1 / 11

Security Requirements in Service Oriented Architectures for Ubiquitous Computing

Security Requirements in Service Oriented Architectures for Ubiquitous Computing. Almerindo Graziano, Domenico Cotroneo, Stefano Russo agrazian@unina.it MobiLab Research Group Università degli studi di Napoli “Federico II”. Outline. Motivation Addressing Ubiquitous Security

rance
Télécharger la présentation

Security Requirements in Service Oriented Architectures for Ubiquitous Computing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Requirements in Service Oriented Architectures for Ubiquitous Computing Almerindo Graziano, Domenico Cotroneo, Stefano Russo agrazian@unina.it MobiLab Research Group Università degli studi di Napoli “Federico II”

  2. Outline • Motivation • Addressing Ubiquitous Security • The Story So Far • Security Requirements • Evaluation • Conclusions

  3. Service Oriented Architectures • Established computing paradigm • A SOA is based upon • Service definition • Service Discovery and Delivery • SOAs have evolved from the Internet model • Different service definitions • Different discovery/delivery protocols • Problems • Interoperability and standardization • Security

  4. Addressing Ubiquitous Security • Wireless security • Widely addressed • Security of SOAs in ubiquitous computing • Not widely addressed (often just an afterthought) • Not addressed consistently • No security requirements analysis • Stronger Interoperability problems

  5. Standard Protocols Bluetooth Jini Salutation UPnP SLP JXTA Integrated Architectures SSDS Centaurus Proxy-based protocols Ongoing research Splendor The Story So Far

  6. Secure service registration/deregistration Example: DoS attacks Secure Discovery (service records) Authenticated Authorized Confidential Genuine Anonymous Secure Delivery Authenticated Authorized Confidential Genuine Anonymous Application Security Availability Security Requirements

  7. Evaluation Results

  8. Genuine discovery and delivery are underestimated Achieved partially or not at all Service (de)registration is assumed trusted No architecture addresses security in service definition Application security often out of scope Different access control models ACLs or Capabilities Different granularity User or Devices Location of the PDP Local by the device or remote by a resource manager Different trust models Evaluation

  9. Conclusions • Not possible to address all security requirements • Total security does not exist • Limited resources • Need to use threat models (mobile adversary and mobile victims) • Security requirements driven by use cases • Abuse cases can help model the threats • Use risk assessment to rationalize security issues • Secure interoperability still a challenge • Trust models, access control, authorization management

  10. Ongoing Work • Complete evaluation work to include • Access control models, trust models, authorization management • Design of a Secure SOA for Nomadic Computing • Use/Misuse cases for threat analysis • Threat modelling and design with UMLsec • Validation with UMLsec

  11. Thanks for Your Attention

More Related