A Framework for Representing Internet of things security and privacy policies and detecting potential problems

被引:1
作者
Opara, Anthony [1 ]
Johng, Haan [1 ]
Hill, Tom [2 ]
Chung, Lawrence [1 ]
机构
[1] Univ Texas Dallas, Dept Comp Sci, Richardson, TX 75083 USA
[2] Fellows Consulting Grp LLC, Dallas, TX USA
来源
37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING | 2022年
关键词
Internet of Things; Security and Privacy Policy;
D O I
10.1145/3477314.3508385
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The Internet of Things (IoT), together with cloud computing, is increasingly being utilized to deliver innovative use cases in diverse application domains, such as in its use in the vaccine cold-chain supply and healthcare delivery. Ensuring security and privacy in the IoT is complicated and requires a policy-based approach that captures and validates policies in the early stages of IoT application development. However, IoT security and privacy are often implemented as an afterthought or add-on, and policies are often stated in an informal and ad-hoc manner, leading to policy conflicts, incompleteness, ambiguity, and inconsistencies. This paper proposes a framework for representing IoT security and privacy policies and detecting potential problems in the policies. Our framework adopts an object-oriented and goal-oriented approach and offers (1) A domain-specific ontology for modeling IoT security and privacy policies, (2) a notation for representing cloud security and privacy policies, (3) a set of guidelines and rules for detecting IoT policy errors, and (4) a tool for visually modeling and discovering problems with policies. An application of our framework on a collection of policies shows that it indeed helps to discover policy errors, which otherwise would go undetected or, in many cases, would be detected at runtime, leading to a possible undesirable outcome.
引用
收藏
页码:198 / 201
页数:4
相关论文
共 13 条
  • [1] ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things
    Bhatt, Smriti
    Sandhu, Ravi
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 203 - 212
  • [2] Craven R., 2009, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, P239
  • [3] On modelling access policies: Relating roles to their organisational context
    Crook, R
    Ince, D
    Nuseibeh, B
    [J]. 13TH IEEE INTERNATIONAL CONFERENCE ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2005, : 157 - 166
  • [4] Dahlqvist F, 2019, GROWING OPPORTUNITIE
  • [5] Damianou N, 2001, LECT NOTES COMPUT SC, V1995, P18
  • [6] Damianou Nicodemos, 2002, SURVEY POLICY SPECIF, V3, P142
  • [7] He LJ, 2013, 2013 22ND WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC 2013), P321, DOI 10.1109/WOCC.2013.6676386
  • [8] Conflicts in policy-based distributed systems management
    Lupu, EC
    Sloman, M
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (06) : 852 - 869
  • [9] Using Blockchain for Enhancing Collaboration among Independent Enterprises: A Knowledge-based Approach
    Marathe, Niranjan
    Johng, Haan
    Hill, Tom
    Chung, Lawrence
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON SMART DATA SERVICES (SMDS 2021), 2021, : 55 - 60
  • [10] A security requirements modelling language for cloud computing environments
    Mouratidis, Haralambos
    Shei, Shaun
    Delaney, Aidan
    [J]. SOFTWARE AND SYSTEMS MODELING, 2020, 19 (02) : 271 - 295