skip to main content
10.1145/3198458.3198459acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space

Published: 22 May 2018 Publication History

Abstract

The most recent and prominent advances in industrial computing include the growing interconnectivity of cyber-physical devices, as well as the increasing variety of complex applications exchanging data across company domains. In this context, the data becomes a valuable business asset and a trade good. The Industrial Data Space is a platform designed for the industry, allowing organizations the efficient data exchange and trade. The possibilities such platforms enable inevitably come along with new security risks regarding the establishment of trust, communication security, data usage control, or the integrity of participating systems. We define the key security requirements for the operation of such platforms in untrusted environments and present an overall security architecture for the whole ecosystem including the secure design and implementation of an architecture for the participating cyber-physical devices. On these devices, we allow for the controlled and isolated execution of services for application-specific gathering, processing and exchanging of data between organizations.

References

[1]
Fraunhofer AISEC. 2018. trustm3 is trust|me. (2018). https://github.com/trustm3. Accessed: 2018-03--17.
[2]
OSGi Alliance. 2018. Architecture. (2018). https://www.osgi.org/developer/architecture/. Accessed: 2018-03--17.
[3]
Jeremy Andrus, Christoffer Dall, Alexander Van't Hof, Oren Laadan, and Jason Nieh. 2011. Cells: A Virtual Mobile Smartphone Architecture. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP '11). ACM, New York, NY, USA, 173--187.
[4]
Industrial Data Space Association. 2018. IoT edge platform "Trusted Connector". (2018). https://github.com/industrial-data-space/trusted-connector. Accessed: 2018-03--17.
[5]
Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, and Andrew Warfield. 2003. Xen and the Art of Virtualization. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP '03). ACM, New York, NY, USA, 164--177.
[6]
D. Bernstein. 2014. Containers and Cloud: From LXC to Docker to Kubernetes. IEEE Cloud Computing 1, 3 (Sept 2014), 81--84.
[7]
A. Celesti, D. Mulfari, M. Fazio, M. Villari, and A. Puliafito. 2016. Exploring Container Virtualization in IoT Clouds. In IEEE International Conference on Smart Computing (SMARTCOMP). 1--6.
[8]
Wenzhi Chen, Lei Xu, Guoxi Li, and Yang Xiang. 2015. A Lightweight Virtualization Solution for Android Devices. In Computers, IEEE Trans. on, Vol. 64. 2741--2751.
[9]
OpenFog Consortium. 2018. OpenFog Reference Architecture. (2018). https://www.openfogconsortium.org/ra. Accessed: 2018-03--17.
[10]
Christoffer Dall and Jason Nieh. 2014. KVM/ARM: The Design and Implementation of the Linux ARM Hypervisor. In Proc. of the 19th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '14). ACM, New York, NY, USA, 333--348.
[11]
Google Developers. 2018. Protocol Buffers - Google's data interchange format. (2018). https://github.com/google/protobuf. Accessed: 2018-03--17.
[12]
Maria Fazio, Antonio Celesti, and Massimo Villari. 2013. Design of a Message-Oriented Middleware for Cooperating Clouds. Springer Berlin Heidelberg, Berlin, Heidelberg, 25--36.
[13]
W. Felter, A. Ferreira, R. Rajamony, and J. Rubio. 2015. An Updated Performance Comparison of Virtual Machines and Linux Containers. In 2015 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). 171--172.
[14]
David Ferraiolo, Janet Cugini, and D Richard Kuhn. 1995. Role-Based Access Control (RBAC): Features and Motivations. In Proceedings of 11th annual computer security application conference. 241--48.
[15]
Wolfgang Gerlach, Wei Tang, Kevin Keegan, Travis Harrison, Andreas Wilke, Jared Bischof, Mark D'Souza, Scott Devoid, Daniel Murphy-Olson, Narayan Desai, and Folker Meyer. 2014. Skyport: Container-based Execution Environment Management for Multi-cloud Scientific Workflows. In Proceedings of the 5th International Workshop on Data-Intensive Computing in the Clouds (DataCloud '14). IEEE Press, Piscataway, NJ, USA, 25--32.
[16]
Ken Goldman. 2018. IBM's TPM 2.0 TSS. (2018). https://sourceforge.net/projects/ibmtpm20tss/. Accessed: 2018-03--17.
[17]
M. Harvan and A. Pretschner. 2009. State-Based Usage Control Enforcement with Data Flow Tracking using System Call Interposition. In Network and System Security, 2009. NSS '09. Third International Conference on. 373--380.
[18]
Manuel Huber, Julian Horsch, Michael Velten, Michael Weiss, and Sascha Wessel. 2016. A Secure Architecture for Operating System-Level Virtualization on Mobile Devices. In Revised Selected Papers of the 11th International Conference on Information Security and Cryptology - Volume 9589 (Inscrypt 2015). Springer-Verlag New York, Inc., New York, NY, USA, 430--450.
[19]
Joo-Young Hwang, Sang bum Suh, Sung-Kwan Heo, Chan-Ju Park, Jae-Min Ryu, Seong-Yeol Park, and Chul-Ryun Kim. 2008. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM- Based Secure Mobile Phones. In Consumer Communications and Networking Conference, 2008. CCNC 2008. 5th IEEE. 257--261.
[20]
Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, and Jean-Pierre Seifert. 2008. A General Obligation Model and Continuity: Enhanced Policy Enforcement Engine for Usage Control. In Proceedings of the 13th ACM symposium on Access control models and technologies. ACM, 123--132.
[21]
K. Kaur, T. Dhand, N. Kumar, and S. Zeadally. 2017. Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers. IEEE Wireless Communications 24, 3 (June 2017), 48--56.
[22]
Dirk Merkel. 2014. Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal 239 (2014).
[23]
Davide Mulfari, Maria Fazio, Antonio Celesti, Massimo Villari, and Antonio Puliafito. 2016. Design of an IoT Cloud System for Container Virtualization on Smart Objects. Springer International Publishing, Cham, 33--47.
[24]
Andrew C. Myers and Barbara Liskov. 1997. A Decentralized Model for Information Flow Control. In Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles (SOSP '97). ACM, New York, NY, USA, 129--142.
[25]
B Otto, S Auer, J Cirullies, J Jürjens, N Menz, J Schon, and S Wenzel. 2016. Industrial Data Space: Digital Sovereignity over Data. Whitepaper, Fraunhofer-Gesellschaft, Munich (2016).
[26]
B Otto, S Lohmann, S Auer, G Brost, J Cirullies, A Eitel, T Ernst, C Haas, M Huber, C Jung, et al. 2017. Reference Architecture Model for the Industrial Data Space. Fraunhofer-Gesellschaft, Munich (2017).
[27]
C. Pahl and B. Lee. 2015. Containers and Clusters for Edge Cloud Architectures -- A Technology Review. In 2015 3rd International Conference on Future Internet of Things and Cloud. 379--386.
[28]
Jaehong Park and Ravi Sandhu. 2002. Towards Usage Control Models: Beyond Traditional Access Control. In Proceedings of the seventh ACM symposium on Access control models and technologies. ACM, 57--64.
[29]
Jaehong Park and Ravi Sandhu. 2004. The UCON ABC Usage Control Model. ACM Transactions on Information and System Security (TISSEC) 7, 1 (2004), 128--174.
[30]
Thomas F. J.-M. Pasquier, Jatinder Singh, David M. Eyers, and Jean Bacon. 2015. CamFlow: Managed Data-sharing for Cloud Services. CoRR abs/1506.04391 (2015).
[31]
René Peinl, Florian Holzschuher, and Florian Pfitzer. 2016. Docker Cluster Management for the Cloud - Survey Results and Own Solution. Journal of Grid Computing 14, 2 (2016), 265--282.
[32]
Sándor Plósz, Csaba Heged's, and Pál Varga. 2016. Advanced Security Considerations in the Arrowhead Framework. In International Conference on Computer Safety, Reliability, and Security. Springer, 234--245.
[33]
Alexander Pretschner, Matthias Büchler, Matus Harvan, Christian Schaefer, and Thomas Walter. 2009. Usage Control Enforcement with Data Flow Tracking for X11. In Proc. 5th Intl. Workshop on Security and Trust Management. 124--137.
[34]
Alexander Pretschner, Manuel Hilty, and David Basin. 2006. Distributed Usage Control. Commun. ACM 49, 9 (2006), 39--44.
[35]
resin.io. 2018. resinOS - Introduction. (2018). https://resinos.io/docs/. Accessed: 2018-03--17.
[36]
Otavio Salvador and Daiane Angolini. 2014. Embedded Linux Development with Yocto Project. Packt Publishing Ltd.
[37]
Ravi Sandhu. 1993. Lattice-based Access Control Models. Computer 26, 11 (1993), 9--19.
[38]
Ravi Sandhu, Edward J Coyne, Hal L Feinstein, and Charles E Youman. 1996. Role-based access control models. Computer 29, 2 (1996), 38--47.
[39]
Ravi Sandhu and Pierangela Samarati. 1994. Access Control: Principles and Practice. IEEE communications magazine 32, 9 (1994), 40--48.
[40]
Julian Schütte and Gerd Stefan Brost. 2016. A Data Usage Control System using Dynamic Taint Tracking. In Proceedings of the International Conference on Advanced Information Network and Applications (AINA).
[41]
Kyoung-Taek Seo, Hyun-Seo Hwang, Il-Young Moon, Oh-Young Kwon, and Byeong-Jun Kim. 2014. Performance Comparison Analysis of Linux Container and Virtual Machine for Building Cloud. In Conference: Networking and Communication 2014. 105--111.
[42]
HongHai Shen and Prasun Dewan. 1992. Access Control for Collaborative Environments. In Proceedings of the 1992 ACM conference on Computer-supported cooperative work. ACM, 51--58.
[43]
Steffen Wagner, Sergej Proskurin, and Tamas Bakos. 2018. TPM 2.0 Simulator Extraction Script. (2018). https://github.com/stwagnr/tpm2simulator. Accessed: 2018-03--17.
[44]
Sascha Wessel, Manuel Huber, Frederic Stumpf, and Claudia Eckert. 2015. Improving Mobile Device Security with Operating System-Level Virtualization. In Computers &Security.
[45]
Wind River Systems, Inc. 2016. White Paper: Linux Containers - Where Enterprise Meets Embedded Operating Environments. Technical Report. http://events.windriver.com/wrcd01/wrcm/2016/10/WP-Pulsar-Linux-Containers.pdf
[46]
Chiachih Wu, Yajin Zhou, Kunal Patel, Zhenkai Liang, and Xuxian Jiang. 2014. Airbag: Boosting Smartphone Resistance to Malware Infection. In Proceedings of the Network and Distributed System Security Symposium.
[47]
Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park. 2005. Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security (TISSEC) 8, 4 (2005), 351--387.
[48]
Xinwen Zhang, Jean-Pierre Seifert, and Ravi Sandhu. 2008. Security Enforcement Model for Distributed Usage Control. In Sensor Networks, Ubiquitous and Trustworthy Computing, 2008. SUTC'08. IEEE International Conference on. IEEE, 10--18.

Cited By

View all

Index Terms

  1. An Ecosystem and IoT Device Architecture for Building Trust in the Industrial Data Space

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CPSS '18: Proceedings of the 4th ACM Workshop on Cyber-Physical System Security
        May 2018
        79 pages
        ISBN:9781450357555
        DOI:10.1145/3198458
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 May 2018

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. IoT platform security
        2. data exchange platform
        3. industrial data space
        4. trust ecosystem &management
        5. usage control

        Qualifiers

        • Research-article

        Conference

        ASIA CCS '18
        Sponsor:

        Acceptance Rates

        CPSS '18 Paper Acceptance Rate 6 of 24 submissions, 25%;
        Overall Acceptance Rate 43 of 135 submissions, 32%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)56
        • Downloads (Last 6 weeks)9
        Reflects downloads up to 05 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media