Technologies for Communications
2020
Session Number:E1
Session:
Number:E1-1
Performance Evaluation of Table-based Access Control List Applied to IoT Data Distribution Method using Fog Computing
Masaki YOSHII, Ryohei BANNO, Osamu MIZUNO,
pp.-
Publication Date:2020/12/2
Online ISSN:2188-5079
DOI:10.34385/proc.63.E1-1
PDF download
Summary:
New services can be created by using fog nodes for the distribution of Internet of Things (IoT) data. To distribute IoT data, we assume a publish/subscribe messaging model is applied to fog computing. A player who wants to own data will be assigned a unique identifier called TagID by a service provider. A TagID matches multiple topics and resolves the naming rule for data acquisition. However, a user may transmit unintended data when placing fog nodes and distributing IoT data through several players. To address this issue, we propose a Table-based Access Control List to manage user fog nodes. The Access Control List decides if users will share data with other players or not using a “Permit/Prohibit” check. To confirm the performance of the proposed method, we conducted a simulation experiment. Simulation results show that the proposed method decreases both the total amount of data received for each TagID and the number of packets cached on user fog nodes.