Internet of Things (IoT) ecosystems are recently experiencing a significant growth in complexity. Most IoT applications in domains like healthcare, industry, automotive, and smart energy are composed of several interconnected subsystems that produce, collect, process, and exchange a huge amount of data, and that offer composite services to the end users based on these data. This scenario is exacerbated by the dynamism of the IoT device layer, which may be subject to structural or technological changes over time, to cope for example with the need for new sensing/actuation capabilities requirements or with technical issues. Due to the inherent sensitive nature of the data that is typically processed by IoT applications, security represents one of the primary issues to address. It is worth noting that each subsystem integrated within a composite IoT application may have different requirements and enforce different local security policies, and the policies that result globally enforced at the system level may not comply with the existing global requirements. In general, the analysis and validation of security properties in a composite IoT system represents a very complex task, made even more complex by the introduction of new laws and regulations during system life. To cope with the above issues, in this article, we propose a methodology that leverages both workflow languages and semantics in order to enable the validation of the security features offered by a composite IoT system, with the goal of verifying whether they match with global end-user policies and even with national and international laws and rules.

Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services / Amato, Flora; Casola, Valentina; Cozzolino, Giovanni; De Benedictis, Alessandra; Moscato, Francesco. - In: IEEE INTERNET OF THINGS JOURNAL. - ISSN 2327-4662. - 7:5(2020), pp. 4655-4665. [10.1109/JIOT.2019.2960316]

Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services

Amato, Flora;Casola, Valentina;Cozzolino, Giovanni;De Benedictis, Alessandra;
2020

Abstract

Internet of Things (IoT) ecosystems are recently experiencing a significant growth in complexity. Most IoT applications in domains like healthcare, industry, automotive, and smart energy are composed of several interconnected subsystems that produce, collect, process, and exchange a huge amount of data, and that offer composite services to the end users based on these data. This scenario is exacerbated by the dynamism of the IoT device layer, which may be subject to structural or technological changes over time, to cope for example with the need for new sensing/actuation capabilities requirements or with technical issues. Due to the inherent sensitive nature of the data that is typically processed by IoT applications, security represents one of the primary issues to address. It is worth noting that each subsystem integrated within a composite IoT application may have different requirements and enforce different local security policies, and the policies that result globally enforced at the system level may not comply with the existing global requirements. In general, the analysis and validation of security properties in a composite IoT system represents a very complex task, made even more complex by the introduction of new laws and regulations during system life. To cope with the above issues, in this article, we propose a methodology that leverages both workflow languages and semantics in order to enable the validation of the security features offered by a composite IoT system, with the goal of verifying whether they match with global end-user policies and even with national and international laws and rules.
2020
Exploiting Workflow Languages and Semantics for Validation of Security Policies in IoT Composite Services / Amato, Flora; Casola, Valentina; Cozzolino, Giovanni; De Benedictis, Alessandra; Moscato, Francesco. - In: IEEE INTERNET OF THINGS JOURNAL. - ISSN 2327-4662. - 7:5(2020), pp. 4655-4665. [10.1109/JIOT.2019.2960316]
File in questo prodotto:
File Dimensione Formato  
Exploiting.pdf

solo utenti autorizzati

Tipologia: Documento in Post-print
Licenza: Accesso privato/ristretto
Dimensione 3.06 MB
Formato Adobe PDF
3.06 MB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11588/780814
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 14
  • ???jsp.display-item.citation.isi??? 8
social impact