Preprint Review Version 1 Preserved in Portico This version is not peer-reviewed

A Survey on Access Control in the Age of IoT

Version 1 : Received: 31 October 2018 / Approved: 6 November 2018 / Online: 6 November 2018 (04:18:40 CET)

How to cite: Qiu, J.; Du, C.; Su, S.; Zuo, Q.; Tian, Z. A Survey on Access Control in the Age of IoT. Preprints 2018, 2018110127. Qiu, J.; Du, C.; Su, S.; Zuo, Q.; Tian, Z. A Survey on Access Control in the Age of IoT. Preprints 2018, 2018110127.


With the development of IoT technology, various information resources, such as social resources and physical resources, are deeply integrated for different comprehensive applications. Social networking, car networking, medical services, video surveillance and other forms of IoT information Service model gradually change people's daily life. Facing the vast amounts of IoT information data, IoT search technology is used to quickly find accurate information to meet real-time search needs of users. However, IoT search requires to use a large number of user privacy Information, such as personal health information, location information, social relations information, to provide personalized services. User privacy information will meet security problems if an effective access control mechanism is missing during the IoT search process. Access control mechanism can effectively monitor the access activities of resources, and ensure authorized users to access information resources under legitimate conditions. This survey examines the growing literature on access control for IoT search. Problems and challenges of access control mechanism are analyzed to facilitate the adoption of access control solutions in real-life settings. This paper aims to provides theoretical, methodological and technical guidance for IoT search access control mechanism in large-scale dynamic heterogeneous environment. Based on the literature study, we also analyzed future development direction of access control in the age of IoT.


IoT search; access control; attribute-based access control; survey


Computer Science and Mathematics, Computer Science

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0

Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.