Change search
Link to record
Permanent link

Direct link
Publications (9 of 9) Show all publications
Chiquito, A., Bodin, U. & Schelén, O. (2023). Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts. IEEE Access, 11, 10180-10195
Open this publication in new window or tab >>Attribute-Based Approaches for Secure Data Sharing in Industrial Contexts
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 10180-10195Article in journal (Refereed) Published
Abstract [en]

The sharing of data is becoming increasingly important for the process and manufacturing industries that are using data-driven models and advanced analysis to assess production performance and make predictions, e.g., on wear and tear. In such environments, access to data needs to be accurately controlled to prevent leakage to unauthorized users while providing easy to manage policies. Data should further be shared with users outside trusted domains using encryption. Finally, means for revoking access to data are needed. This paper provides a survey on attribute-based approaches for access control to data, focusing on policy management and enforcement. We aim to identify key properties provided by attribute-based access control (ABAC) and attribute-based encryption (ABE) that can be combined and used to meet the abovementioned needs.We describe such possible combinations in the context of a proposed architecture for secure data sharing. The paper concludes by identifying knowledge gaps to provide direction to future research on attribute-based approaches for secure data sharing in industrial contexts.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Keywords
Access Control, Attribute-based, Encryption, Fine-grained, IoT, NGAC
National Category
Computer Sciences
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-95603 (URN)10.1109/ACCESS.2023.3240000 (DOI)000928147800001 ()2-s2.0-85147309519 (Scopus ID)
Note

Validerad;2023;Nivå 2;2023-02-13 (hanlid);

Funder: Arrowhead Tools Research Project (826452)

Available from: 2023-02-13 Created: 2023-02-13 Last updated: 2025-10-21Bibliographically approved
Chiquito, A. (2023). Attribute-based Approaches for Secure Data Sharing in the Industry. (Doctoral dissertation). Luleå: Luleå University of Technology
Open this publication in new window or tab >>Attribute-based Approaches for Secure Data Sharing in the Industry
2023 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

In the Industry 4.0 era, secure and efficient data sharing is vital for innovation and operational enhancement. Industry 4.0 envisions a highly connected ecosystem where machines, devices, and stakeholders collaborate in real time to optimize processes, enhance productivity, and create new value propositions. However, this surge in data-driven collaboration brings forth a critical challenge, ensuring the secure and controlled sharing of sensitive information. As organizations embrace the potential of Industry 4.0, the need for robust mechanisms to achieve key data security properties of data integrity, confidentiality, and availability, while enabling efficient data exchange becomes paramount. However, while the promise of Industry 4.0 presents promising opportunities, it also introduces a set of challenges intrinsic to data security solutions. These solutions, while promising in providing fine-grained data security, introduce complexities such as administrative overhead and substantial management efforts for the users. Striking a balance between robust security and operational ease is critical for enabling seamless data exchange within the evolving landscape of Industry 4.0.

This thesis explores the realm of Attribute-based approaches to achieve the desired secure data sharing, pivotal in the digitized Industry 4.0 environment.  An overarching objective is to achieve compatibility of these data-securing mechanisms with the Industry 4.0 paradigms through the usage of attribute-based approaches. This includes the exploration of the existing solutions within the state-of-the-art and its analysis in the context of usability and practicality for industrial adoption. 

Access control entails the establishment of policies and mechanisms to regulate who can access specific resources or information, under what conditions, and to what extent. The study will delve into various access control models and their applicability, with a particular emphasis on Attribute-Based Access Control. Moreover, through the creation of proofs-of-concepts implementations, we explore the usability of Attribute-based Access Control (ABAC) models and policy languages, applied to different aspects of the data-sharing process.  Manageability, user-friendliness, and fine-granularity of the access control were identified as key properties for the usability of data securing technologies in industry. Hence, discovering and addressing challenges for such properties is of special focus for this thesis. 

In addition, this thesis explores attribute-based encryption techniques, seeking to augment data security while minimizing additional operational complexities. Moreover, this thesis also explores the implications of third-party cloud services, popular in Industry 4.0 environments, as well as third-party stakeholder data sharing to motivate the need to ensure both in-transit and at-rest data security.

This thesis makes significant contributions in the domain of secure data sharing in Industry 4.0. First, it contextualizes access control within the broader data security landscape and explores state-of-the-art Attribute-Based Access Control policy languages. The research designs, evaluates, and automates ABAC models to address fine-granularity and manageability gaps, with a focus on user-friendliness for industrial adoption. Furthermore, it proposes and implements an automated management solution for integrating new data sources in Service-Oriented Architecture (SOA) industrial data-sharing applications, within the Eclipse Arrowhead Framework. This includes the innovative proposal of contractual automation of access control policies to enhance efficiency and security. 

Moreover, the research delves into the realm of attribute-based encryption approaches, conducting a state-of-the-art exploration and gap analysis, with a special focus on uncovering the adoption barriers associated with this technology.  Lastly, the thesis designs, implements, and evaluates an ABAC-Enabled ABE solution architecture, covering the discovered gaps, and offering an expressive and user-friendly approach to secure data sharing. These contributions collectively advance the field of data security and access control in the context of Industry 4.0 and similar evolving industrial landscapes

The research indicated that Attribute-based approaches hold promise for practical data protection at rest through access control mechanisms, especially within fine-grained policies. The study explores ABAC in a graph-based policy language, Next-generation Access Control (NGAC), showcasing its potential for reducing administrative workload related to policy management. Simplified policy creation and expression enhance the ease of model implementation. These insights extend to ABE, highlighting the value of delegating attribute management for reduced administrative complexity and improved expressiveness within ABE schemes. This approach allows for automation techniques developed for ABAC policy management to be translated into ABE schemes. 

Place, publisher, year, edition, pages
Luleå: Luleå University of Technology, 2023
Series
Doctoral thesis / Luleå University of Technology 1 jan 1997 → …, ISSN 1402-1544
Keywords
Data security, secure data sharing, Attribute-based Access Control, Attribute-based Encryption, industry 4.0, cyber-physical systems, cyber security
National Category
Computer Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-101858 (URN)978-91-8048-422-0 (ISBN)978-91-8048-423-7 (ISBN)
Public defence
2023-12-14, A 117, Luleå tekniska universitet, Luleå, 10:00 (English)
Opponent
Supervisors
Available from: 2023-10-31 Created: 2023-10-30 Last updated: 2025-10-21Bibliographically approved
Chiquito, A., Bodin, U. & Schelén, O. (2023). Automated Management of Attribute-Based Policies for Access Control using Tag-Matching. In: IECON 2023 - 49th Annual Conference of the IEEE Industrial Electronics Society: . Paper presented at 49th Annual Conference of the IEEE Industrial Electronics Society (IECON 2023), Singapore, Singapore, October 16-19, 2023. Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Automated Management of Attribute-Based Policies for Access Control using Tag-Matching
2023 (English)In: IECON 2023 - 49th Annual Conference of the IEEE Industrial Electronics Society, Institute of Electrical and Electronics Engineers (IEEE), 2023Conference paper, Published paper (Refereed)
Abstract [en]

Data sharing is becoming increasingly important as organizations seek to improve their operations and gain a competitive advantage. The data sharing between organizations, stakeholders, and even internal teams requires access control policies that define who can access what data, under what circumstances, and for what purposes.Attribute-based access control (ABAC) provides a flexible and fine-grained mechanism for enforcing such policies, preventing data leakage, and improving security and compliance. A challenge is that these policies should be able to support the agility and adaptability of constantly evolving modern industrial systems, where new data sources, services, and users are frequently added and removed.  As the number of data sources and associated policies grows, the manual management of ABAC policies in evolving systems becomes a bottleneck, which prevents the adoption of fine-grained access control mechanisms. This paper presents a model based on tag-matching to automate the process of connecting new data sources and users to existing access control policies. In the proposed model, tag-matching means matching metadata elements to policy attributes to reduce the administrative work of managing access policies. The model takes advantage of the identity abstraction of ABAC policies to connect existing rules between attributes and the target resource or user. We present a proof-of-concept implementation of the tag-matching model in Eclipse Arrowhead and provide an evaluation of the proposed solution. 

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
Series
Annual Conference of Industrial Electronics Society, ISSN 1553-572X, E-ISSN 2577-1647
Keywords
IoT, Access Control, NGAC, Fine-grained, Time-series data
National Category
Computer Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-101847 (URN)10.1109/IECON51785.2023.10312150 (DOI)2-s2.0-85179510518 (Scopus ID)
Conference
49th Annual Conference of the IEEE Industrial Electronics Society (IECON 2023), Singapore, Singapore, October 16-19, 2023
Note

Funder: Mine.io research project (grant no. 101091885);

ISBN for host publication: 979-8-3503-3183-7 (print), 979-8-3503-3182-0 (electronic)

Available from: 2023-10-30 Created: 2023-10-30 Last updated: 2025-10-21Bibliographically approved
Chiquito, A. (2022). Attribute-based Approaches for Secure Data Sharing in Industry. (Licentiate dissertation). Luleå University of Technology
Open this publication in new window or tab >>Attribute-based Approaches for Secure Data Sharing in Industry
2022 (English)Licentiate thesis, comprehensive summary (Other academic)
Abstract [en]

The Industry 4.0 revolution relies heavily on data to generate value, innovation, new services, and optimize current processes [1]. Technologies such as Internet of Things (IoT), machine learning, digital twins, and much more depend directly on data to bring value and innovation to both discrete manufacturing and process industries. The origin of data may vary from sensor data to financial statements and even strictly confidential user or business data. In data-driven ecosystems, collaboration between different actors is often needed to provide services such as analytics, logistics, predictive maintenance, process improvement, and more. Data therefore cannot be considered a corporate internal asset only. Hence, data needs to be shared among organizations in a data-driven ecosystem for it to be used as a strategic resource for creating desired values, innovations, or process improvements [2]. When sharing business critical and sensitive data, the access to the data needs to be accurately controlled to prevent leakage to authorized users and organizations. 

Access control is a mechanism to control actions of users over objects, e.g., to read, write, and delete files, accessing data, writing over registers, and so on. This thesis studies one of the latest access control mechanisms in Attribute Based Access Control (ABAC) for industrial data sharing. ABAC emerges as an evolution of the commonly industry-wide used Role-based Access Control. ABAC presents the idea of attributes to create access policies, rather than manually assigned roles or ownerships, enabling for expressive fine-granular access control policies. Furthermore, this thesis presents approaches to implement ABAC into industrial IoT data sharing applications, with special focus on the manageability and granularity of the attributes and policies.  The thesis also studies the implications of outsourced data storage on third party cloud servers over access control for data sharing and explores how to integrate cryptographic techniques and paradigms into data access control. In particular, the combination of ABAC and Attribute-Based Encryption (ABE) is investigated to protect privacy over not-fully trusted domains. In this, important research gaps are identified. 

Place, publisher, year, edition, pages
Luleå University of Technology, 2022
Series
Licentiate thesis / Luleå University of Technology, ISSN 1402-1757
Keywords
Access Control, NGAC, Fine-grained, IoT, Industry 4.0, Encryption, flexible
National Category
Computer Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-90432 (URN)978-91-8048-092-5 (ISBN)978-91-8048-093-2 (ISBN)
Presentation
2022-06-15, A117, Luleå University of technology 971 87, Luleå, 09:00 (English)
Opponent
Supervisors
Projects
Arrowhead Tools
Available from: 2022-04-26 Created: 2022-04-26 Last updated: 2025-10-21Bibliographically approved
Chiquito, E., Chiquito, A., Bodin, U. & Synnes, K. (2022). Automated usage control for secure data sharing based on Ricardian contracts. In: IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society: . Paper presented at IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022. IEEE
Open this publication in new window or tab >>Automated usage control for secure data sharing based on Ricardian contracts
2022 (English)In: IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2022Conference paper, Published paper (Refereed)
Abstract [en]

Data is important for the industry to take advantage of digitalization, realize automation, assure quality, and more. Values from data are not only created individually by companies, but also in eco-systems in which data is shared among participating organizations. Secure data sharing is essential in such eco-systems to prevent unauthorized access and use of the data. Usage control extends traditional access control with restrictions concerned with requirements that pertain to data processing contractual obligations, rather than data access provisions only. Thus, usage control is relevant in the context of intellectual property protection, compliance with regulations, and digital rights management. This paper presents a method to negotiate contractual obligations and access provisions, and automatically enforce those provisions with access control. Finalized negotiations establish Ricardian contracts at two levels; a superordinate level with a connected subordinate level. These contracts contain provisions in terms of access control attributes. Using our implementation of a negotiation engine we demonstrate the automatic creation of NIST Next Generation Access Control (NGAC) access control policies. Our negotiation engine uses a lightweight model for the storage of an unforgeable and immutable log of the established contracts based on digital signatures and hashing.

Place, publisher, year, edition, pages
IEEE, 2022
Series
Annual Conference of Industrial Electronics Society, ISSN 1553-572X, E-ISSN 2577-1647
Keywords
Access Control, usage control, Ricardian Contracts, policies, data sharing, attribute-based, automation, enforceability
National Category
Robotics and automation Computer Systems
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-93728 (URN)10.1109/IECON49645.2022.9968450 (DOI)001504976200127 ()2-s2.0-85143896701 (Scopus ID)
Conference
IECON 2022 – 48th Annual Conference of the IEEE Industrial Electronics Society, Brussels, Belgium, October 17-20, 2022
Funder
European Commission, 873111
Note

ISBN för värdpublikation: 978-1-6654-8025-3

Available from: 2022-10-26 Created: 2022-10-26 Last updated: 2025-11-27Bibliographically approved
Bodin, U., Christofferson, A., Chiquito, A., Rodahl, J. & Synnes, K. (2021). Application-scoped Access Control for the Construction Industry. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA): . Paper presented at 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2021), Västerås, Sweden, September 7-10, 2021 (pp. 1-8). IEEE
Open this publication in new window or tab >>Application-scoped Access Control for the Construction Industry
Show others...
2021 (English)In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, 2021, p. 1-8Conference paper, Published paper (Refereed)
Abstract [en]

The construction industry is characterized by its extensive and dynamic collaborations between contractors providing various services and expertise. In such eco-systems, the secure sharing of information, data and equipment challenges the access control needs to be application agnostic. Furthermore, it needs fine-grained access policies including means for abstraction to ease administration, and support for delegated authorization in Service-Oriented Architecture (SOA) based systems. In this paper, we explore the use of delegated access using OAuth 2.0 with Attribute-Based Access Control (ABAC) for the collaborative sharing of equipment at construction sites. In particular, we investigate the use of contextual attributes to capture the dynamic aspects, such as location and urgency, in the booking of construction lifts. Through this study, we propose a solution based on the IoT Application-scoped Access Control as a Service (IAACaaS) architecture model combined with NIST Next Generation Access Control (NGAC). We present an architecture for a general Identity and Access Management (IAM) system for the construction industry, and provide a design and guide for implementation of this architecture in terms how key functionalities should be captured as reusable micro-services. Moreover, we describe how these micro-services can be combined to make the system a general and reusable solution providing access control for collaborative sharing of data, information and equipment at construction sites.

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
Access control, Conferences, Collaboration, NIST, Service-oriented architecture, Stakeholders, Next generation networking, identity and access management, IAM, localization, prioritization, ABAC, NGAC
National Category
Computer Sciences
Research subject
Cyber-Physical Systems; Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-88443 (URN)10.1109/ETFA45728.2021.9613645 (DOI)000766992600221 ()2-s2.0-85122954034 (Scopus ID)
Conference
26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2021), Västerås, Sweden, September 7-10, 2021
Note

ISBN för värdpublikation: 978-1-7281-2989-1, 978-1-7281-2990-7

Available from: 2021-12-16 Created: 2021-12-16 Last updated: 2025-10-21Bibliographically approved
Chiquito, A., Bodin, U. & Schelén, O. (2021). Fine-grained Access Control for Time-Series Databases using NGAC. In: Proceedings: 2021 IEEE 19th International Conference on Industrial Informatics (INDIN). Paper presented at 19th IEEE International Conference on Industrial Informatics (INDIN 2021), Palme de Mallorca, July 21-23, 2021. IEEE
Open this publication in new window or tab >>Fine-grained Access Control for Time-Series Databases using NGAC
2021 (English)In: Proceedings: 2021 IEEE 19th International Conference on Industrial Informatics (INDIN), IEEE, 2021Conference paper, Published paper (Refereed)
Abstract [en]

Industrial Internet of Things (IIoT) and Industry 4.0 rely heavily on data for reasons such as production follow-up, planning and optimization. Industrial data come in large volumes from production logs and sensors whereof some data carries business and strategic value, sensitive information, or a combination of both. Such data must be protected from unauthorized access, but also be easy to access for authorized users to facilitate work to gain business and operational values from the data. The efficient creation and maintenance of access policies for secure data sharing is hence essential, but unfortunately also challenging in terms of the complexity and administrative effort for fine-grained such. Attribute-based access control (ABAC) such as the Next Generation Access Control (NGAC) provides efficient models for handling access policies. Existing access control models fail however to provide a simple and easy-to-maintain policy language capable of efficiently enforcing fine-grained access control policies for large volumes of time-series data. In this paper, we propose extensions to NGAC based on filter strings that facilitates efficient enforcement of row-level value and time constraint policies for time-series data. We evaluate two approaches for storing and retrieving these filter strings and provide a qualitative and quantitative discussion of the results.

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
IoT, Access Control, NGAC, Fine-grained, Time-series data
National Category
Embedded Systems
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-87495 (URN)10.1109/INDIN45523.2021.9557414 (DOI)000909399300031 ()2-s2.0-85125559937 (Scopus ID)
Conference
19th IEEE International Conference on Industrial Informatics (INDIN 2021), Palme de Mallorca, July 21-23, 2021
Note

ISBN för värdpublikation: 978-1-7281-4395-8;

Funder: Arrowhead Tools research project (826452)

Available from: 2021-10-14 Created: 2021-10-14 Last updated: 2025-10-21Bibliographically approved
Chiquito, A., Bodin, U. & Schelén, O. (2020). Access Control Model for Time Series Databases using NGAC. In: Proceedings: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). Paper presented at 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2020), 8-11 September, 2020, Vienna, Austria - Hybrid (pp. 1001-1004). IEEE
Open this publication in new window or tab >>Access Control Model for Time Series Databases using NGAC
2020 (English)In: Proceedings: 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, 2020, p. 1001-1004Conference paper, Published paper (Refereed)
Abstract [en]

In Industry 4.0 and Industrial Internet of Things (IIoT), large amounts of time-series sensor data is collected from devices and machines. Industrial data typically contain sensitive information that may harm the data owner should it leaks. Although such risks exist, selected data frequently needs to be shared in partner eco-systems to take advantage of expertise in analyzing the data and to synchronize between partners collaborating in the production system. Consequently, access control must support efficient data selection and sharing. The access control should be capable of managing and enforcing access policies for different operations and with different levels of granularity, while being simple to properly maintain and potentially automate. In this paper we examine the possible use of Next-Generation Access Control (NGAC) for such access control. NGAC is an attribute-based access control (ABAC) standard based on relations between data elements to create, manage and enforce access control policies. We propose an Access control model that maps the NGAC policy language to thequerylanguageoftime-seriesdatabasestofacilitateasecure and efficient data sharing system for IIoT sensor data

Place, publisher, year, edition, pages
IEEE, 2020
Series
IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), ISSN 1946-0740, E-ISSN 1946-0759
Keywords
IoT, Access Control, Database security, Time Series Data, NGAC
National Category
Other Electrical Engineering, Electronic Engineering, Information Engineering
Research subject
Cyber-Physical Systems
Identifiers
urn:nbn:se:ltu:diva-80596 (URN)10.1109/ETFA46521.2020.9211947 (DOI)000627406500128 ()2-s2.0-85093363926 (Scopus ID)
Conference
25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2020), 8-11 September, 2020, Vienna, Austria - Hybrid
Projects
Arrowhead Tools
Note

ISBN för värdpublikation: 978-1-7281-8956-7, 978-1-7281-8957-4

Available from: 2020-08-27 Created: 2020-08-27 Last updated: 2025-10-22Bibliographically approved
Chiquito, A., Bodin, U. & Schelén, O. Evaluation of an Attribute-Based Encryption enabled Attribute-Based Access Control Architecture.
Open this publication in new window or tab >>Evaluation of an Attribute-Based Encryption enabled Attribute-Based Access Control Architecture
(English)Manuscript (preprint) (Other academic)
Abstract [en]

Decentralized data repositories and external cloud-based services are pivotal in facilitating industrial data sharing, but they often come with administrative overhead. These solutions provide the scalability and accessibility needed for efficient storage and sharing of industrial data, enhancing collaboration and data-driven decision-making while ensuring data security. In this paper, we explore means to combine Attribute-based Access Control and Attribute-based Encryption (ABE). We propose an innovative approach to secure data sharing at rest and at transit with low administrative and management overhead. The solution leverages ABE's ability to encrypt data with fine-grained policies while keeping ABAC's flexibility and ease of management. We provide an evaluation of our solution and discuss the results in the context of industrial data-sharing use cases and applications. Moreover, we provide design guidelines for implementation. Our findings provide valuable insights into the effectiveness of ABE in preserving data privacy during the data-sharing process. Importantly, this is achieved without introducing significant time complexity, even when considering factors like policy size and the number of attributes involved. Furthermore, our study demonstrates that these benefits can be realized while still maintaining the ease of management and the fine-grained control inherent in ABAC schemes.

National Category
Computer Systems
Identifiers
urn:nbn:se:ltu:diva-101848 (URN)
Available from: 2023-10-30 Created: 2023-10-30 Last updated: 2025-10-21
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-2654-2292

Search in DiVA

Show all publications