Access Controls in Smart Cars: Needs and Solutions

Slides:



Advertisements
Similar presentations
Institute for Cyber Security
Advertisements

Institute for Cyber Security
CS 443 Advanced OS Fabián E. Bustamante, Spring 2005 Resource Containers: A new Facility for Resource Management in Server Systems G. Banga, P. Druschel,
Title of Selected Paper: Design and Implementation of Secure Embedded Systems Based on Trustzone Authors: Yan-ling Xu, Wei Pan, Xin-guo Zhang Presented.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Keep Your Information Safe! Josh Heller Sr. Product Manager Microsoft Corporation SIA206.
CHARLES UNIVERSITY IN PRAGUE faculty of mathematics and physics CHARLES UNIVERSITY IN PRAGUE faculty of mathematics.
© Synergetics Portfolio Security Aspecten.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Privilege Management Chapter 22.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
IS3220 Information Technology Infrastructure Security
A Multi-Dimensional Configurable Access Control Framework for Mobile Applications By: Yaira K. Rivera Sánchez Major Advisor: Steven A. Demurjian.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
[ [ WP3 : Modelling and delegation of secure interoperability policies Brussels – 29/05/2013.
Presented By: Smriti Bhatt
Database and Cloud Security
Access Control in Cloud Security
Containers as a Service with Docker to Extend an Open Platform
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Institute for Cyber Security
Institute for Cyber Security
Understanding Android Security
FUNDAMENTAL CONCEPTS IN COMPUTER SECURITY
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Access Control Model for the Hadoop Ecosystem
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security
ASSET - Automotive Software cyber SEcuriTy
Security Working Group
Institute for Cyber Security
World-Leading Research with Real-World Impact!
Adaptable safety and security in v2x systems
An Access Control Perspective on the Science of Security
OGSA-WG Security Use Cases Jan 29, 2004
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
World-Leading Research with Real-World Impact!
Attribute-Based Access Control: Insights and Challenges
Security Protection Goals
Computer Science Department
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Rejina Basnet, Subhojeet Mukherjee, Vignesh M. Pagadala, Indrakshi Ray
OS Access Control Mauricio Sifontes.
AUTOmated driving Progressed by the Internet Of Things
Securing Home IoT Environments with Attribute-Based Access Control
Attribute-Based Access Control: Insights and Challenges
Technical Capabilities
The SAFERtec project on V2I security assurance: concept and vision
VIP Senior, 2018, Spring Smart Stormwater – Smart City System Problem
EUDAT Site and Service Registry
Understanding Android Security
Institute for Cyber Security
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
A proposal for approach to proceed work in Cybersecurity TF
Ph.D. Dissertation Defense
Access Control Evolution and Prospects
IoT Security and Privacy
Presentation transcript:

Access Controls in Smart Cars: Needs and Solutions Maanak Gupta Postdoctoral Research Fellow Institute for Cyber Security University of Texas at San Antonio Guest Lecture CS 6393/4593 April 05, 2019 gmaanakg@yahoo.com http://sites.google.com/view/maanakgupta

Smart Cars Ecosystem Safety and Assistance High Mobility, Location Centric Time Sensitive, Dynamic Pairing Multiple Fog/Cloud Infrastructures Information and Entertainment

No More Isolated.! 100 million lines of code Software Reliance , Broad Attack Surface, Untrusted Entities

(Read/write/execute/control) The Perfect World.! operates on (Read/write/execute/control) USER OBJECT Confidentiality Integrity Availability I TRUST my users. Everything is Secure. !! Thank YOU.!!

Access Control Mechanisms Access Request Access Control Enforcer GRANT DENY USER OBJECT manages ADMIN A user [U] is allowed to perform an operation [OP] on an object [OB] if security policy [P] is satisfied.

Access Control Mechanisms PROTECTION Access Request Access Control Enforcer GRANT DENY USER OBJECT manages Post Authentication Complements other mechanisms ADMIN A user [U] is allowed to perform an operation [OP] on an object [OB] if security policy [P] is satisfied.

Attribute Based Access Control Three Dominant Models: DAC, MAC and RBAC. ABAC: Decision based on the attributes of entities Attributes are name value pair: age (Alice)  29 Core entities in ABAC include: Users Objects Attributes Environment or Context Operations Authorization Policies: determine rights just in time retrieve attributes of relevant entities in request Enhance flexibility and fine grained access control NIST Guidelines to ABAC User:---age, gender, department, desingatin, role Object: created by, last modified, Only nurse in the pediatric department is allowed to read the files of children which visit the clinic. Only owner iot.

Access Control Needs in Smart Cars On-Board Data, Applications and Sensors Third Party devices V2X fake messages User Privacy Preferences Over the Air updates Loss of Information in Cloud Location and time sensitivity of the services. In-vehicle communication

Scope of Contribution Scope Contribution Access Control Oriented Architecture for Smart Cars. Propose formalized ABAC model for cloud assisted applications. Dynamic groups and user preferences. Implementation of the model in AWS. Scope Single Central Cloud No direct access and physical tampering Communication Channel is encrypted. Data in Cloud is secure In-vehicle security not considered

Extended Access Control Oriented Architecture E-ACO architecture Vehicular IoT components in architecture

Authorization Framework An Authorization Framework: Helps understand access control needs. Helps understand models suitability for each.

Authorization Framework AWS-IoTAC Model Policy Based Limited Attributes AWS-IoT-ACMVO Model For Virtual Objects ACLs, RBAC, ABAC

Authorization Framework AWS-IoTAC Model Policy Based Limited Attributes AWS-IoT-ACMVO Model For Virtual Objects ACLs, RBAC, ABAC Our Solution Pure ABAC User Privacy Cloud Supported

Location Groups Categorizing wide locations into smaller groups. Vehicles dynamically become member based on current GPS, vehicle-type or individual user preferences. Ensure relevance of alerts and notifications

Attributes and Alerts Speed Limit: 50 mph Deer Threat: ON Ice on Road: NO Speed Limit: 30 mph Flood Warning: ON Road Work: ON Speed Limit: 20 mph School Zone: ON Amber Alert: ABC123 Vehicle moves and are assigned to different groups and inherits their attributes/alerts.

Using Location Groups Administrative Questions: How the attributes or alerts of groups are updated? How are moving entities assigned to groups? How groups hierarchy is created? Operational Questions: How attributes and groups are used to provide security? How user privacy preferences are considered? How to realize dynamic location groups and how it works? Speed Limit: 50 mph Deer Threat: ON Ice on Road: NO Speed Limit: 30 mph Flood Warning: ON Road Work: ON Reported MQTT message

CV-ABACG Model

Model Components user, sensor, car, mechanic, restaurant { location, size, IP, direction, speed, VIN, cuisine-type}

Model Components { read, write, control, notify, administrative actions }

Model Components Sensor, ECU, Cars, traffic lights, smart-devices on-board apps Location groups, service-specific, vehicle-type

Model Components Operational and Administrative Activities {notification, alerts, group hierarchy updates} System Wide Policies Individualized Privacy Policies

Formal Specification Attribute Function Attribute Type Group Hierarchy Attribute Mapping

Formal Specification Attributes more Dynamic Attributes Inheritance

Policy Language Administrators in the police department can send alert to location-groups in city limits. Authalert(u:U, g:G) :: dept (u) Police ʌ parent-city(g) = Austin ʌ Austin ∈jursidiction u . Only mechanic in the technician department from Toyota-X dealership must be able to read sensor in Camry LE. Further, this operation must be done between time 9 am to 6 pm. Authread(u:U, co:CO) :: role (u) Technician ʌ employer(u) = Toyota-X ʌ make (co) = Toyota ʌ model(co) = Camry LE ʌ operation_time(u) ∈ {9am,10,11…6pm}

Activity Authorization Decision Evaluate all relevant policies to make a decision A restaurant in group A must be allowed to send notifications to all vehicles in location group A and group B. System defined DECISION I only want notifications from Cheesecake factory. User Preference

Implementation in Amazon Web Services (AWS)

Vehicles and Groups 4 Location Groups (static demarcation) Vehicles movement (coordinates generated using Google API) Snapshot (table keeps changing)

Administrative Policy Implemented Policies Administrative Policy Road side motion sensor with [id = 1] and current GPS in group [Location- A] can only [modify] attribute [Deer Threat] to value [ON, OFF] for group [Location-A]. Operational Policy Restaurant Notification Use Case System Defined Policy A restaurant located within group [Location-A] can only [send notifications] to members of groups [Location-A, Location-B]. User Preferences Send notifications only between [7 pm to 9 pm] only on [Wednesdays].

Policy Enforcer Execution Time Performance Metrics CARS NOTIFIED nth Request With ABAC Policy Without Policy 41st 20 50 42nd 30 43rd 44th 45th 46th Number of Requests Policy Enforcer Execution Time (in ms) 10 0.0501 20 0.1011 30 0.1264 40 0.1630 50 0.1999 Policy Enforcement Time Relevance of Alerts and Notifications

Performance Metrics Comparing Policy vs No Policy Execution Time

Lets Talk ..!! Questions, Comments or Concerns gmaanakg@yahoo.com https://sites.google.com/view/maanakgupta