skip to main content
10.1145/2797433.2797451acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsawConference Proceedingsconference-collections
short-paper

Security and Trust in Data Sharing Smart Cyber-Physical Systems

Authors Info & Claims
Published:07 September 2015Publication History

ABSTRACT

Security and trust plays an important role in Smart Cyber-Physical Systems (sCPS), which are formed as open and large collections of autonomous context- and self-aware adaptive components that dynamically group themselves and cooperate (all in a rather decentralized manner). Such a high level of dynamicity, open-endedness and context-dependence however makes existing approaches to security and trust in distributed systems not fully suitable (typically being too static and not able to cope with decentralization). In this paper we introduce the concepts of context-dependent security and trust defined at the architecture level of sCPS. Contrary to traditional approaches, our solution allows components to adapt their security clearance according to their context (i.e. their state and the surrounding environment), while preserving high level security policies. We further define the interplay of security and trust in sCPS and show their interrelation as an important ingredient in achieving security in systems of adaptive autonomous components.

References

  1. Ferraiolo, D. F. and Kuhn, D. R. Role-Based Access Controls. In 15th National Computer Security Conference (NCSC, 1992), pp. 554--563.Google ScholarGoogle Scholar
  2. Clark, D. D. and Wilson, D. R. A Comparison of Commercial and Military Computer Security Policies. IEEE, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  3. Bures, T., Gerostathopoulos, I., Hnetynka, P., Keznikl, J., Kit, M., Plasil, F. DEECo -- an Ensemble-Based Component System. In Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering (CBSE '13). ACM, New York, NY, USA, 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V. dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. Proceedings of ICDCS 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ninghui, Li and Mitchell, J. C. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition, 2003, pp.201--212 vol.1, 22--24 April 2003.Google ScholarGoogle ScholarCross RefCross Ref
  6. Venkatasubramanian, K. K. Security Solutions for Cyber-Physical Systems. Arizona State University, 2009.Google ScholarGoogle Scholar
  7. Yao, W. Trust management for widely distributed systems. University of Cambridge, 2008. ISSN 1476-2986.Google ScholarGoogle Scholar
  8. Sandhu, S. R., Coyne, E. J., Feinstein, H. L., Youman, C. E. Role-Based Access Control Models. In IEEE Computer, vol. 29, nr. 2, February 1996, pp. 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Shelby, Z., Hartke, K., Bormann, C. Constrained Application Protocol (CoAP). IETF, 2013, ISSN: 2070-1721.Google ScholarGoogle Scholar
  10. Hernández-Ramos, J. L., et al. Distributed Capability-based Access Control for the Internet of Things. Journal of Internet Services and Information Security (JISIS), volume: 3, number: 3/4, pp. 1--16.Google ScholarGoogle Scholar
  11. Blaze, M., Feigenbaum J., Ioannidis, J., Keromytis A. D. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming, pp. 185--210, Springer-Verlag, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yuan, E., and Tong, J. Attributed Based Access Control (ABAC) for Web Services. In Proceedings of ICWS 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Steiner, J. G., Neuman, C. and Schiller, J. I. Kerberos: An authentication service for open network systems. USENIX Association, 1988.Google ScholarGoogle Scholar
  14. De Nicola, R., Loreti, M., Pugliese, R., Tiezzi, F. A Formal Approach to Autonomic Systems Programming: The SCEL Language. ACM 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Wuille, P. BIP32: Hierarchical Deterministic Wallets. February 2012, https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki.Google ScholarGoogle Scholar
  16. Castiglione, A., Santis, A. D., Masucci, B. Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes, IACR Cryptology ePrint Archive, Report 2014/752, 2014Google ScholarGoogle Scholar

Index Terms

  1. Security and Trust in Data Sharing Smart Cyber-Physical Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ECSAW '15: Proceedings of the 2015 European Conference on Software Architecture Workshops
        September 2015
        364 pages
        ISBN:9781450333931
        DOI:10.1145/2797433

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 September 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • short-paper
        • Research
        • Refereed limited

        Acceptance Rates

        ECSAW '15 Paper Acceptance Rate51of77submissions,66%Overall Acceptance Rate80of120submissions,67%
      • Article Metrics

        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader