Exploiting If This Then That and Usage Control obligations for Smart Home security and management

被引:2
|
作者
Giorgi, Giacomo [1 ]
La Marra, Antonio [2 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
Rizos, Athanasios [3 ]
Saracino, Andrea [1 ]
机构
[1] CNR, Ist Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[2] Secur Forge Srl, Pisa, Italy
[3] Univ Pisa, Dept Comp Sci, Pisa, Italy
关键词
access control; deep learning; IFTTT; parental control; Usage Control;
D O I
10.1002/cpe.6189
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] TrustControl: Trusted Private Data Usage Control Based on Security Enhanced TrustZone
    Lei, Hong
    Li, Jun
    Li, Suozai
    Huang, Ming
    Cheng, Jieren
    Bai, Yirui
    Luo, Xinman
    Liu, Chao
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 73 (03): : 5687 - 5702
  • [42] Implementation of Home Network Security System based on Remote Management Server
    Jang, Young Gun
    Choi, Hoon Il
    Park, Chan Kon
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (02): : 267 - 274
  • [43] SDN-based security management of multiple WoT Smart Spaces
    Saad El Jaouhari
    Ahmed Bouabdallah
    Andreea Ancuta Corici
    Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 9081 - 9096
  • [44] Bringing privacy, security and performance to the Internet of Things using IOTA and usage control
    Denis, Nathanael
    Chabridon, Sophie
    Laurent, Maryline
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (7-8) : 585 - 601
  • [45] Design of Efficient Based Artificial Intelligence Approaches for Sustainable of Cyber Security in Smart Industrial Control System
    Alzahrani, Ali
    Aldhyani, Theyazn H. H.
    SUSTAINABILITY, 2023, 15 (10)
  • [46] Security analysis of a threshold access control scheme based on smart cards
    Horng, G
    Liu, CL
    Hwang, YT
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08) : 2177 - 2179
  • [47] User-Centric Access Control for Efficient Security in Smart Cities
    Beltran, V.
    Martinez, J. A.
    Skarmeta, A. F.
    2017 GLOBAL INTERNET OF THINGS SUMMIT (GIOTS 2017), 2017, : 454 - 459
  • [48] Blockchain-Based Access Control for IoT in Smart Home Systems
    Mbarek, Bacem
    Ge, Mouzhi
    Pitner, Tomas
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT II, 2020, 12392 : 17 - 32
  • [49] Multiadvisor Reinforcement Learning for Multiagent Multiobjective Smart Home Energy Control
    Tittaferrante A.
    Yassine A.
    IEEE Transactions on Artificial Intelligence, 2022, 3 (04): : 581 - 594
  • [50] A Framework for Evaluating the Security and Privacy of Smart-Home Devices, and its Application to Common Platforms
    Mangar, Ravindra
    Pierson, Timothy J.
    Kotz, David
    IEEE PERVASIVE COMPUTING, 2024, 23 (03) : 7 - 19