Graph-Based Data-Collection Policies for the Internet of Things

被引:8
作者
Fernandez, Maribel [1 ]
Jaimunk, Jenjira [1 ]
Thuraisingham, Bhavani [2 ]
机构
[1] Kings Coll London, Dept Informat, London, England
[2] Univ Texas Dallas, Richardson, TX 75083 USA
来源
4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018) | 2018年
关键词
Internet of Things; Privacy Policy; Policy Visualisation; Policy Analysis; Category-Based Data Collection; ACCESS-CONTROL;
D O I
10.1145/3295453.3295455
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart industrial control systems (e.g., smart grid, oil and gas systems, transportation systems) are connected to the internet, and have the capability to collect and transmit data; as such, they are part of the IoT. The data collected can be used to improve services; however, there are serious privacy risks. This concern is usually addressed by means of privacy policies, but it is often difficult to understand the scope and consequences of such policies. Better tools to visualise and analyse data collection policies are needed. Graph-based modelling tools have been used to analyse complex systems in other domains. In this paper, we apply this technique to IoT data-collection policy analysis and visualisation. We describe graphical representations of category-based data collection policies and show that a graph-based policy language is a powerful tool not only to specify and visualise the policy, but also to analyse policy properties. We illustrate the approach with a simple example in the context of a chemical plant with a truck monitoring system. We also consider policy administration: we propose a classification of queries to help administrators analyse policies, and we show how the queries can be answered using our technique.
引用
收藏
页码:9 / 16
页数:8
相关论文
共 19 条
[1]   A graph-based framework for the analysis of access control policies [J].
Alves, Sandra ;
Fernandez, Maribel .
THEORETICAL COMPUTER SCIENCE, 2017, 685 :3-22
[2]  
Barker SK, 2009, ST ANDR STUD REFORM, P187, DOI 10.1145/1542207.1542238
[3]   Analysis of privacy and security policies [J].
Bertino, E. ;
Brodie, C. ;
Calo, S. B. ;
Cranor, L. F. ;
Karat, C. ;
Karat, J. ;
Li, N. ;
Lin, D. ;
Lobo, J. ;
Ni, Q. ;
Rao, P. R. ;
Wang, X. .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
[4]   A metamodel of access control for distributed environments: Applications and properties [J].
Bertolissi, Clara ;
Fernandez, Maribel .
INFORMATION AND COMPUTATION, 2014, 238 :187-207
[5]   Integration of Cloud computing and Internet of Things: A survey [J].
Botta, Alessio ;
de Donato, Walter ;
Persico, Valerio ;
Pescape, Antonio .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :684-700
[6]   A Framework for Secure Data Collection and Management for Internet of Things<bold> </bold> [J].
Fernandez, Maribel ;
Kantarcioglu, Murat ;
Thuraisingham, Bhavani .
2ND ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP, ICSS 2016, 2016, :30-37
[7]  
Ferraiolo DF, 2007, ROLE BASED ACCESS CO
[8]  
Gollmann Dieter, 2011, Computer Security
[9]  
Haddadi H, 2015, ARXIVCSCY150104737
[10]   MIRO - VISUAL SPECIFICATION OF SECURITY [J].
HEYDON, A ;
MAIMONE, MW ;
TYGAR, JD ;
WING, JM ;
ZAREMSKI, AM .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1990, 16 (10) :1185-1197