Exploiting If This Then That and Usage Control obligations for Smart Home security and management

被引:2
|
作者
Giorgi, Giacomo [1 ]
La Marra, Antonio [2 ]
Martinelli, Fabio [1 ]
Mori, Paolo [1 ]
Rizos, Athanasios [3 ]
Saracino, Andrea [1 ]
机构
[1] CNR, Ist Informat & Telemat, Via G Moruzzi 1, I-56124 Pisa, Italy
[2] Secur Forge Srl, Pisa, Italy
[3] Univ Pisa, Dept Comp Sci, Pisa, Italy
来源
关键词
access control; deep learning; IFTTT; parental control; Usage Control;
D O I
10.1002/cpe.6189
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Development of Voice Control and Home Security for Smart Home Automation
    Abidi, M. Ebrahim
    Asnawi, Ani Liza
    Azmin, N. F. M.
    Jusoh, A. Z.
    Ibrahim, S. Noorjannah
    Ramli, Huda Adibah Mohd
    Malek, Norun Abdul
    PROCEEDINGS OF THE 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2018, : 246 - 251
  • [2] IoT Based Smart Home for Power & Security Management
    Namdeo, Deokar Shital
    Pawar, V. R.
    2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL SYSTEMS (ICICCS), 2017, : 477 - 481
  • [3] RETRACTED ARTICLE: Security management in smart home environment
    L. Mary Gladence
    V. Maria Anu
    S. Revathy
    P. Jeyanthi
    Soft Computing, 2023, 27 : 1209 - 1209
  • [4] On Usage Control in Relational Database Management Systems Obligations and Their Enforcement in Joining Datasets
    Bargh, Mortaza S.
    Vink, Marco
    Choenni, Sunil
    ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 190 - 201
  • [5] Cyber security framework for smart home energy management systems
    Alkatheiri, Mohammed Saeed
    Alqarni, Mohammed A.
    Chauhdary, Sajjad Hussain
    SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 46
  • [6] RETRACTED: Security management in smart home environment (Retracted Article)
    Gladence, L. Mary
    Anu, V. Maria
    Revathy, S.
    Jeyanthi, P.
    SOFT COMPUTING, 2023, 27 (02) : 1209 - 1209
  • [7] Exploiting Affordances in Monitoring a Smart Home
    Barnes, D'Ante
    Simons, Kellik
    Miller, Abram
    Oludoyi, A. Jacob
    Askew, Jayson
    Esterline, Albert
    Mason, Janelle
    2019 IEEE SOUTHEASTCON, 2019,
  • [8] Implementing Usage Control in Internet of Things: A Smart Home Use Case
    La Marra, Antonio
    Martinelli, Fabio
    Mori, Paolo
    Saracino, Andrea
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1056 - 1063
  • [9] A framework to enforce access control, usage control and obligations
    Sans, Thierry
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2007, 62 (11-12): : 1329 - 1352
  • [10] On Using Obligations for Usage Control in Joining of Datasets
    Bargh, Mortaza S.
    Vink, Marco
    Choenni, Sunil
    INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 173 - 196