SlideShare a Scribd company logo
Distributed service environment
 (smart spaces) security model
          development

                         Kirill Yudenok, Kirill Krinkin
                                     FRUCT LETI Lab,
                            Open Source & Linux Lab
        FRUCT 12th, Oulu, November, 2012
Agenda
Motivation;
Goal and tasks;
Current Smart-M3 security;
Security model development;
Smart-M3 security realization:
   HIP-agent;
   smart space RDF-graph mapping to the virtual file
   system (VFS);
What was done?
Future research and development;
                      FRUCT 12th        8 Nov 2012   2
Motivation

access control mechanism for the smart space
platform, for example Smart-M3;


protection information mechanism of the space;


research information security within the smart
space area.


                  FRUCT 12th         8 Nov 2012   3
Goal and Tasks
The project goal
 Development a security model for distributed service
 environment (smart spaces, SS), access control algorithms and
 test developed components as a part of the SS Smart-M3
 platform;
The main tasks of the project
 investigation of the basic security models and creation own
 security solutions;
 development a security model for Smart Spaces;
 modeling and development security model components for the
 Smart-M3 platform;
 testing developed components and algorithms within the
 Smart-M3 platform;
                         FRUCT 12th             8 Nov 2012   4
Smart-M3 security
What do we have?
   access control at triple level [1];
   context-based and access control policies;
   security objects as triple patterns;
What do we want?
   identification and authentication mechanism of the SS
   subjects;
   authorization and access control mechanism of SS subjects;
   data privacy;
[1] A.D’Elia, J.Honkola, D.Manzaroli, T.S.Cinotii – Access Control at Triple Level: Specification and Enforcement of a
Simple RDF Model to Support Concurrent Applications in Smart Environments, 2011.


                                                  FRUCT 12th                                   8 Nov 2012                5
Security model development
Identification and authentication of space subjects:
    HIP, PAM;

Authorization and access control of space subjects:
    discretionary security model;
    smart space RDF-graph mapping to the virtual file
    system (VFS);
    named graphs;
    access control ontology;
    security extensions for smart space database.
                       FRUCT 12th           8 Nov 2012   6
Smart-M3 security realization
Identification and authentication mechanisms
 prospective architecture of HIP-agent;
 interaction of HIP-agent components.


Authorization and access control mechanisms
 smart space RDF-graph mapping to the VFS;
 intermediate solution of the graph mapping;
 implementation mechanism to the Smart-M3 platform.

                       FRUCT 12th            8 Nov 2012   7
Prospective architecture of HIP-agent
Identification and
authentication of the
client:
1. Client connection
   request to the SS;
2. Request intercepting by
   the HIP-agent;
3. Protocol-based HIP
   identification and
   authentication of the
   client.
                           FRUCT 12th   8 Nov 2012   8
Interaction of HIP-agent components
The process of             SIB                  HIP-agent             Client
connecting the client to
                                                      hash, SS, request
the space:
1. Transmission the client
   hash key to HIP-agent;
                                        hash valid?

2. Checking validity of the
   hash key;                            hash valid


3. Identification and                                 hash, SS, response


   authentication of the
   client;
4. Connection to the SS.
                           FRUCT 12th                   8 Nov 2012         9
Smart Space RDF-graph mapping
 information of SS is stored in a relational database, smart
 space database (SQLite);
 information of SS is presented in triple form (S, P, O);
 set of triples stored in specific database tables;
Solution: The virtual FS, that mapping information of SS
in a certain directory structure.




                         FRUCT 12th             8 Nov 2012   10
The updated directory structure of VFS
 provide more accuracy right to triplets (information)
 of the space;




                     FRUCT 12th          8 Nov 2012   11
The intermediate solution of the graph mapping

 Working with SS database: get all triples and save them
 in memory of data structure (SQLite):

    receiving all objects, subjects, predicates and their
    values;

 Creating a VFS directory structure based on the data:

    creating of virtual FS using FUSE technology (fusekit),
    setting permissions;




                       FRUCT 12th            8 Nov 2012   12
Implementation mechanism to the Smart-M3 platform

 modification of Smart-M3 platform piglet module:
    piglet proxy creation for new extensions;
    replacement of all smart space              database
    operations to mapping FS operations;
    determine and verify client access permissions;
 testing operations on the client side.




                      FRUCT 12th          8 Nov 2012   13
FRUCT 12th   8 Nov 2012   14
What was done?
analyzed and designed the HIP protocol-based
mechanism of identification and authentication;


the mechanism of authorization and SS subjects access
control by mapping RDF-graph to the virtual file system
is developed; mechanism tested in the Smart-M3
platform;


the implementation process of HIP-agent and mapping
mechanism to the Smart-M3 platform is started;

                     FRUCT 12th           8 Nov 2012   15
Future research and development
Main
 HIP-agent development;
 implementation   of   mapping      model   to   Smart-M3
 platform;
 set permissions tool development for mapping FS;

Additional
 named graph authorization system development;
 adding developed mechanisms to new version of Smart-
 M3 platform (Redland);

                       FRUCT 12th            8 Nov 2012   16
Questions & Answers


                          Kirill Yudenok, Kirill Krinkin
           {kirill.yudenok, kirill.krinkin}@gmail.com
                             Open Source & Linux Lab,
                   http://osll.fruct.org, osll@fruct.org
   FRUCT 12th, Oulu, November, 2012

More Related Content

PPTX
PhD Projects in MQTT Protocol Research Guidance
PDF
Pki and OpenSSL
DOCX
Identity based proxy-oriented data uploading and
PDF
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
PDF
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
PDF
Using Blockchain for Digital Identifiers. The case of LEI.
PDF
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
PPTX
Blockchain
PhD Projects in MQTT Protocol Research Guidance
Pki and OpenSSL
Identity based proxy-oriented data uploading and
BLOCKCHAIN-BASED SMART CONTRACTS : A SYSTEMATIC MAPPING STUDY
A SYSTEMATIC MAPPING STUDY ON CURRENT RESEARCH TOPICS IN SMART CONTRACTS
Using Blockchain for Digital Identifiers. The case of LEI.
Blockchain Essentials for Business Leaders - Value Propositions and Advantage...
Blockchain

Viewers also liked (20)

PPTX
Fruct14 sholokhova
PDF
Json protocol, Geo2tag REST API fundamentals
PDF
Doctor search service with Geo2tag, Bezyazychnyy, Krinkin
PPT
Governo rodrigues alves
PPT
Reinos africanos
PPTX
Detection pulse by video
PPT
A 1ª guerra mundial
PDF
Geo2tag performance evaluation, Zaslavsky, Krinkin
PDF
Catalogo de conceptos clinica.xlsx
PPT
O imperialismo definições
PPTX
PDF
Slidesharepresentation introphoto
PPT
A crise de 1929 prof nélia-2016
PPTX
Middle Ages primary level presentation
ODP
Lbs for transport monitoring based on geo2tag
Fruct14 sholokhova
Json protocol, Geo2tag REST API fundamentals
Doctor search service with Geo2tag, Bezyazychnyy, Krinkin
Governo rodrigues alves
Reinos africanos
Detection pulse by video
A 1ª guerra mundial
Geo2tag performance evaluation, Zaslavsky, Krinkin
Catalogo de conceptos clinica.xlsx
O imperialismo definições
Slidesharepresentation introphoto
A crise de 1929 prof nélia-2016
Middle Ages primary level presentation
Lbs for transport monitoring based on geo2tag
Ad

Similar to Smart-m3 Security Model (20)

PDF
Smart-m3 Security Demo (k. yudenok)
PDF
SOFIA - Cross domain interoperability Case Study
PDF
SOFIA - Cross Domain Interoperability Case Study. NOKIA
PDF
Meego Italian Day 2011 - Dr. Luca Roffia
PDF
Secure context-awareness in ubiquitous computing
PPT
BonFIRE TridentCom presentation
PDF
Security
PDF
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
PDF
M026075079
PDF
Moving Security Model From Content to Context
PDF
SOFIA - Smart M3 Information Sharing Platform - NOKIA
PDF
Early Lessons from Building Sensor.Network: An Open Data Exchange for the Web...
PDF
Pervasive Computing
PDF
MobiSys Group Presentation
PDF
New Trends in Web Security
PDF
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
PDF
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
PDF
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
PDF
Ieee projects 2012 for cse
PDF
Ieee projects 2012 for cse
Smart-m3 Security Demo (k. yudenok)
SOFIA - Cross domain interoperability Case Study
SOFIA - Cross Domain Interoperability Case Study. NOKIA
Meego Italian Day 2011 - Dr. Luca Roffia
Secure context-awareness in ubiquitous computing
BonFIRE TridentCom presentation
Security
CICS: Cloud–Internet Communication Security Framework for the Internet of Sma...
M026075079
Moving Security Model From Content to Context
SOFIA - Smart M3 Information Sharing Platform - NOKIA
Early Lessons from Building Sensor.Network: An Open Data Exchange for the Web...
Pervasive Computing
MobiSys Group Presentation
New Trends in Web Security
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
Algorithm Solved IEEE Projects 2012 2013 Java @ Seabirdssolutions
Ieee projects 2012 for cse
Ieee projects 2012 for cse
Ad

More from OSLL (20)

PDF
SLAM Constructor Framework for ROS
PDF
Студентам и не только. Как выступить с докладом по своей научной работе
PDF
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
PDF
MOOCs Virtual Lab in Modern Education
PDF
Работа с геоданными в MongoDb
PDF
Testing with Selenium
PDF
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
PDF
Microservice architecture for Geo2Tag
PDF
[MDBCI] Mariadb continuous integration tool
PDF
Block-level compression in Linux. Pro et contra
PDF
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
PDF
Обзор файловой системы GlusterFS
PDF
Обзор Btrfs
PDF
Обзор архитектуры [файловой] системы Ceph
PDF
Linuxvirt seminar-csc-2015
PDF
Обзор Linux Control Groups
PDF
Raspberry Pi robot with ROS
PDF
Пространства имен Linux (linux namespaces)
PDF
Кратчайшее введение в docker по-русски
PDF
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers
SLAM Constructor Framework for ROS
Студентам и не только. Как выступить с докладом по своей научной работе
Full Automated Continuous Integration and Testing Infrastructure for Maxscale...
MOOCs Virtual Lab in Modern Education
Работа с геоданными в MongoDb
Testing with Selenium
Implementation of the new REST API for Open Source LBS-platform Geo2Tag
Microservice architecture for Geo2Tag
[MDBCI] Mariadb continuous integration tool
Block-level compression in Linux. Pro et contra
Fast Artificial Landmark Detection for indoor mobile robots AIMAVIG'2015
Обзор файловой системы GlusterFS
Обзор Btrfs
Обзор архитектуры [файловой] системы Ceph
Linuxvirt seminar-csc-2015
Обзор Linux Control Groups
Raspberry Pi robot with ROS
Пространства имен Linux (linux namespaces)
Кратчайшее введение в docker по-русски
Virtual-HSM: Virtualization of Hardware Security Modules in Linux Containers

Recently uploaded (20)

PDF
Dynamic Checkweighers and Automatic Weighing Machine Solutions
PPT
Lines and angles cbse class 9 math chemistry
PPTX
Wireless and Mobile Backhaul Market.pptx
PPT
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
PPT
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
PPTX
Operating System Processes_Scheduler OSS
PPTX
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
PPTX
title _yeOPC_Poisoning_Presentation.pptx
PPTX
Fundamentals of Computer.pptx Computer BSC
PPTX
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
PPTX
Sem-8 project ppt fortvfvmat uyyjhuj.pptx
PPTX
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
PPTX
sdn_based_controller_for_mobile_network_traffic_management1.pptx
PPTX
Embedded for Artificial Intelligence 1.pptx
PPTX
quadraticequations-111211090004-phpapp02.pptx
PPT
Hypersensitivity Namisha1111111111-WPS.ppt
PDF
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
PPTX
Syllabus Computer Six class curriculum s
PPTX
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
PPTX
"Fundamentals of Digital Image Processing: A Visual Approach"
Dynamic Checkweighers and Automatic Weighing Machine Solutions
Lines and angles cbse class 9 math chemistry
Wireless and Mobile Backhaul Market.pptx
chapter_1_a.ppthduushshwhwbshshshsbbsbsbsbsh
FABRICATION OF MOS FET BJT DEVICES IN NANOMETER
Operating System Processes_Scheduler OSS
PROGRAMMING-QUARTER-2-PYTHON.pptxnsnsndn
title _yeOPC_Poisoning_Presentation.pptx
Fundamentals of Computer.pptx Computer BSC
5. MEASURE OF INTERIOR AND EXTERIOR- MATATAG CURRICULUM.pptx
Sem-8 project ppt fortvfvmat uyyjhuj.pptx
PLC ANALOGUE DONE BY KISMEC KULIM TD 5 .0
sdn_based_controller_for_mobile_network_traffic_management1.pptx
Embedded for Artificial Intelligence 1.pptx
quadraticequations-111211090004-phpapp02.pptx
Hypersensitivity Namisha1111111111-WPS.ppt
Layer23-Switch.com The Cisco Catalyst 9300 Series is Cisco’s flagship stackab...
Syllabus Computer Six class curriculum s
Presentacion compuuuuuuuuuuuuuuuuuuuuuuu
"Fundamentals of Digital Image Processing: A Visual Approach"

Smart-m3 Security Model

  • 1. Distributed service environment (smart spaces) security model development Kirill Yudenok, Kirill Krinkin FRUCT LETI Lab, Open Source & Linux Lab FRUCT 12th, Oulu, November, 2012
  • 2. Agenda Motivation; Goal and tasks; Current Smart-M3 security; Security model development; Smart-M3 security realization: HIP-agent; smart space RDF-graph mapping to the virtual file system (VFS); What was done? Future research and development; FRUCT 12th 8 Nov 2012 2
  • 3. Motivation access control mechanism for the smart space platform, for example Smart-M3; protection information mechanism of the space; research information security within the smart space area. FRUCT 12th 8 Nov 2012 3
  • 4. Goal and Tasks The project goal Development a security model for distributed service environment (smart spaces, SS), access control algorithms and test developed components as a part of the SS Smart-M3 platform; The main tasks of the project investigation of the basic security models and creation own security solutions; development a security model for Smart Spaces; modeling and development security model components for the Smart-M3 platform; testing developed components and algorithms within the Smart-M3 platform; FRUCT 12th 8 Nov 2012 4
  • 5. Smart-M3 security What do we have? access control at triple level [1]; context-based and access control policies; security objects as triple patterns; What do we want? identification and authentication mechanism of the SS subjects; authorization and access control mechanism of SS subjects; data privacy; [1] A.D’Elia, J.Honkola, D.Manzaroli, T.S.Cinotii – Access Control at Triple Level: Specification and Enforcement of a Simple RDF Model to Support Concurrent Applications in Smart Environments, 2011. FRUCT 12th 8 Nov 2012 5
  • 6. Security model development Identification and authentication of space subjects: HIP, PAM; Authorization and access control of space subjects: discretionary security model; smart space RDF-graph mapping to the virtual file system (VFS); named graphs; access control ontology; security extensions for smart space database. FRUCT 12th 8 Nov 2012 6
  • 7. Smart-M3 security realization Identification and authentication mechanisms prospective architecture of HIP-agent; interaction of HIP-agent components. Authorization and access control mechanisms smart space RDF-graph mapping to the VFS; intermediate solution of the graph mapping; implementation mechanism to the Smart-M3 platform. FRUCT 12th 8 Nov 2012 7
  • 8. Prospective architecture of HIP-agent Identification and authentication of the client: 1. Client connection request to the SS; 2. Request intercepting by the HIP-agent; 3. Protocol-based HIP identification and authentication of the client. FRUCT 12th 8 Nov 2012 8
  • 9. Interaction of HIP-agent components The process of SIB HIP-agent Client connecting the client to hash, SS, request the space: 1. Transmission the client hash key to HIP-agent; hash valid? 2. Checking validity of the hash key; hash valid 3. Identification and hash, SS, response authentication of the client; 4. Connection to the SS. FRUCT 12th 8 Nov 2012 9
  • 10. Smart Space RDF-graph mapping information of SS is stored in a relational database, smart space database (SQLite); information of SS is presented in triple form (S, P, O); set of triples stored in specific database tables; Solution: The virtual FS, that mapping information of SS in a certain directory structure. FRUCT 12th 8 Nov 2012 10
  • 11. The updated directory structure of VFS provide more accuracy right to triplets (information) of the space; FRUCT 12th 8 Nov 2012 11
  • 12. The intermediate solution of the graph mapping Working with SS database: get all triples and save them in memory of data structure (SQLite): receiving all objects, subjects, predicates and their values; Creating a VFS directory structure based on the data: creating of virtual FS using FUSE technology (fusekit), setting permissions; FRUCT 12th 8 Nov 2012 12
  • 13. Implementation mechanism to the Smart-M3 platform modification of Smart-M3 platform piglet module: piglet proxy creation for new extensions; replacement of all smart space database operations to mapping FS operations; determine and verify client access permissions; testing operations on the client side. FRUCT 12th 8 Nov 2012 13
  • 14. FRUCT 12th 8 Nov 2012 14
  • 15. What was done? analyzed and designed the HIP protocol-based mechanism of identification and authentication; the mechanism of authorization and SS subjects access control by mapping RDF-graph to the virtual file system is developed; mechanism tested in the Smart-M3 platform; the implementation process of HIP-agent and mapping mechanism to the Smart-M3 platform is started; FRUCT 12th 8 Nov 2012 15
  • 16. Future research and development Main HIP-agent development; implementation of mapping model to Smart-M3 platform; set permissions tool development for mapping FS; Additional named graph authorization system development; adding developed mechanisms to new version of Smart- M3 platform (Redland); FRUCT 12th 8 Nov 2012 16
  • 17. Questions & Answers Kirill Yudenok, Kirill Krinkin {kirill.yudenok, kirill.krinkin}@gmail.com Open Source & Linux Lab, http://osll.fruct.org, osll@fruct.org FRUCT 12th, Oulu, November, 2012