PLUG-N-HARVEST ID: H2020-EU

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Identity Network Ideals – Heterogeneity & Co-existence
OOI-CI–Ragouzis– Ocean Observatories Initiative Cyberinfrastructure Component CI Design Workshop October 2007.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
FIA Budapest 18 May 2011 The socio-economic impacts of the Future Internet FIA Budapest 18 May 2011.
May 12, 2015IEEE Network Management Symposium Page-1 Requirements for Configuration Management of IP-based Networks Luis A. Sanchez Chief Technology Officer,
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
December 19, 2006 Solving Web Single Sign-on with Standards and Open Source Solutions Trey Drake AssetWorld 2007 Albuquerque, New Mexico November 2007.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
ACE – Design Considerations Corinna Schmitt IETF ACE WG meeting July 23,
TTA Views on Technical Scope of M2M Consolidation 17 August 2011 TTA M2MCons02_16 (Agenda 4.3)
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
OAuth/UMA for ACE 24 th March 2015 draft-maler-ace-oauth-uma-00.txt Eve Maler, Erik Wahlström, Samuel Erdtman, Hannes Tschofenig.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Authors list to be completed.
SIP Authorization Framework Use Cases Rifaat Shekh-Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13,
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
© Synergetics Portfolio Security Aspecten.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV BOF IETF-67 San Diego November 2006 Andrea Doherty.
Security Requirements for Software Defined Networks Internet Area WG IETF 85: Atlanta November 4, 2012 Margaret Wasserman
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
IoT High Level Architecture (HLA) AIOTI Edited by AIOTI WG3 Chairs Patrick Guillemin Jean-Pierre Desbenoit AIOTI WG3 IoT High Level Architecture – Release.
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
INDIGO – DataCloud Security and Authorization in WP5 INFN RIA
IoT R&I on IoT integration and platforms INTERNET OF THINGS
SMARTIE Area of Activity: Framework Programme 7Framework Programme 7 ICT Objective 1.4 IoT (Smart Cities) Period:1 st September st August 2016.
Grant no * REliable, Resilient and secUre IoT for sMart city applications 1.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
Secure and sMARrter ciTIes Data ManagEment
Presented by Edith Ngai MPhil Term 3 Presentation
Secure Connected Infrastructure
ONEM2M RELEASE 2: SETTING THE STANDARD FOR IOT INTEROPERABILITY
Internet Of Things (IoT)
ETSI Software Reconfiguration Overview
Phil Hunt, Hannes Tschofenig
Grid Security.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Data and Applications Security Developments and Directions
Information Security.
ETSI STF 529 on Attribute Based Encryption for IoT, Cloud, mobile
Federated IdM Across Heterogeneous Clouding Environment
Introduction How to combine and use services in different security domains? How to take into account privacy aspects? How to enable single sign on (SSO)
Cloud Computing By P.Mahesh
S/MIME T ANANDHAN.
Discussion on the Scope of TR- Trust Management in oneM2M
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
Signing transactions anonymously with Identity Mixer in Hyperledger
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
January 15th Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Security protocol for Body area networks]
NAAS 2.0 Features and Enhancements
doc.: IEEE <doc#>
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
Materials Microcharacterization Collaboratory
Security & .NET 12/1/2018.
AAI Architectures – current and future
Requirements Date: Authors: March 2010 Month Year
InfiNET Solutions 5/21/
A lighttwiht reconfigurable security mechanism for 3G/4G mobile devices 2019/7/1 A Lightweight reconfigurable security mechanism for 3G/4G mobile devices.
SPIRAL: Security Protocols for Cerberus
Cryptography and Network Security
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

PLUG-N-HARVEST ID: 768735 - H2020-EU.2.1.5.2. WP3 - Task 3.4: Operational Security Mechanisms ORGANIZATION: Odin Solutions/OdinS PRESENTER(S): Antonio Skarmeta MEETING: Kickoff Meeting, Aachen, 21-22 September 2017 November 24, 2018 PLUG-N-HARVEST ID: 768735 - H2020-EU.2.1.5.2.

Task 3.4 Operational Security Mechanisms Lead OdinS – Contributors: CERTH, SIEMENS, ETRA Develop protocols attest and monitor the infrastructure and correct handling of data according to the given policy. Defining fine-grained access control for privacysensitive data, providing tools for allow a user-centric approach, allowing user the access policy Integration of data minimization techniques to control de level and exposition of certain attributes and/or data generated by smart devices will be envisaged. Attribute-based encryption (ABE) schemes for fine-grained access control without a lengthy user authorization process and its integration with minimal disclosure technologies How content-centric security can be applied to data and information to provide end-to-end security, but in such a way that it minimises the exposure of such data PLUG-N-HARVEST ID: 768735 - H2020-EU.2.1.5.2.

Main Security and Privacy aspects Protect infrastructure elements for possible threats: Securre communications and Access control mechanism integration with the ADBE and IMCS/OEMS solutions Integrated authorization mechanism XACML Policies based to specify privacy policies on structural models describing both users and applications properties; a distributed access control model based on capabilities tokens will be provided to manage the authorization access; Privacy preserving solutions a privacy-preserving identity management solution to be linked with the IdM framework a privacy preserving group communication solution based on CP-ABE. PLUG-N-HARVEST ID: 768735 - H2020-EU.2.1.5.2.

IoT at glance Data’s producer to be sent through intermediate nodes until they are received by consumers The challenge is to guarantee S&P between producer(s) and consumer(s)

The problem To guarantee producer-to-consumer (end-to-end) S&P, so the crypto approach must take into account: Performance: to be accommodated (even) in devices with resource constraints IETF RFC 7228: Terminology for Constrained-Node Networks It is not about to fit crypto in constrained devices at any price: For example, how often will be required a certain crypto algorithm to be performed?

Addressing IoT Security and Privacy challenges Architectural Challenges IoT under constant (r)evolution  the consequence is a fragmented landscape of solutions and technologies Need for defining architectures abstracting from underlying technologies Security and Privacy are not considered as first-class components Increasing interest from different standardization organizations AIOTI WG03 – “High Level Architecture (HLA)” IEEE (P2413) – “Standard for an Architectural Framework for the IoT” oneM2M Functional Architecture ITU-T (Y.2060) – “Overview of the Internet of Things” ITU-T (SG20) – “IoT and its applications including Smart cities and communities” Recent European iniatives (SENSEI, BUTLER,…) addressing specific use case or scenarios based on architectures at different abstraction levels

Addressing IoT Security and Privacy challenges Technical Challenges From Security Extension for identity management schemes to smart objects Fine-grained delegation-based access control and simplified key management Preservation of security properties on resource-constrained devices (E2E security) From Privacy Support of privacy directives (GDPR) and Privacy By Design (PbD) principles Support for minimal or selective PII disclosure User control on data sharing or outsourcing of PII Scalability Flexibility Interoperability

Flexible and Lightweight Authorization for IoT Motivation Current approaches, (e.g. OAuth 2.0), mainly focused on Web scenarios… … and bearer tokens lack Proof-of-Possession (PoP) mechanisms Solution: Distributed Capability-Based Access Control (DCapBAC) Foundations SPKI Certificate Theory – binding access rights to a public key ZBAC, Policy Machine from NIST Design Authorization token following a similar semantics to JSON Web Tokens (JWTs), but: Including access rights as <action, resource> pairs associated to a cryptographic key Conditions to be verified by the enforcer Use of technologies for IoT (e.g. CoAP, DTLS, ECC) Integration with XACML and PoP mechanisms for privacy-preserving purposes

Access Control in the IoT Motivation Lack of inclusive approaches going beyond authorization covering authentication, identity management or group management aspects Direct access vs Platform-based access

Flexible and Lightweight Authorization for IoT DCapBAC extended scenario (client initiated)

Integration with dynamic and privacy-preserving aspects Motivation Use of the public key within the token prevents C’s privacy to be preserved Need for PoP mechanisms that support minimal disclosure Solution Use of partial identities as a subset of attributes from the whole identity Binding privileges to a partial identity Access rights of DCapBAC tokens associated to a partial identity (or pseudonym) Instantiation through different cryptographic schemes (based on challenge-response) IBE: the key is associated to the pseudonym within the token CP-ABE: key’s attributes to satisfy the partial identity Anonymous credentials (Idemix): based on a proof derived from the anonymous credential

Security and Privacy Framework for the IoT Operation Performing tasks for which it was manufactured Pair operation vs Group operation Pair operation Enabled by authorization credentials obtained through the infrastructure Instantiation based on DCapBAC tokens and privacy-preserving proof of possession Group operation Instantiation based on CP-ABE

Use Case 24/02/2017 Final Review