Exploiting If This Then That and Usage Control obligations for Smart Home security and management

被引:2
|
作者
Giorgi, Giacomo [1 ]
La Marra, Antonio [2 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
Rizos, Athanasios [3 ]
Saracino, Andrea [1 ]
机构
[1] CNR, Ist Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[2] Secur Forge Srl, Pisa, Italy
[3] Univ Pisa, Dept Comp Sci, Pisa, Italy
关键词
access control; deep learning; IFTTT; parental control; Usage Control;
D O I
10.1002/cpe.6189
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.
引用
收藏
页数:22
相关论文
共 50 条
  • [21] Permission and Usage Control for Virtual Tourism using Blockchain-based Smart Contracts
    Siddiqui, Muhammad Shoaib
    Syed, Toqeer Ali
    Nadeem, Adnan
    Nawaz, Waqas
    Alkhodre, Ahmad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (11) : 231 - 240
  • [22] Permission and Usage Control for Virtual Tourism using Blockchain-based Smart Contracts
    Siddiqui M.S.
    Syed T.A.
    Nadeem A.
    Nawaz W.
    Alkhodre A.
    International Journal of Advanced Computer Science and Applications, 2022, 13 (11): : 231 - 240
  • [23] SAAC: Secure Access Control Management Framework for Multi-User Smart Home Systems
    Hashmi, Iram Fatima
    Iqbal, Zafar
    Munir, Eman
    Kryvinska, Natalia
    Ivanochko, Iryna
    Sampedro, Gabriel Avelino
    IEEE ACCESS, 2024, 12 : 133339 - 133355
  • [24] Security Checking of Trigger-Action-Programming Smart Home Integrations
    Bu, Lei
    Zhang, Qiuping
    Li, Suwan
    Dai, Jinglin
    Bai, Guangdong
    Chen, Kai
    Li, Xuandong
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 639 - 651
  • [25] Knowledge-based Cyber Physical Security at Smart Home: A Review
    Alsufyani, Azhar
    Rana, Omer
    Perera, Charith
    ACM COMPUTING SURVEYS, 2025, 57 (03)
  • [26] Resilience as a new Enforcement Model for IT Security based on Usage Control
    Wohlgemuth, Sven
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 31 - 38
  • [27] Security Analysis of Access Control Policies for Smart Homes
    Belfiore, Roberta Cimorelli
    Ferrara, Anna Lisa
    PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 99 - 106
  • [28] IMS Session Management Based on Usage Control
    Karopoulos, Giorgos
    Martinelli, Fabio
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 71 - 78
  • [29] Smart Home Beyond the Home: A Case for Community-Based Access Control
    Tabassum, Madiha
    Kropczynski, Jess
    Wisniewski, Pamela
    Lipford, Heather Richter
    PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [30] Controlling Security Rules Using Natural Dialogue: an Application to Smart Home Care
    Goffinet, Stanley
    Schmitz, Donatien
    Zavalyshyn, Igor
    Legay, Axel
    Riviere, Etienne
    UBICOMP/ISWC '21 ADJUNCT: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING AND PROCEEDINGS OF THE 2021 ACM INTERNATIONAL SYMPOSIUM ON WEARABLE COMPUTERS, 2021, : 194 - 197