DIOXIN: runtime security policy enforcement of fog applications

被引:0
作者
Russo, Enrico [1 ]
Verderame, Luca [1 ]
Armando, Alessandro [1 ]
Merlo, Alessio [1 ]
机构
[1] Univ Genoa, Dept Informat Bioengn Robot & Syst Engn DIBRIS, Genoa, Italy
基金
欧盟地平线“2020”;
关键词
fog computing; security assessment; Cisco IOx; runtime monitoring;
D O I
10.1504/IJGUC.2021.114821
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging distributed computational paradigm that moves the computation towards the edge (i.e., where data are produced). Although Fog operating systems provide basic security mechanisms, security controls over the behaviour of applications running on Fog nodes are limited. For this reason, applications are prone to a variety of attacks. We show how current Fog operating systems (with a specific focus on Cisco IOx) are actually unable to prevent these attacks. We propose a runtime policy enforcement mechanism that allows for the specification and enforcement of user-defined security policies on the communication channels adopted by interacting Fog applications. We prove that the proposed technique reduces the attack surface of Fog computing w.r.t. malicious applications. We demonstrate the effectiveness of the proposed technique by carrying out an experimental evaluation against a realistic Fog-based IoT scenario for smart irrigation.
引用
收藏
页码:126 / 138
页数:13
相关论文
共 39 条
  • [1] Fog Computing for the Internet of Things: Security and Privacy Issues
    Alrawais, Arwa
    Alhothaily, Abdulrahman
    Hu, Chunqiang
    Cheng, Xiuzhen
    [J]. IEEE INTERNET COMPUTING, 2017, 21 (02) : 34 - 42
  • [2] Andy S, 2017, 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), P571
  • [3] Containers and Cloud: From LXC to Docker to Kubernetes
    Bernstein, David
    [J]. IEEE CLOUD COMPUTING, 2014, 1 (03): : 81 - 84
  • [4] Bray T, 2017, JAVASCRIPT OBJECT NO
  • [5] MQTT-Auth: a Token-based Solution to Endow MQTT with Authentication and Authorization Capabilities
    Calabretta, Marco
    Pecori, Riccardo
    Vecchio, Massimo
    Veltri, Luca
    [J]. JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2018, 14 (04) : 320 - 331
  • [6] Ceri S., 1989, IEEE Transactions on Knowledge and Data Engineering, V1, P146, DOI 10.1109/69.43410
  • [7] Cisco Systems Inc, 2019, CISC IR829 IND INT S
  • [8] Cisco Systems Inc, 2019, CISC IOX DOC
  • [9] Cisco Systems Inc, 2019, NETW SOFTW IOS NX OS
  • [10] Access Control Enforcement within MQTT-based Internet of Things Ecosystems
    Colombo, Pietro
    Ferrari, Elena
    [J]. SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 223 - 234