Object security In web of things t pt JOHN MATTSSON GRAN SELANDER - - PowerPoint PPT Presentation

object security
SMART_READER_LITE
LIVE PREVIEW

Object security In web of things t pt JOHN MATTSSON GRAN SELANDER - - PowerPoint PPT Presentation

44 pt Object security In web of things t pt JOHN MATTSSON GRAN SELANDER


slide-1
SLIDE 1

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 1

JOHN MATTSSON GÖRAN SELANDER GÖRAN AP ERIKSSON

ERICSSON RESEARCH

Object security In web of things

slide-2
SLIDE 2

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 2

EXECUTIVE SUMMARY

  • Market potential for IoT is held back by fragmentation:
  • a plethora of communication technologies, focus on transport layer protocols
  • lack of a common approach to enabling services
  • Web of Things brings new security and privacy challenges, trust models with many parties
  • Flexible security solutions and standards required:
  • to protect sensitive data and user privacy
  • to distribute policies in a secure and standardized way.
  • cannot be solved in a satisfactory way with only transport layer security.
  • Same privacy problems arise in the general web setting
  • processing and storage more and more moving into the cloud.
slide-3
SLIDE 3

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 3

Authorization

  • Fundamental question: Who has the right to access what? Drives the security and privacy

requirements – defines the solution.

  • New IETF WG: Authorization in Constrained RESTful Environments (ACE)
  • Problem: How to support explicit and dynamic authorization in networks of constrained devices

from various vendors?

PUT “1” /lock GET /bloodpressure PUT “2.5mg” /sedative

Client Resource Server

GET /lock

slide-4
SLIDE 4

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 4

BASE ARCHITECTURE

  • Sensors, Actuators

(some constrained)

  • Clients (may be

browsers)

  • A chain of Services

(sensor and client)

  • Servers (e.g.

authorization)

Client Using Resources Authentication and Authorization (Identity/Policy/Key Management) Supporting constrained devices Sensors/Actuators Hosting Resources Services Hosting and Using Resources Services Hosting and Using Resources

slide-5
SLIDE 5

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 5

Object security

  • Transport layer security is not sufficient, only supports fully trusted services.
  • Object security protects sensitive information and policy data e2e, enables caching of protected data
  • Hop-by-hop channel security includes services. Only needed data and metadata accessible to services
  • Ensures control and security of information owners as well as end-user privacy

Client' IoT'Device' Cloud'Service' Channel' Security' Channel' Security' Channel' Security' Data'object'1'(Plaintext)' Data'object'2'(Encrypted'and/or'Integrity'Protected)' Policy'Data'(Integrity'protected)' AuthenBcaBon,'AuthorizaBon' (IdenBty/Policy/Key'Management)'

  • ApplicaBon'Layer'

(Object'Security)' Cache'

slide-6
SLIDE 6

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 6

CONCLUSIONS

  • Web of Things with services requires standardized flexible security solutions on the application layer
  • to protect sensitive data and user privacy
  • to distribute policies and authorization information
  • Many pieces are available, some are in the making, some are missing
  • W3C should secure handling of data and policies in the Web of Things:
  • Developing standards and best practices for object security, including:
  • Multiparty protocol for secure exchange of information objects, metadata, identities of the

information objects and endpoints, key management, etc.

  • Browsers need APIs for key management, object encryption, decryption, manipulation etc.
  • Interoperable scalable formats for policies syntax, semantics.
  • Management of large sets of policy information
  • Access control in general, privacy more specifically
slide-7
SLIDE 7

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 7

REFERENCES

IETF Authentication and Authorization for Constrained Environments (ACE) https://datatracker.ietf.org/doc/charter-ietf-ace/ http://tools.ietf.org/html/draft-seitz-ace-usecases-00 http://tools.ietf.org/html/draft-seitz-ace-problem-description-00 IETF Javascript Object Signing and Encryption (JOSE) https://datatracker.ietf.org/wg/jose/charter/ W3C Encrypted Media Extensions http://www.w3.org/TR/encrypted-media/ W3C Subresource Integrity http://www.w3.org/TR/SRI/

slide-8
SLIDE 8

44 pt t pt

ΆΈΉΊΌΎΏΐΑΒΓΕΖΗΘΙΚΛΜΝΞΟΠΡΣΤΥΦΧΨΪΫΆΈΉΊΰαβγ δεζηθικλνξορςΣΤΥΦΧΨΩΪΫΌΎΏ ЁЂЃЄЅІЇЈЉЊЋЌЎЏАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩ ЪЫЬЭЮЯАБВГДЕЖЗИЙКЛМНОПРСТУФХЦЧШЩЪЫ ЬЭЮЯЁЂЃЄЅІЇЈЉЊЋЌЎЏѢѢѲѲѴѴҐҐәǽ №

Ericsson | 2014-06-25 | Page 8