Enhancing Usage Control for Performance: An Architecture for Systems of Systems
The distributiveness and heterogeneity of today’s systems of systems, such as the Internet of Things (IoT), on-line banking systems, and contemporary emergency information systems, require the integration of access and usage control mechanisms, for managing the right of access both to the corresponding services, and the plethora of information that is generated in a daily basis. Usage Control (UCON) is such a mechanism, allowing the fine-grained policy based management of system resources, based on dynamic monitoring and evaluation of object, subject, and environmental attributes. Yet, as we presented in an earlier article, a number of improvements can be introduced to the standard model regarding its resilience on active attacks, the simplification of the policy writing, but also in terms of run-time efficiency and scalability. In this article, we present an enhanced usage control architecture, that was developed for tackling the aforementioned issues. In order to achieve that, a dynamic role allocation system will be added to the existing architecture, alongside with a service grouping functionality which will be based on attribute aggregation. This is structured in accordance to a risk-based framework, which has been developed in order to aggregate the risk values that the individual attributes encapsulate into a unified risk value. These architectural enhancements are utilized in order to improve the resilience, scalability, and run-time efficiency of the existing model.
KeywordsAccess control Internet of Things Security architecture Systems of systems Usage control
This work has been partially funded by EU Funded project H2020 NeCS, GA #675320.
- 1.Colombo, M., Lazouski, A., Martinelli, F., Mori, P.: A proposal on enhancing XACML with continuous usage control features. In: Desprez, F., Getov, V., Priol, T., Yahyapour, R. (eds.) Grids, P2P and Services Computing, pp. 133–146. Springer, Boston (2010). https://doi.org/10.1007/978-1-4419-6794-7_11CrossRefGoogle Scholar
- 3.Gkioulos, V., Rizos, A., Michailidou, C., Martinelli, F., Mori, P.: Enhancing usage control for performance: a proposal for systems of systems. In: The International Conference on High Performance Computing and Simulation, HPCS 2018 (2018, To Appear)Google Scholar
- 4.Hu, V.C., et al.: Guide to attribute based access control (ABAC) definition and considerations. National Institute of Standards and Technology (NIST) Special Publication, 800(162) (2013)Google Scholar
- 5.La Marra, A., Martinelli, F., Mori, P., Rizos, A., Saracino, A.: Improving MQTT by inclusion of usage control. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 545–560. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_43CrossRefGoogle Scholar
- 7.Lazouski, A., Martinelli, F., Mori, P., Saracino, A.: Stateful data usage control for android mobile devices. Int. J. Inf. Secur. 16(4), 1–25 (2016)Google Scholar
- 8.Martinelli, F., Michailidou, C., Mori, P., Saracino, A.: Too long, did not enforce: a qualitative hierarchical risk-aware data usage control model for complex policies in distributed environments. In: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, CPSS@AsiaCCS 2018, 04–08 June 2018, Incheon, Republic of Korea, pp. 27–37 (2018)Google Scholar
- 9.Moore, B., Ellesson, E., Strassner, J., Westerinen, A.: RFC 3060: Policy Core Information Model - Version 1 Specification, February 2001Google Scholar
- 10.O’Connor, A.C., Loomis, R.J.: 2010 economic analysis of role-based access control. NIST, Gaithersburg, MD (2010)Google Scholar
- 15.Shirey, R.: RFC 4949: Internet Security Glossary - Version 2, August 2007Google Scholar