SlideShare a Scribd company logo
Adaptive Security for Risk Management Using
Spatial Data
Mariagrazia Fugini1
, George Hadjichristofi2,
,and Mahsa Teimourikia3
1,3
Politecnico di Milano, 2
Frederick University
1
mariagrazia.fugini@polimi.it, 2
com.hg@frederick.ac.cy,
3
mahsa.teimourikia@polimi.it September 2014
Polo Territoriale di Como
Outlines
2
• Motivation
• Objectives
• Preliminaries
• Methodology:
• Components of the Security Model
• Adaptivity of the Security Model due to risks
• Conclusion and Future Work
Polo Territoriale di Como
Motivation
3
[1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013.
• In environmental risk management, providing
security for people and various resources
dynamically, according what happens in the
environment is an open issue [1].
• In monitored environments, where risks can be
acknowledged via sensors and spatial data
technologies, security rules, in particular access
control rules, should be made adaptive to the
situation at hand at run time.
Polo Territoriale di Como
Objectives
4
• This paper presents the design principles for adaptive
security for areas where changing conditions trigger
events signaling risks that might require modifying
authorizations of risk management teams.
• Spatial resources and information of the areas to be
protected are considered in sample scenarios, and
principles of security design are introduced building on
ABAC (Attribute Based Access Control) [2].
• Adaptivity of security rules applying to subjects who
intervene in the risk area is the core of our security
model so as to make it responsive to risks by
dynamically granting privileges to subjects to access
resources.
[2] Hu, V. C., et al. “Guide to Attribute Based Access Control (ABAC) Definition and
Considerations.” NIST Special Publication 800 (2014): 162
Polo Territoriale di Como
Preliminaries
5
• Risk: hazards and abnormalities recognized in an
environment that indicate a threat to the infrastructures
and/or the civilians (e.g., If sensors indicate gas leak,
there is a risk of fire and explosion.). Risks can be
avoided via preventive strategies (e.g. closing the gas
flow). Risks contain attributes like Type, IntensityLevel,
and Location.
• Emergency: When the Risk intensity is higher than a
threshold, it is considered as an emergency that needs
immediate interventions and corrective strategies. (e.g.
if the gas leak is very heavy it can indicate an emergency
situation where an explosion is going to happen (or have
already happened).
Polo Territoriale di Como
A Scenario
• Considering an smart environment (i.e. an airport), in
which the objects, people and the environment itself are
monitored using sensors, and monitoring devices such
as surveillance cameras, check points, wearable devices,
and etc.
• We consider the subjects that intervene for
Risk/Emergency Treatment:
• Security and Risk Manager
• Surveillance Personnel
• Security Staff
6
Polo Territoriale di Como
Security Modeling for Risk Treatment
• The security model is based on ABAC including the
following components:
Subjects: this abstracts a user, an application, or a process
wanting to perform an operation on a resource/object. A
subject can hold many attributes in these three
categories: General Attributes, Geo Attributes, Security
Attributes.
Objects: abstract resources that a subject can access or act
on. Objects hold three groups of attributes: General
Attributes, Geo Attributes, Security Attributes.
Environment: this component models the environment
(i.e., the airport) with its dynamic conditions, which
affect the security decisions.
7
Polo Territoriale di Como
Security Modeling for Risk Treatment
Actions and Activities: these are operations that can be
executed by subjects on objects in a given context
including Simple operations (actions)(e.g. read, write,
etc.) and complex operations, called activities, which
combine simple actions to model a task, a processor or a
physical action. (e.g. “Redirect the airplane to another
runway”).
Contexts: this component indicates a set of security rules,
which are valid in a certain situation based on dynamic
changes in the environment, including occurrence of
risks.
8
Polo Territoriale di Como
Security Modeling for Risk Treatment
Risk and Emergency: The monitored environment
conditions, which change dynamically, can cause the
occurrence of some risks/emergencies. A risky situation
is recognized based on parameters such as: type, level,
and location determining how to adapt security rules to
handle it.
Events: Changes in the environment monitored conditions,
trigger events that in turn activate/deactivate contexts
that modify the security rules. Or cause changes in the
subject/object attributes.
9
Polo Territoriale di Como
Adaptivity
We have adopted the
Event-Condition-
Action (ECA)
paradigm to manage
adaptivity of the
access control
system
Two methods used to dynamically permit subjects accessing
the needed objects in case of a risk or emergency:
•By dynamically changing the Subject/Object/Environment
attributes
•By dynamically activating or deactivating Contexts that
contain the policies to be applied in a certain situation.
10
Polo Territoriale di Como
Adaptivity
ECA (Event-Condition-Action): An Example
In a case that a “fire” Event is reported as an Risk of Type “explosion”
and with a “high” Intensity Level, and when the office hours have
passed, and people are present in the affected area, the following actions
are taken to dynamically adapt the Access Control System:
•The Risk Context is activated
•The Flight Context is Deactivated
•The level of security clearance of the Risk Manager is increased.
•The Time Restriction is removed from the objects that have such a
restriction on access.
11
Polo Territoriale di Como
Using XACML for Defining Policies
12
• The XACML [3] is used as the policy language for the
access control model:
• The XML Schema for Subject/Objects and the
Environment are defined to be used in XACML
• XACML <Rule> concept is used to represent our
security rules, <Policy> to represent the contexts that
are a collection of security rules and the <PolicySet>
to represent the active contexts at each moment.
• The XACML rule and policy combining rules are used
to avoid conflicts between rules.
[3] Rissanen, E. “Extensible Access Control Markup Language (XACML) Version 3.0.” Retrieved
August 7 (2013): 2013
Polo Territoriale di Como
A Sample of A Subject XAML schema
12
Here is a simplified example of a subject XML schema to
be used with XACML
Polo Territoriale di Como
Including Adaptive Risk Treatment In XACML
The adaptivity that
was explained before
is included in the
XACML Architecture
as shown in the figure
14
Polo Territoriale di Como
Conclusions
• This paper presented adaptive security
modeling motivated by the need for smart
environments to dynamically authorize actors
in facing risks.
• The Access Control model was developed on the
ABAC model and with use of XACML policy
language.
• The adaptivity is introduced using the ECA
paradigm, that dynamically changes the
Subject/Object/Environment attributes, and
activates/deactivates contexts based on risks
and emergencies that are detected in the
environment
15
Polo Territoriale di Como
Future Works
• As future work, we intend to focus on the topics of:
• binding environmental and spatial information,
• on the dynamics of assigning authoritative roles to
administrators,
• and on ways to handle conflicting Context switching.
• We are working towards inclusion of this security
model in the Risk Management Tool simulator
developed for risk management and described in [4],
based on Matlab and on a web application deployment
environment.
[4] M. Fugini, C. Raibulet and L. Ubezio, "Risk assessment in work environments: modeling
and simulation.," Concurrency and computation: Practice and experience, vol. 24, no. 18,
pp. 2381-2403, 2012.
16
Polo Territoriale di Como
Thank You
17

More Related Content

PPT
Risks in Smart Environments and Adaptive Access Controls
PPTX
Access Control Privileges Management for Risk Areas
PPT
Chapter 13
PPT
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
PPT
Proyecto Agora-evanza
PDF
도시바
PPSX
Trabajo inma441
ODP
Verdi power victor
Risks in Smart Environments and Adaptive Access Controls
Access Control Privileges Management for Risk Areas
Chapter 13
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
Proyecto Agora-evanza
도시바
Trabajo inma441
Verdi power victor

Viewers also liked (20)

PPTX
PDF
Filacap on line 085
PPTX
Envios y productos
PDF
Community Building - Burdastyle
PPTX
The bigrabbit
PDF
Dictamen no procede contratos codigo para planta dirección
DOCX
Informatik
PPTX
Psicologapositivaaplicadaalaeducacin 111014053934-phpapp01
PDF
06 16 historia de estos diez años
PPTX
Code is not text! How graph technologies can help us to understand our code b...
PPTX
Barrokoa euskal herrian
PDF
Techniques for automatically correcting words in text
DOCX
Dos duendes y dos deseos compañerismo
PDF
Aligning Innovation to Business
PPTX
Las medulas
PPT
Actuaciones Forestales en la Carrasca
PPTX
Sociedades secretas
PPTX
Identidad móvil: Casos de uso de la tecnología Mobile Connect
ODP
Técnicas de comunicación comercial.
PDF
Beacons - The Cookies for the Real World
Filacap on line 085
Envios y productos
Community Building - Burdastyle
The bigrabbit
Dictamen no procede contratos codigo para planta dirección
Informatik
Psicologapositivaaplicadaalaeducacin 111014053934-phpapp01
06 16 historia de estos diez años
Code is not text! How graph technologies can help us to understand our code b...
Barrokoa euskal herrian
Techniques for automatically correcting words in text
Dos duendes y dos deseos compañerismo
Aligning Innovation to Business
Las medulas
Actuaciones Forestales en la Carrasca
Sociedades secretas
Identidad móvil: Casos de uso de la tecnología Mobile Connect
Técnicas de comunicación comercial.
Beacons - The Cookies for the Real World
Ad

Similar to Adaptive Security for Risk Management Using Spatial Data (20)

PPT
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
PPT
Risk and Safety in Work Environments
PDF
Concrete Applications of Interdependency Management
PDF
PERICLES workshop (IDCC 2016) - Appraisal
DOCX
future internetArticleERMOCTAVE A Risk Management Fra
DOCX
Future internet articleermoctave a risk management fra
DOCX
future internetArticleERMOCTAVE A Risk Management Fra.docx
PPTX
Accident Model for investigation and preventive action
PDF
Reputation based dynamic responsibility to agent assignement for critical inf...
PPTX
Safety System Modularity
PDF
MORT ANALYSIS | with Example I Gaurav Singh Rajput
PDF
Ch08 8 Information Security Process it-slideshares.blogspot.com
DOCX
Essay QuestionsAnswer all questions below in a single document, pr.docx
PDF
Multi agents system service based platform in telecommunication security inci...
PDF
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
DOCX
Unit 7 Assignment Group Assignment – Risk Analysis and Ident
PDF
CISSP Management Concepts Tips and tools
PPTX
The Role of Technology in Enhancing Fire Safety in Dubai Innovations to Watch...
PDF
Business governance based policy regulation for security incident response
PDF
Mapping Security Information and Event Management (SIEM) Rules to Tactics and...
Dynamic Security Modeling in Risk Management Using Environmental Knowledge
Risk and Safety in Work Environments
Concrete Applications of Interdependency Management
PERICLES workshop (IDCC 2016) - Appraisal
future internetArticleERMOCTAVE A Risk Management Fra
Future internet articleermoctave a risk management fra
future internetArticleERMOCTAVE A Risk Management Fra.docx
Accident Model for investigation and preventive action
Reputation based dynamic responsibility to agent assignement for critical inf...
Safety System Modularity
MORT ANALYSIS | with Example I Gaurav Singh Rajput
Ch08 8 Information Security Process it-slideshares.blogspot.com
Essay QuestionsAnswer all questions below in a single document, pr.docx
Multi agents system service based platform in telecommunication security inci...
Session B3 - Introduction to Project Cost and Schedule Risk Analysis
Unit 7 Assignment Group Assignment – Risk Analysis and Ident
CISSP Management Concepts Tips and tools
The Role of Technology in Enhancing Fire Safety in Dubai Innovations to Watch...
Business governance based policy regulation for security incident response
Mapping Security Information and Event Management (SIEM) Rules to Tactics and...
Ad

Recently uploaded (20)

PDF
Architecture types and enterprise applications.pdf
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Getting Started with Data Integration: FME Form 101
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
observCloud-Native Containerability and monitoring.pptx
PPTX
Modernising the Digital Integration Hub
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hindi spoken digit analysis for native and non-native speakers
Architecture types and enterprise applications.pdf
A novel scalable deep ensemble learning framework for big data classification...
Getting started with AI Agents and Multi-Agent Systems
Getting Started with Data Integration: FME Form 101
TLE Review Electricity (Electricity).pptx
Hybrid model detection and classification of lung cancer
Web App vs Mobile App What Should You Build First.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
OMC Textile Division Presentation 2021.pptx
A contest of sentiment analysis: k-nearest neighbor versus neural network
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
A comparative study of natural language inference in Swahili using monolingua...
1. Introduction to Computer Programming.pptx
Developing a website for English-speaking practice to English as a foreign la...
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
observCloud-Native Containerability and monitoring.pptx
Modernising the Digital Integration Hub
DP Operators-handbook-extract for the Mautical Institute
Hindi spoken digit analysis for native and non-native speakers

Adaptive Security for Risk Management Using Spatial Data

  • 1. Adaptive Security for Risk Management Using Spatial Data Mariagrazia Fugini1 , George Hadjichristofi2, ,and Mahsa Teimourikia3 1,3 Politecnico di Milano, 2 Frederick University 1 mariagrazia.fugini@polimi.it, 2 com.hg@frederick.ac.cy, 3 mahsa.teimourikia@polimi.it September 2014
  • 2. Polo Territoriale di Como Outlines 2 • Motivation • Objectives • Preliminaries • Methodology: • Components of the Security Model • Adaptivity of the Security Model due to risks • Conclusion and Future Work
  • 3. Polo Territoriale di Como Motivation 3 [1] K. Smith, Environmental hazards: assessing risk and reducing disaster, Routledge, 2013. • In environmental risk management, providing security for people and various resources dynamically, according what happens in the environment is an open issue [1]. • In monitored environments, where risks can be acknowledged via sensors and spatial data technologies, security rules, in particular access control rules, should be made adaptive to the situation at hand at run time.
  • 4. Polo Territoriale di Como Objectives 4 • This paper presents the design principles for adaptive security for areas where changing conditions trigger events signaling risks that might require modifying authorizations of risk management teams. • Spatial resources and information of the areas to be protected are considered in sample scenarios, and principles of security design are introduced building on ABAC (Attribute Based Access Control) [2]. • Adaptivity of security rules applying to subjects who intervene in the risk area is the core of our security model so as to make it responsive to risks by dynamically granting privileges to subjects to access resources. [2] Hu, V. C., et al. “Guide to Attribute Based Access Control (ABAC) Definition and Considerations.” NIST Special Publication 800 (2014): 162
  • 5. Polo Territoriale di Como Preliminaries 5 • Risk: hazards and abnormalities recognized in an environment that indicate a threat to the infrastructures and/or the civilians (e.g., If sensors indicate gas leak, there is a risk of fire and explosion.). Risks can be avoided via preventive strategies (e.g. closing the gas flow). Risks contain attributes like Type, IntensityLevel, and Location. • Emergency: When the Risk intensity is higher than a threshold, it is considered as an emergency that needs immediate interventions and corrective strategies. (e.g. if the gas leak is very heavy it can indicate an emergency situation where an explosion is going to happen (or have already happened).
  • 6. Polo Territoriale di Como A Scenario • Considering an smart environment (i.e. an airport), in which the objects, people and the environment itself are monitored using sensors, and monitoring devices such as surveillance cameras, check points, wearable devices, and etc. • We consider the subjects that intervene for Risk/Emergency Treatment: • Security and Risk Manager • Surveillance Personnel • Security Staff 6
  • 7. Polo Territoriale di Como Security Modeling for Risk Treatment • The security model is based on ABAC including the following components: Subjects: this abstracts a user, an application, or a process wanting to perform an operation on a resource/object. A subject can hold many attributes in these three categories: General Attributes, Geo Attributes, Security Attributes. Objects: abstract resources that a subject can access or act on. Objects hold three groups of attributes: General Attributes, Geo Attributes, Security Attributes. Environment: this component models the environment (i.e., the airport) with its dynamic conditions, which affect the security decisions. 7
  • 8. Polo Territoriale di Como Security Modeling for Risk Treatment Actions and Activities: these are operations that can be executed by subjects on objects in a given context including Simple operations (actions)(e.g. read, write, etc.) and complex operations, called activities, which combine simple actions to model a task, a processor or a physical action. (e.g. “Redirect the airplane to another runway”). Contexts: this component indicates a set of security rules, which are valid in a certain situation based on dynamic changes in the environment, including occurrence of risks. 8
  • 9. Polo Territoriale di Como Security Modeling for Risk Treatment Risk and Emergency: The monitored environment conditions, which change dynamically, can cause the occurrence of some risks/emergencies. A risky situation is recognized based on parameters such as: type, level, and location determining how to adapt security rules to handle it. Events: Changes in the environment monitored conditions, trigger events that in turn activate/deactivate contexts that modify the security rules. Or cause changes in the subject/object attributes. 9
  • 10. Polo Territoriale di Como Adaptivity We have adopted the Event-Condition- Action (ECA) paradigm to manage adaptivity of the access control system Two methods used to dynamically permit subjects accessing the needed objects in case of a risk or emergency: •By dynamically changing the Subject/Object/Environment attributes •By dynamically activating or deactivating Contexts that contain the policies to be applied in a certain situation. 10
  • 11. Polo Territoriale di Como Adaptivity ECA (Event-Condition-Action): An Example In a case that a “fire” Event is reported as an Risk of Type “explosion” and with a “high” Intensity Level, and when the office hours have passed, and people are present in the affected area, the following actions are taken to dynamically adapt the Access Control System: •The Risk Context is activated •The Flight Context is Deactivated •The level of security clearance of the Risk Manager is increased. •The Time Restriction is removed from the objects that have such a restriction on access. 11
  • 12. Polo Territoriale di Como Using XACML for Defining Policies 12 • The XACML [3] is used as the policy language for the access control model: • The XML Schema for Subject/Objects and the Environment are defined to be used in XACML • XACML <Rule> concept is used to represent our security rules, <Policy> to represent the contexts that are a collection of security rules and the <PolicySet> to represent the active contexts at each moment. • The XACML rule and policy combining rules are used to avoid conflicts between rules. [3] Rissanen, E. “Extensible Access Control Markup Language (XACML) Version 3.0.” Retrieved August 7 (2013): 2013
  • 13. Polo Territoriale di Como A Sample of A Subject XAML schema 12 Here is a simplified example of a subject XML schema to be used with XACML
  • 14. Polo Territoriale di Como Including Adaptive Risk Treatment In XACML The adaptivity that was explained before is included in the XACML Architecture as shown in the figure 14
  • 15. Polo Territoriale di Como Conclusions • This paper presented adaptive security modeling motivated by the need for smart environments to dynamically authorize actors in facing risks. • The Access Control model was developed on the ABAC model and with use of XACML policy language. • The adaptivity is introduced using the ECA paradigm, that dynamically changes the Subject/Object/Environment attributes, and activates/deactivates contexts based on risks and emergencies that are detected in the environment 15
  • 16. Polo Territoriale di Como Future Works • As future work, we intend to focus on the topics of: • binding environmental and spatial information, • on the dynamics of assigning authoritative roles to administrators, • and on ways to handle conflicting Context switching. • We are working towards inclusion of this security model in the Risk Management Tool simulator developed for risk management and described in [4], based on Matlab and on a web application deployment environment. [4] M. Fugini, C. Raibulet and L. Ubezio, "Risk assessment in work environments: modeling and simulation.," Concurrency and computation: Practice and experience, vol. 24, no. 18, pp. 2381-2403, 2012. 16
  • 17. Polo Territoriale di Como Thank You 17