19
Daniel Schreckling University of Passau 1 st W3C WoT IG F2F Open Day – April 20, 2015 Securing the Web of Things A COMPOSE Perspective

SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

Daniel  Schreckling    University  of  Passau  

1st  W3C  WoT  IG  F2F  Open  Day  –  April  20,  2015

Securing  the  Web  of  Things  A  COMPOSE  Perspective  

Page 2: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

High-­‐Level  COMPOSE  Architecture

April  20,  2015 2

Page 3: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Main  Design  Decision

▪ The  situation  •Changing  use  and  types  of  principals  and  data  •Unpredictable  interactions  &  information  flows  • Security  is  application  dependent:  Applications  require    − specific  security  mechanisms    at    − specific  “locations”  

• Inflexible,  resource-­‐centric  security  frameworks  

▪COMPOSE  approach  • Shrink  security  perimeter  to  the  granularity  of  data  •Build  flexible,  data-­‐centric  but  scalable  security  framework

April  20,  2015 3

Page 4: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Identity  Management

▪Attribute-­‐based  •Entities  associated  with  set  of  attributes  •Attributes    − Describe  properties  − Fixed  or  user-­‐defined  but  approved  − Defined  decentralized  

▪ Lightweight  •Partial  replication  of  OAuth  (access  tokens)  •Use  of  API  tokens  for  highly  frequent  interactions  ▪ Flat  entity  hierarchies

April  20,  2015 4

Page 5: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Security  Meta  Data  for  Virtual  Things

April  20,  2015 5

Weather

• Security  Association  • Policies  • Reputation

http://www.servioticy.com

Page 6: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

Data  and  Services

6

Weather

Weather forecast Service

• Flow  Policies  • Security  State  • Provenance  

• Security  Association  • Policies  • Reputation  • Contracts

http://www.gluethings.com

Page 7: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

Flow  Policies  for  Data

▪ Tagged  to  data  (JSON  document)  

▪Defined  over  actors  and  their  attributes  ▪ Flow-­‐to-­‐rule       Lock1(a1,  a2,  …  ,  aq)  ,  Lock2(b1,  b2,  …,  br),  …  Locki(z1,  z2,  …,  zt)  !  A  

▪ Flow-­‐from-­‐rule       A  ! Lock1(a1,  a2,  …  ,  aq)  ,  Lock2(b1,  b2,  …,  br),  …  Locki(z1,  z2,  …,  zt)  

▪ Set  of  rules  form  policies

20  April  2015 7

Data  Item

U ! owner(U), validated, atWork(U),

authenticated(U)

Page 8: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Data-­‐Centric  Entity  Policies

20  April  2015 8

Device/Service  S

in  1 in  2

out  1

Flow-Control: S ! actsOnBehalf(S, U)

Flow-Control: owned(S, U) ! S

Access Control: U ! authenticated(U), minBalance(U, 1.5 Cent)

S ! minTrustLevel(S, 5)

Page 9: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Contracts

▪ Promises  towards  the  platform  • Automatically  generated  • Over-­‐approximated  service  behaviour  

▪ Developer  Contracts  • are  user-­‐defined  refinements  • Impact  

− Performance  − Trust  in  Developers

April  20,  2015 9

Service

in  1 in  2

out  1

Flow  description:

length(in2)<=8!out 1

Pre-­‐Condition: Encrypted

Resource  X

Resource  Z

delete

Effect: Encrypted(“/etc/*”)hasName(“/etc/passwd”)

Page 10: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

User  Deployed  Services/Applications

April  20,  2015 10

Weather

Location

Weather forecast Service

Places to meet your friends Service

Page 11: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

User  Deployed  Services

April  20,  2015 11

Weather

Location

Weather forecast Service

Places to meet your friends Service

Fun things to do Service

Page 12: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Security  Conflicts

April  20,  2015 12

Weather

Location

Weather forecast Service

Places to meet your friends Service

Fun things to do Service

Framework  detects  flows  with  conflicting  constraints  

➔Resolution  using  user,  instrumentation  and/or  dynamic  monitors

Page 13: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

JSFlow*

JSFlow*

JSFlow*

Dynamic  Flow  Control

13

Weather

Location

Places to meet your friends Service

Fun things to do Service

Weather forecast Service

Page 14: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Flow  Policies

Static  Flow  Control

April  20,  2015 14

Composition  AnalysisComposition  

Reconfiguration

Instrumentation    (Dynamic  Enforcement,  Provenance,  Reputation)

glue.things

User  Feedback

Composition  creation

Policy  Settings

Composition  Recommendation

Node/Service  Analysis  (enhanced  TAJS,  Klee) Contracts

Page 15: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

JSFlow*

JSFlow*

JSFlow*

Hybrid  Flow  Control

April  20,  2015 15

Weather

Location

Weather forecast Service

Places to meet your friends Service

Fun things to do Service

Page 16: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Hybrid  Flow  Control

April  20,  2015 16

Weather

Location

Weather forecast Service

Places to meet your friends Service

Fun things to do Service

Declassifier

ProvenanceReputation

Page 17: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Hybrid  Flow  Control

April  20,  2015 17

Weather

Location

Weather forecast Service

Places to meet your friends Service

Fun things to do Service

Declassifier

ProvenanceReputation

Page 18: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Limitations  …

▪ Security  of  physical  devices  •Authentication  •Tamper-­‐proof  • Interface/Firmware  security  

▪Data  confidentiality  &  integrity  •Effective  Perimeter  remains  at  cloud  level  •Privacy  vs.  Security  •Use  of  existing  technologies  ▪Analysis  tools  and  instrumentation  

• Low  language  coverage    •Efficiency  vs.  false  positive  rates

April  20,  2015 18

Page 19: SecuringtheWebofThings - World Wide Web Consortium · Flow’ Policies Static)Flow)Control April)20,)2015 14 Composition’Analysis Composition’ Reconfiguration Instrumentation’’

COMPOSE  Consortium

Conclusions

The  COMPOSE  way  of  WoT  …    

▪ Introduces  required  control  for  the  open  IoT  ▪ Shows  that  flow  control  frameworks  appear  to  be  a  perfect  match  

▪ Creates  new  dimensions  for  policy  enforcement  

BUT  …    

▪ Induces  storage  and  processing  overhead  ▪ Dynamic  security  enforcement  architectures  

➔ Does  the  WoT  want  to  face  this  fine  granularity?

20  April  2015 19