Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services

作者: Flora Amato , Valentina Casola , Giovanni Cozzolino , Alessandra De Benedictis , Francesco Moscato

DOI: 10.1109/JIOT.2019.2960316

关键词:

摘要: Internet of Things (IoT) ecosystems are recently experiencing a significant growth in complexity. Most IoT applications domains like healthcare, industry, automotive, and smart energy composed several interconnected subsystems that produce, collect, process, exchange huge amount data, offer composite services to the end users based on these data. This scenario is exacerbated by dynamism device layer, which may be subject structural or technological changes over time, cope for example with need new sensing/actuation capabilities requirements technical issues. Due inherent sensitive nature data typically processed applications, security represents one primary issues address. It worth noting each subsystem integrated within application have different enforce local policies, policies result globally enforced at system level not comply existing global requirements. In general, analysis validation properties very complex task, made even more introduction laws regulations during life. To above issues, this article, we propose methodology leverages both workflow languages semantics order enable features offered system, goal verifying whether they match end-user national international rules.

参考文章(19)
Brahim Medjahed, Zaki Malik, Salima Benbernou, On the Composability of Semantic Web Services Web Services Foundations. pp. 137- 160 ,(2014) , 10.1007/978-1-4614-7518-7_6
David Martin, Mark Burstein, Drew McDermott, Sheila McIlraith, Massimo Paolucci, Katia Sycara, Deborah L. McGuinness, Evren Sirin, Naveen Srinivasan, Bringing Semantics to Web Services with OWL-S World Wide Web. ,vol. 10, pp. 243- 277 ,(2007) , 10.1007/S11280-007-0033-X
Massimiliano Rak, Neeraj Suri, Jesus Luna, Dana Petcu, Valentina Casola, Umberto Villano, Security as a Service Using an SLA-Based Approach via SPECS 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. ,vol. 2, pp. 1- 6 ,(2013) , 10.1109/CLOUDCOM.2013.165
Giusy Di Lorenzo, Nicola Mazzocca, Francesco Moscato, Valeria Vittorini, Towards Semantics Driven Generation of Executable Web Services Compositions Journal of Software. ,vol. 2, pp. 1- 15 ,(2007) , 10.4304/JSW.2.5.1-15
Amy Wesolowski, Caroline O. Buckee, Linus Bengtsson, Erik Wetter, Xin Lu, Andrew J. Tatem, Commentary: containing the ebola outbreak - the potential and challenge of mobile network data. PLOS Currents. ,vol. 6, ,(2014) , 10.1371/CURRENTS.OUTBREAKS.0177E7FCF52217B8B634376E2F3EFC5E
Angel Lagares Lemos, Florian Daniel, Boualem Benatallah, Web Service Composition ACM Computing Surveys. ,vol. 48, pp. 1- 41 ,(2016) , 10.1145/2831270
Valentina Casola, Alessandra De Benedictis, Madalina Erascu, Jolanda Modic, Massimiliano Rak, Automatically Enforcing Security SLAs in the Cloud IEEE Transactions on Services Computing. ,vol. 10, pp. 741- 755 ,(2017) , 10.1109/TSC.2016.2540630
Jatinder Singh, Thomas Pasquier, Jean Bacon, Julia Powles, Raluca Diaconu, David Eyers, Big ideas paper: Policy-driven middleware for a legally-compliant Internet of Things international middleware conference. pp. 13- ,(2016) , 10.1145/2988336.2988349
Natalia Miloslavskaya, Alexander Tolstoy, Big Data, Fast Data and Data Lake Concepts Procedia Computer Science. ,vol. 88, pp. 300- 305 ,(2016) , 10.1016/J.PROCS.2016.07.439
Muhammad Asim, Artsiom Yautsiukhin, Achim D. Brucker, Thar Baker, Qi Shi, Brett Lempereur, Security policy monitoring of BPMN-based service compositions Journal of Software: Evolution and Process. ,vol. 30, ,(2018) , 10.1002/SMR.1944