World-Leading Research with Real-World Impact!

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Attribute-Based Access Control Models and Beyond
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
Cloud Networked Robotics Speaker: Kai-Wei Ping Advisor: Prof Dr. Ho-Ting Wu 2013/04/08 1.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
Lecture 7: Internet of Things
A brief introduction to IoT gateway
Internet of Things 1.
Institute for Cyber Security
Institute for Cyber Security
Presented by: Saurav Kumar Bengani
Access Control Model for the Hadoop Ecosystem
Institute for Cyber Security
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security
Institute for Cyber Security
Internet of Things: State of the Art
Institute for Cyber Security
Grid Computing.
Algorithms for Big Data Delivery over the Internet of Things
Introduction  An IoT is a network that connects uniquely identifiable things to the Internet.  The first word is “Internet” and the second word is “Things”.
Cloud Computing.
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
UTSA's New Center Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director of ICS and C-SPECC Professor.
Mobile Commerce and the Internet of Things
INTER-Iot kick-off meeting
Internet of Things (IoT)
Standards for the Internet of Things
World-Leading Research with Real-World Impact!
Institute for Cyber Security: Research Vision
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Computer Science Department
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Lecture 4: Internet of Things
Institute for Cyber Security: Research Vision
Intersection of Data, Policy and Privacy
UTSA Cyber Security Ecosystem
Securing Home IoT Environments with Attribute-Based Access Control
Smart Learning concepts to enhance SMART Universities in Africa
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
World-Leading Research with Real-World Impact!
Institute for Cyber Security Overview
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Access Controls in Smart Cars: Needs and Solutions
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Ph.D. Dissertation Defense
Access Control Evolution and Prospects
Presentation transcript:

World-Leading Research with Real-World Impact! An Access Control Framework for Cloud-Enabled Wearable Internet of Things Smriti Bhatt, Farhan Patwa and Ravi Sandhu Institute for Cyber Security (ICS) Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Department of Computer Science University of Texas at San Antonio 3rd IEEE International Conference on Collaboration and Internet Computing San Jose, California, USA, October 15 - 17, 2017 ravi.sandhu@utsa.edu www.ics.utsa.edu www.cspecc.utsa.edu www.profsandhu.com World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Outline Introduction Background Contributions Classification of IoT Devices Wearable Internet of Things Domains and Devices Access Control (AC) Framework Use Case AC Framework Objectives & Research Problems Conclusion and Future Work © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Introduction Internet of Things (IoT) Interconnection of Internet-enabled smart devices/things Enabling technologies – Internet, Cloud and Mobile computing, Big Data and Analytics, M2M technologies and communication protocols, … Diverse and pervasive concept Numerous IoT applications and services  various subfields of IoT Wearable Internet of Things (WIoT) Revolutionizing industries like healthcare, and sports and fitness Enabling technologies – Internet, Smart phones, WSNs, and WBANs Generally, IoT devices are resource constraint by nature Limited storage, power, and computation © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Introduction (Contd.) Cloud-Enabled Internet of Things (CEIoT) Integration of Cloud and IoT Major cloud services providers (e.g., AWS, Azure) utilize their cloud infrastructure to provide IoT solutions Virtually unlimited resources with analysis and visualization capabilities Security and privacy are primary concerns for IoT Here, we present an Access Control (AC) framework for CEIoT in context of WIoT (i.e. CEWIoT) © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Background Fig 1: An Access Control Oriented (ACO) Architecture for the CEIoT [1] © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Contributions Present a general classification of IoT devices to realize different sub-fields of IoT Enhance the ACO architecture for CEWIoT by adding an Object Abstraction Layer Develop an Access Control (AC) framework for CEWIoT based on our enhanced ACO architecture Develop a use case to capture different interactions between ACO layers and propose its possible enforcement in a commercial CEIoT platform, viz., AWS IoT © Bhatt et al World-Leading Research with Real-World Impact!

Classification of IoT Devices Mobility Size Nature Fig 2: A General Classification of IoT Devices © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! IoT Domains Fig 3: IoT Application Domains © Bhatt et al World-Leading Research with Real-World Impact!

WIoT Domains and Devices Wearable Devices: smart watches smart clothing and accessories wireless body sensors … Types of Wearable Devices: In-Body On-Body Around-Body Fig 4: WIoT Application Domains Wearable devices data – highly privacy sensitive and confidential A unified access control framework for CEWIoT securing IoT components and their interactions (communication and data exchange) is still lacking © Bhatt et al World-Leading Research with Real-World Impact!

Enhanced ACO Architecture for WIoT Interactions across the ACO Layers Fig 5: Enhanced ACO Architecture for WIoT © Bhatt et al World-Leading Research with Real-World Impact!

Access Control (AC) Framework Each layer can interact with itself and up to two adjacent layers in each direction Two types of interactions: Direct Interaction (Interactions with itself and direct adjacent layers) Indirect Interaction (Interactions with second level of adjacent layers) Fig 6: Interactions Between ACO Layers © Bhatt et al World-Leading Research with Real-World Impact!

Access Control (AC) Framework (Contd.) The access control (AC) framework – A set of access control models categorized into three main access control categories: Object Access Control models Object Layer and Object Abstraction Layer Virtual Object Access Control models Virtual Object Layer Cloud Access Control models Cloud Services Layer and Applications Layer Suitable access control models: Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Relationship-Based Access Control (ReBAC) © Bhatt et al World-Leading Research with Real-World Impact!

Access Control (AC) Framework (Contd.) AWS-IoTAC Model [3] Policy-based access control ABAC in limited form - Client Attributes - Target Attributes Alshehri and Sandhu [2] VO-VO communications Operational and Administrative Access Control Models - ACLs, CapBAC, RBAC, ABAC Fig 7: Access Control Framework Based on Interactions Between Different Layers of the ACO Architecture © Bhatt et al World-Leading Research with Real-World Impact!

Types of Access Control Models Fig 8: Types of Access Control Models © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Use Case Fig 9: Remote Health and Fitness Monitoring (RHFM) Example © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Use Case (Contd.) Fig 10: A sequential view of the RHFM Use Case © Bhatt et al World-Leading Research with Real-World Impact!

Proposed Enforcement in AWS IoT Based on our previous work [3], we propose a possible enforcement of our use case utilizing AWS IoT platform In [3], we configured a smart home use case (with smart sensors, lights, and thermostat) in AWS IoT Cloud Services Authorization Policies Storage and Analysis … Wearable Devices Device Gateway Virtual Things Applications X.509 Certificates X.509 Certificates Auth Policy Auth Policy Within a Single Account Inter-Account models required!! © Bhatt et al World-Leading Research with Real-World Impact!

AC Framework Objectives & Research Problems User-Based Device Authentication User-Centric Data Security and Privacy Edge Computing in WIoT (Cloudlets) Multi-Cloud Architecture for WIoT (Collaboration and Edge Computing) © Bhatt et al World-Leading Research with Real-World Impact!

Conclusion and Future Work Developed a conceptual AC framework for cloud-enabled wearable IoT (CEWIoT) Enable development of a family of AC models with fine-grained access control for specific interactions in CEWIoT Discussed suitable access control models (e.g., RBAC, ABAC, ReBAC) for different AC categories Presented a WIoT use case and its possible implementation in AWS IoT Future Work: Develop Cloud Access Control models (cross-tenant/account, multi-cloud models) – ABAC and other combinations © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! References [1] Alshehri, Asma, and Ravi Sandhu. "Access control models for cloud-enabled internet of things: A proposed architecture and research agenda." In IEEE 2nd International Conference on Collaboration and Internet Computing (CIC), pp. 530- 538. IEEE, 2016. [2] Alshehri, Asma, and Ravi Sandhu. "Access Control Models for Virtual Object Communication in Cloud-Enabled IoT." In 18th International Conference on Information Reuse and Integration (IRI). IEEE. 2017. [3] Bhatt, Smriti, Farhan Patwa, and Ravi Sandhu. "Access Control Model for AWS Internet of Things." In International Conference on Network and System Security, pp. 721-736. Springer, Cham, 2017. (…More in the paper) © Bhatt et al World-Leading Research with Real-World Impact!

World-Leading Research with Real-World Impact! Thank you! Questions? © Bhatt et al World-Leading Research with Real-World Impact!