LUCON: Data Flow Control for Message-Based IoT Systems

05/14/2018
by   Julian Schütte, et al.
0

Today's emerging Industrial Internet of Things (IIoT) scenarios are characterized by the exchange of data between services across enterprises. Traditional access and usage control mechanisms are only able to determine if data may be used by a subject, but lack an understanding of how it may be used. The ability to control the way how data is processed is however crucial for enterprises to guarantee (and provide evidence of) compliant processing of critical data, as well as for users who need to control if their private data may be analyzed or linked with additional information - a major concern in IoT applications processing personal information. In this paper, we introduce LUCON, a data-centric security policy framework for distributed systems that considers data flows by controlling how messages may be routed across services and how they are combined and processed. LUCON policies prevent information leaks, bind data usage to obligations, and enforce data flows across services. Policy enforcement is based on a dynamic taint analysis at runtime and an upfront static verification of message routes against policies. We discuss the semantics of these two complementing enforcement models and illustrate how LUCON policies are compiled from a simple policy language into a first-order logic representation. We demonstrate the practical application of LUCON in a real-world IoT middleware and discuss its integration into Apache Camel. Finally, we evaluate the runtime impact of LUCON and discuss performance and scalability aspects.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/09/2023

Integrating Usage Control into Distributed Ledger Technology for Internet of Things Privacy

The Internet of Things brings new ways to collect privacy-sensitive data...
research
10/17/2019

PFirewall: Semantics-Aware Customizable Data Flow Control for Home Automation Systems

Emerging Internet of Thing (IoT) platforms provide a convenient solution...
research
07/26/2017

Confidentiality enforcement by hybrid control of information flows

An information owner, possessing diverse data sources, might want to off...
research
06/27/2019

An Empirical Study of Information Flows in Real-World JavaScript

Information flow analysis prevents secret or untrusted data from flowing...
research
04/21/2020

CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices

The microservices architectural approach has important benefits regardin...
research
01/06/2020

GeoBroker: Leveraging Geo-Contexts for IoT Data Distribution

In the Internet of Things, the relevance of data often depends on the ge...

Please sign up or login with your details

Forgot password? Click here to reset