Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Automated usage control for secure data sharing based on Ricardian contracts
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.ORCID iD: 0000-0003-0215-9798
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.ORCID iD: 0000-0002-2654-2292
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Embedded Internet Systems Lab.ORCID iD: 0000-0001-5408-0008
Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.ORCID iD: 0000-0003-4549-6751
2022 (English)In: IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2022Conference paper, Published paper (Refereed)
Abstract [en]

Data is important for the industry to take advantage of digitalization, realize automation, assure quality, and more. Values from data are not only created individually by companies, but also in eco-systems in which data is shared among participating organizations. Secure data sharing is essential in such eco-systems to prevent unauthorized access and use of the data. Usage control extends traditional access control with restrictions concerned with requirements that pertain to data processing contractual obligations, rather than data access provisions only. Thus, usage control is relevant in the context of intellectual property protection, compliance with regulations, and digital rights management. This paper presents a method to negotiate contractual obligations and access provisions, and automatically enforce those provisions with access control. Finalized negotiations establish Ricardian contracts at two levels; a superordinate level with a connected subordinate level. These contracts contain provisions in terms of access control attributes. Using our implementation of a negotiation engine we demonstrate the automatic creation of NIST Next Generation Access Control (NGAC) access control policies. Our negotiation engine uses a lightweight model for the storage of an unforgeable and immutable log of the established contracts based on digital signatures and hashing.

Place, publisher, year, edition, pages
IEEE, 2022.
Series
Annual Conference of Industrial Electronics Society, ISSN 1553-572X, E-ISSN 2577-1647
Keywords [en]
Access Control, usage control, Ricardian Contracts, policies, data sharing, attribute-based, automation, enforceability
National Category
Robotics Computer Systems
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
URN: urn:nbn:se:ltu:diva-93728DOI: 10.1109/IECON49645.2022.9968450Scopus ID: 2-s2.0-85143896701OAI: oai:DiVA.org:ltu-93728DiVA, id: diva2:1706489
Conference
IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022
Funder
European Commission, 873111
Note

ISBN för värdpublikation: 978-1-6654-8025-3

Available from: 2022-10-26 Created: 2022-10-26 Last updated: 2023-11-17Bibliographically approved
In thesis
1. Digitalized contract definition and negotiations for the agreement of rights and obligations in electronic auctions
Open this publication in new window or tab >>Digitalized contract definition and negotiations for the agreement of rights and obligations in electronic auctions
2022 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

Negotiations of different kinds are used to trade goods and services. Within these, the creation of a signed agreement or contract that is binding for the agreeing parties helps also the gathering of evidence that can be used in case of disputes and for adjudication. Traditionally, contracts are established on paper agreements that are signed by all the involved parties and by a law enforcement entity that ensure its legality in a court of law. These contracts have evolved with the introduction of Information Technology (IT) where the negotiation of goods and services is mainly virtual and/or automatized. The consistency and processing time of the computers allow for negotiations to be more efficient than ever. 

Digitalized negotiations allow for auctioning systems providing a mechanism to efficiently match demand and supply in the exchange of goods and services. Such suctioning systems allow multiple users to iteratively or non-iteratively compete against one another to achieve allocative efficiency. Lately, digitalized auctions are implemented using Blockchain systems with the use of Smart Contracts to archieve decentralization. These are implemented as a digital script that may encode any set of rules written as code, with the validity of the code being enforced by the Blockchain's consensus mechanism. These Smart Contracts computations however tend to be expensive when executed and limited by the blocksize.  

This thesis studies the creation of digitized negotiation protocols and contract definition following the needs of traditional trading and auctioning systems. We investigate the use of Ricardian Contracts for flexible representation of rights and obligations of entities in the context of circular economy in both single and multi-attribute auctions. We analyze the implication of digitized agreements in the context of data sharing. Furthermore, we analyze how usage control policies can be represented into Ricardian Contracts in the context of intellectual property protection, compliance with regulations, and digital rights management.Finally, we analyze the properties that a system that supports the mentioned models should have and how to implement it in the context of distributed auctioning systems by contrasting available state-of-the-art. 

The main contributions of the thesis are: (1) The creation of a multi-attribute auctioning protocol for the circular economy which implements Ricardian Contracts for the representation of rights and obligations. (2) A method to negotiate obligations and access provisions with multi-level Ricardian contracts, and automatically enforce those provisions with access control. (3) A state-of-art analysis on distributed and decentralized auctioning systems where the key properties of auctioning systems are identified and are evaluated against the current implementations.

Place, publisher, year, edition, pages
Luleå: Luleå University of Technology, 2022
Series
Licentiate thesis / Luleå University of Technology, ISSN 1402-1757
National Category
Robotics Computer Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-93780 (URN)978-91-8048-208-0 (ISBN)978-91-8048-209-7 (ISBN)
Presentation
2023-01-19, A117, Luleå tekniska universitet, Luleå, 09:00 (English)
Opponent
Supervisors
Funder
European Commission, 364170
Available from: 2022-11-03 Created: 2022-11-03 Last updated: 2022-12-29Bibliographically approved
2. Attribute-based Approaches for Secure Data Sharing in the Industry
Open this publication in new window or tab >>Attribute-based Approaches for Secure Data Sharing in the Industry
2023 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

In the Industry 4.0 era, secure and efficient data sharing is vital for innovation and operational enhancement. Industry 4.0 envisions a highly connected ecosystem where machines, devices, and stakeholders collaborate in real time to optimize processes, enhance productivity, and create new value propositions. However, this surge in data-driven collaboration brings forth a critical challenge, ensuring the secure and controlled sharing of sensitive information. As organizations embrace the potential of Industry 4.0, the need for robust mechanisms to achieve key data security properties of data integrity, confidentiality, and availability, while enabling efficient data exchange becomes paramount. However, while the promise of Industry 4.0 presents promising opportunities, it also introduces a set of challenges intrinsic to data security solutions. These solutions, while promising in providing fine-grained data security, introduce complexities such as administrative overhead and substantial management efforts for the users. Striking a balance between robust security and operational ease is critical for enabling seamless data exchange within the evolving landscape of Industry 4.0.

This thesis explores the realm of Attribute-based approaches to achieve the desired secure data sharing, pivotal in the digitized Industry 4.0 environment.  An overarching objective is to achieve compatibility of these data-securing mechanisms with the Industry 4.0 paradigms through the usage of attribute-based approaches. This includes the exploration of the existing solutions within the state-of-the-art and its analysis in the context of usability and practicality for industrial adoption. 

Access control entails the establishment of policies and mechanisms to regulate who can access specific resources or information, under what conditions, and to what extent. The study will delve into various access control models and their applicability, with a particular emphasis on Attribute-Based Access Control. Moreover, through the creation of proofs-of-concepts implementations, we explore the usability of Attribute-based Access Control (ABAC) models and policy languages, applied to different aspects of the data-sharing process.  Manageability, user-friendliness, and fine-granularity of the access control were identified as key properties for the usability of data securing technologies in industry. Hence, discovering and addressing challenges for such properties is of special focus for this thesis. 

In addition, this thesis explores attribute-based encryption techniques, seeking to augment data security while minimizing additional operational complexities. Moreover, this thesis also explores the implications of third-party cloud services, popular in Industry 4.0 environments, as well as third-party stakeholder data sharing to motivate the need to ensure both in-transit and at-rest data security.

This thesis makes significant contributions in the domain of secure data sharing in Industry 4.0. First, it contextualizes access control within the broader data security landscape and explores state-of-the-art Attribute-Based Access Control policy languages. The research designs, evaluates, and automates ABAC models to address fine-granularity and manageability gaps, with a focus on user-friendliness for industrial adoption. Furthermore, it proposes and implements an automated management solution for integrating new data sources in Service-Oriented Architecture (SOA) industrial data-sharing applications, within the Eclipse Arrowhead Framework. This includes the innovative proposal of contractual automation of access control policies to enhance efficiency and security. 

Moreover, the research delves into the realm of attribute-based encryption approaches, conducting a state-of-the-art exploration and gap analysis, with a special focus on uncovering the adoption barriers associated with this technology.  Lastly, the thesis designs, implements, and evaluates an ABAC-Enabled ABE solution architecture, covering the discovered gaps, and offering an expressive and user-friendly approach to secure data sharing. These contributions collectively advance the field of data security and access control in the context of Industry 4.0 and similar evolving industrial landscapes

The research indicated that Attribute-based approaches hold promise for practical data protection at rest through access control mechanisms, especially within fine-grained policies. The study explores ABAC in a graph-based policy language, Next-generation Access Control (NGAC), showcasing its potential for reducing administrative workload related to policy management. Simplified policy creation and expression enhance the ease of model implementation. These insights extend to ABE, highlighting the value of delegating attribute management for reduced administrative complexity and improved expressiveness within ABE schemes. This approach allows for automation techniques developed for ABAC policy management to be translated into ABE schemes. 

Place, publisher, year, edition, pages
Luleå: Luleå University of Technology, 2023
Series
Doctoral thesis / Luleå University of Technology 1 jan 1997 → …, ISSN 1402-1544
Keywords
Data security, secure data sharing, Attribute-based Access Control, Attribute-based Encryption, industry 4.0, cyber-physical systems, cyber security
National Category
Computer Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-101858 (URN)978-91-8048-422-0 (ISBN)978-91-8048-423-7 (ISBN)
Public defence
2023-12-14, A 117, Luleå tekniska universitet, Luleå, 10:00 (English)
Opponent
Supervisors
Available from: 2023-10-31 Created: 2023-10-30 Last updated: 2023-12-01Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Chiquito, EricChiquito, AlexBodin, UlfSynnes, Kåre

Search in DiVA

By author/editor
Chiquito, EricChiquito, AlexBodin, UlfSynnes, Kåre
By organisation
Embedded Internet Systems LabComputer Science
RoboticsComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 308 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf