FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description.

Slides:



Advertisements
Similar presentations
Jose Jimenez Director. International Programmes Telefónica Digital.
Advertisements

Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
© 2005 Mobile VCE Securing the Future: Device & Service Security Stephen Hope, FT R&D UK Ltd on behalf of Nigel Jefferies, Vodafone Chair.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Digital Identities for Networks and Convergence Joao Girao, Amardeo Sarma.
The State of Security Management By Jim Reavis January 2003.
Using Digital Credentials On The World-Wide Web M. Winslett.
FI-WARE – Future Internet Core Platform FI-WARE Cloud Hosting July 2011 High-level description.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Distributed Systems Management What is management? Strategic factors (planning, control) Tactical factors (how to do support the strategy practically).
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
LÊ QU Ố C HUY ID: QLU OUTLINE  What is data mining ?  Major issues in data mining 2.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Cloud Computing Cloud Security– an overview Keke Chen.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Towards A User-Centric Identity-Usage Monitoring System - ICIMP Daisuke Mashima and Mustaque Ahamad College of Computing Georgia Institute of Technology.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Open APIs for Open Minds Nuria de Lama, Atos Research & Innovation Future Internet Public Private Partnership in EU FI-WARE: Overview.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Chapter 8 Architecture Analysis. 8 – Architecture Analysis 8.1 Analysis Techniques 8.2 Quantitative Analysis  Performance Views  Performance.
Applying FI-WARE Generic Enablers to Smart Grid Management: Electric Car Charging Scenario Dr. Steven Davy Mobile, Middleware, TSSG Mas2tering.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Monitoring for network security and management Cyber Solutions Inc.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
FI-WARE Overview Juanjo Hierro Telefonica Digital, Coordinator and Chief Architect, FI-WARE
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Principles on evaluating FIWARE relevance for Phase 3 proposals.
National Science Foundation Directorate for Computer & Information Science & Engineering (CISE) Trustworthy Computing and Transition to Practice Secure.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
FI-WARE Overview Juanjo Hierro Telefonica Digital, Coordinator and Chief Architect, FI-WARE
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Federal Cybersecurity Research Agenda June 2010 Dawn Meyerriecks
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
Jose Jimenez Telefónica I+D Future Network & Mobile Summit 2011 The vision of Future Internet in the FI PPP Core Platform project.
The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE Stefano De Panfilis (Fi-WARE PCC Member) 4 th July 2011 FInES - Samos Summit.
Private Information Protection based on User-Trusted Program Institute of Systems and Information Engineering/KYUSHU Ken ’ ichi Takahashi.
1 Access Control Policies: Modeling and Validation Luigi Logrippo & Mahdi Mankai Université du Québec en Outaouais.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Authentication and Authorisation in eduroam Klaas Wierenga, AA Workshop TNC Lyngby, 20th May 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
An Active Security Infrastructure for Grids Stuart Kenny*, Brian Coghlan Trinity College Dublin.
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
FI-WARE concepts to highlight 1.
IS3220 Information Technology Infrastructure Security
Enabling Access Control and Privacy through Ontology Mohammad M. R. Chowdhury Dr. Josef Noll UniK - University Graduate Center, Norway Dr. Juan Miguel.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Connected Identity & the role of the Identity Bus Prabath Siriwardena Director of Security Architecture WSO2.
Security and resilience for Smart Hospitals Key findings
SIEM Rotem Mesika System security engineering
A product is useless without a platform, or more precisely and accurately, a platform-less product will always be replaced by an equivalent platform-ized.
What is it ? …all via a single, proven Platform-as-a-Service.
Cloud Security– an overview Keke Chen
Chapter 18 MobileApp Design
Instantiation of the Concept in GAMMA Prototypes
Scalable Policy-awarE Linked Data arChitecture for prIvacy, trAnsparency and compLiance H2020-ICT Big Data PPP: privacy-preserving Big Data technologies.
IS4680 Security Auditing for Compliance
Shifting from “Incident” to “Continuous” Response
Smart Learning concepts to enhance SMART Universities in Africa
Artem A. Nazarenko, Joao Sarraipa, Paulo Figueiras,
Giovanni Carnovale – Regional Sales Manager Central & Eastern Europe
Internet of Things (IoT) for Industrial Development and Automation
Presentation transcript:

FI-WARE – Future Internet Core Platform FI-WARE Security July 2011 High-level Description

FI-WARE – Future Internet Core Platform Overview  The overall ambition of the Security Architecture of FI-WARE is to demonstrate that the Vision of an Internet that is "secure by design" is becoming reality  FI-WARE GEs to be developed and/or integrated as part of the Security chapter will comprise: A set of GEs for a number of shared security concerns (i.e. identity and access management as well as privacy and auditing) that are considered core and therefore present in any FI-WARE Instance. A set of optional Security GEs to address current and future requests from concrete Usage Areas. An advanced security monitoring system that covers the whole spectrum from acquisition of events up to display, going through analysis but also going beyond thanks to a digital forensic tool and assisted decision support in case of cyber attacks. 1

FI-WARE – Future Internet Core Platform Identity Management  The Identity Management GE is a core Security GE that provides services to its relying parties via open protocols such as OpenID [OpenId] and OASIS SAML v2.0 [Saml] (Security Assertion Markup Language).  Motivated by the IoT, the enabler also covers new user attributes such as things, as well as it manages the identity of things themselves (attributes, current users, location, use history, etc). The large number of sensors and mobile devices poses new challenges; identity federation and single-sign-on support ease of use. 2

FI-WARE – Future Internet Core Platform PrimeLife Policy Language (PPL) Engine  Currently, websites and online applications that control data are obliged to publish a privacy policy stating how the data collected from users will be handled and treated.  This privacy policy is a text is written by layers and most of the time not really easy to understand for the common users: Beside the lack of clarity of such privacy statements, their enforcement is not automated. It becomes very hard to check whether a data controller is compliant with his declared privacy policy.  For instance a user will not be able to verify id the data controller shared his data with a third party.  For this reason, we propose to provide a machine readable language called PPL [Ppl] that is able to express the rules contained in the standard privacy policies. 3

FI-WARE – Future Internet Core Platform PrimeLife Policy Language (PPL) Engine  This language is not only designed to express privacy policy but also: Privacy preferences expressed by the users. These preferences can then be compared or matched with the privacy policy of the data controller. Access control rules (how can access the data and under which condition) Usage control rules (how the data should/must be treated after being collected and for which purpose). Obligations can also been expressed in order to force a data controller to perform an obligation on the data after collecting it (ex. Deletion after a certain period, user notification when the data is used or shared, etc.) 4

FI-WARE – Future Internet Core Platform Security Monitoring  Security monitoring is the first step towards understanding the real security state of a future internet environment and, hence, towards realising the execution of services with desired security behaviour and detection of potential attacks or non-authorized usage.  Security monitoring is focused essentially on monitoring alarms from network equipment, systems and security sensors. By the collection, filtering and correlation of data from large-scale heterogeneous environments, including sensitive data from security tools and devices, SCADA events, raw sensor data, suspicions behaviours, etc., coupled with a dynamic risk analysis engine, decision making support and role- oriented visualization engine, the security stakeholders can take appropriate actions to prevent and mitigate the impact of abnormal behaviour. 5

FI-WARE – Future Internet Core Platform Thank You !!