Exploiting If This Then That and Usage Control obligations for Smart Home security and management

被引:2
|
作者
Giorgi, Giacomo [1 ]
La Marra, Antonio [2 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
Rizos, Athanasios [3 ]
Saracino, Andrea [1 ]
机构
[1] CNR, Ist Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[2] Secur Forge Srl, Pisa, Italy
[3] Univ Pisa, Dept Comp Sci, Pisa, Italy
关键词
access control; deep learning; IFTTT; parental control; Usage Control;
D O I
10.1002/cpe.6189
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] On Usage Control in Relational Database Management Systems Obligations and Their Enforcement in Joining Datasets
    Bargh, Mortaza S.
    Vink, Marco
    Choenni, Sunil
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 190 - 201
  • [2] On Using Obligations for Usage Control in Joining of Datasets
    Bargh, Mortaza S.
    Vink, Marco
    Choenni, Sunil
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 173 - 196
  • [3] A framework to enforce access control, usage control and obligations
    Sans, Thierry
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2007, 62 (11-12): : 1329 - 1352
  • [4] Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts
    Qashlan, Amjad
    Nanda, Priyadarsi
    He, Xiangian
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 952 - 959
  • [5] Improving Smart Home Security: Integrating Logical Sensing Into Smart Home
    Jose, Arun Cyril
    Malekian, Reza
    IEEE SENSORS JOURNAL, 2017, 17 (13) : 4269 - 4286
  • [6] Improving smart home security; integrating behaviour prediction into smart home
    Jose, Arun Cyril
    Malekian, Reza
    Letswamotse, Babedi B.
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 28 (04) : 253 - 269
  • [7] An enhanced security framework for home appliances in smart home
    Kang, Won Min
    Moon, Seo Yeon
    Park, Jong Hyuk
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2017, 7
  • [8] CAISMS: A context-aware integrated security management system for smart home
    Cho, Joon-Sic
    Park, Seon-Ho
    Han, Young-Ju
    Chung, Tai-Myoung
    9TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: TOWARD NETWORK INNOVATION BEYOND EVOLUTION, VOLS 1-3, 2007, : 531 - +
  • [9] Deep learning for smart home security systems: CNN-based home security
    Balasubramanian, M.
    Kakade, Kiran Shrimant
    Mane, Sulakshana B.
    Anand, Sujatha Jamuna
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2024, 16 (04) : 451 - 463
  • [10] Obligation Management Framework for Usage Control
    Joumaa, Hussein
    Hariri, Ali
    Petrovska, Ana
    Osliak, Oleksii
    Dimitrakos, Theo
    Crispo, Bruno
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 149 - 157