2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00052
|View full text |Cite
|
Sign up to set email alerts
|

LUCON: Data Flow Control for Message-Based IoT Systems

Abstract: Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the exchange of data between services across enterprises. Traditional access and usage control mechanisms are only able to determine if data may be used by a subject, but lack an understanding of how it may be used. The ability to control the way how data is processed is however crucial for enterprises to guarantee (and provide evidence of) compliant processing of critical data, as well as for users who need to control if thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
35
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 29 publications
(35 citation statements)
references
References 22 publications
0
35
0
Order By: Relevance
“…Based on their observations, they propose some design patterns that can help protect data flow already in the design stage. Schütte and Brost [164] state that data flow enforcement is a requirement in certain contexts, and propose a policycontrolled data flow control framework capable of monitoring messages between entities both statically and at run-time. This allows users to not just specify access policies, but also to state how data elements are allowed to be processed by the system.…”
Section: ) Data Transportmentioning
confidence: 99%
See 1 more Smart Citation
“…Based on their observations, they propose some design patterns that can help protect data flow already in the design stage. Schütte and Brost [164] state that data flow enforcement is a requirement in certain contexts, and propose a policycontrolled data flow control framework capable of monitoring messages between entities both statically and at run-time. This allows users to not just specify access policies, but also to state how data elements are allowed to be processed by the system.…”
Section: ) Data Transportmentioning
confidence: 99%
“…A Fog node can set up and maintain highly secure, authenticated channels with remote parties, potentially alleviating some of the challenges involved in designing lightweight Edge devices that need to interact with these parties, as they only need to concern themselves with secure communication with the Fog node. If the Fog node additionally has the ability to access the message content of traffic passing through it, it can enforce data flow policies, e.g., as described in [164], allowing fine-grained data security mechanisms on top of encryption techniques.…”
Section: F Fog-enabled Data Security and Data Sharingmentioning
confidence: 99%
“…However, the more flows there are, the more attacking vectors the IoT cloud systems face. For more extensive data flow analysis of IoT cloud applications, we refer to [47,89,98,103].…”
Section: Security Analysis Approachmentioning
confidence: 99%
“…Here, a central auditor collects information from contributing audit hooks, combines the information to synthesize an analysis to determine if the composition is meeting its service requirements (or service levels), and then alerts stakeholders if the constraints are not met [22]. Others in the IoT MCA research community have highlighted audit hooks as options for IoT systems [23], but to our knowledge no frameworks make wide usage of audit hooks to integrate data across multiple disparate components and differing abstractions in IoT architectures (e.g. data arising from functional execution of code on smartphones, connected webservices, and the IoT device hardware).…”
Section: Multi-component Threat Analysis Systemmentioning
confidence: 99%