skip to main content
10.1145/2797433.2797451acmotherconferencesArticle/Chapter ViewAbstractPublication PagesecsawConference Proceedingsconference-collections
short-paper

Security and Trust in Data Sharing Smart Cyber-Physical Systems

Published: 07 September 2015 Publication History

Abstract

Security and trust plays an important role in Smart Cyber-Physical Systems (sCPS), which are formed as open and large collections of autonomous context- and self-aware adaptive components that dynamically group themselves and cooperate (all in a rather decentralized manner). Such a high level of dynamicity, open-endedness and context-dependence however makes existing approaches to security and trust in distributed systems not fully suitable (typically being too static and not able to cope with decentralization). In this paper we introduce the concepts of context-dependent security and trust defined at the architecture level of sCPS. Contrary to traditional approaches, our solution allows components to adapt their security clearance according to their context (i.e. their state and the surrounding environment), while preserving high level security policies. We further define the interplay of security and trust in sCPS and show their interrelation as an important ingredient in achieving security in systems of adaptive autonomous components.

References

[1]
Ferraiolo, D. F. and Kuhn, D. R. Role-Based Access Controls. In 15th National Computer Security Conference (NCSC, 1992), pp. 554--563.
[2]
Clark, D. D. and Wilson, D. R. A Comparison of Commercial and Military Computer Security Policies. IEEE, 1987.
[3]
Bures, T., Gerostathopoulos, I., Hnetynka, P., Keznikl, J., Kit, M., Plasil, F. DEECo -- an Ensemble-Based Component System. In Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering (CBSE '13). ACM, New York, NY, USA, 81--90.
[4]
Freudenthal, E., Pesin, T., Port, L., Keenan, E., Karamcheti, V. dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments. Proceedings of ICDCS 2002.
[5]
Ninghui, Li and Mitchell, J. C. RT: A Role-based Trust-management Framework. In DARPA Information Survivability Conference and Exposition, 2003, pp.201--212 vol.1, 22--24 April 2003.
[6]
Venkatasubramanian, K. K. Security Solutions for Cyber-Physical Systems. Arizona State University, 2009.
[7]
Yao, W. Trust management for widely distributed systems. University of Cambridge, 2008. ISSN 1476-2986.
[8]
Sandhu, S. R., Coyne, E. J., Feinstein, H. L., Youman, C. E. Role-Based Access Control Models. In IEEE Computer, vol. 29, nr. 2, February 1996, pp. 38--47.
[9]
Shelby, Z., Hartke, K., Bormann, C. Constrained Application Protocol (CoAP). IETF, 2013, ISSN: 2070-1721.
[10]
Hernández-Ramos, J. L., et al. Distributed Capability-based Access Control for the Internet of Things. Journal of Internet Services and Information Security (JISIS), volume: 3, number: 3/4, pp. 1--16.
[11]
Blaze, M., Feigenbaum J., Ioannidis, J., Keromytis A. D. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming, pp. 185--210, Springer-Verlag, 1999.
[12]
Yuan, E., and Tong, J. Attributed Based Access Control (ABAC) for Web Services. In Proceedings of ICWS 2005.
[13]
Steiner, J. G., Neuman, C. and Schiller, J. I. Kerberos: An authentication service for open network systems. USENIX Association, 1988.
[14]
De Nicola, R., Loreti, M., Pugliese, R., Tiezzi, F. A Formal Approach to Autonomic Systems Programming: The SCEL Language. ACM 2014.
[15]
Wuille, P. BIP32: Hierarchical Deterministic Wallets. February 2012, https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki.
[16]
Castiglione, A., Santis, A. D., Masucci, B. Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes, IACR Cryptology ePrint Archive, Report 2014/752, 2014

Cited By

View all
  • (2025)Trust and Trust-Building Policies to Support Cybersecurity Information Sharing: A Systematic Literature ReviewEconomics of Grids, Clouds, Systems, and Services10.1007/978-3-031-81226-2_19(212-228)Online publication date: 6-Feb-2025

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ECSAW '15: Proceedings of the 2015 European Conference on Software Architecture Workshops
September 2015
364 pages
ISBN:9781450333931
DOI:10.1145/2797433
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Smart cyber-physical systems
  2. architecture
  3. security
  4. trust

Qualifiers

  • Short-paper
  • Research
  • Refereed limited

Funding Sources

Conference

ECSAW '15
ECSAW '15: 2015 European Conference on Software Architecture Workshops
September 7 - 11, 2015
Cavtat, Dubrovnik, Croatia

Acceptance Rates

ECSAW '15 Paper Acceptance Rate 51 of 77 submissions, 66%;
Overall Acceptance Rate 80 of 120 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Trust and Trust-Building Policies to Support Cybersecurity Information Sharing: A Systematic Literature ReviewEconomics of Grids, Clouds, Systems, and Services10.1007/978-3-031-81226-2_19(212-228)Online publication date: 6-Feb-2025

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media