SMARTIE Area of Activity: Framework Programme 7Framework Programme 7 ICT Objective 1.4 IoT (Smart Cities) Period:1 st September 2013 - 31 st August 2016.

Slides:



Advertisements
Similar presentations
Session 3: Safer Services in a Digital Society Security with RFID Gérald Santucci European Commission Head of Unit DG INFSO/D4.
Advertisements

The FI-WARE Project – Base Platform for Future Service Infrastructures FI-WARE MAY 2011 Presentation at proposers day.
Internet of Things and Platforms for Connected Smart Objects European Commission DG CONNECT Brussels. 23 rd October 2013.
1 A Scalable Approach for the Secure and Authorized Tracking of the Availability of Entities in Distributed Systems Shrideep Pallickara, Jaliya Ekanayake.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
ICT10 - Collective Awareness Platforms for Sustainability and Social Innovation.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Protecting User Data in Ubiquitous Computing: Towards Trustworthy Environments Yitao Duan and John Canny UC Berkeley.
NHIN Specifications Richard Kernan, NHIN Specification Lead (Contractor), Office of the National Coordinator for Health IT Karen Witting, Contractor to.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Reliable Internetworking using the Pub/Sub Paradigm Nikos Fotiou Advisor: Prof. George C. Polyzos Mobile Multimedia Laboratory, Department of Informatics.
Illustrating a Publish-Subscribe Internet Architecture Nikolaos Fotiou 1 George C. Polyzos 1 Dirk Trossen 2 Presenter: Konstantinos Katsaros 1 1 Athens.
Introduction To Windows NT ® Server And Internet Information Server.
Page 1Prepared by Sapient for MITVersion 0.1 – August – September 2004 This document represents a snapshot of an evolving set of documents. For information.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
1. Context: Ambient Intelligence Ambient Intelligence (AmI) represents a vision of ubiquitous computing, sensing and actuating to unobtrusively enhance.
Distributed Publish/Subscribe Network Presented by: Yu-Ling Chang.
A Robust Health Data Infrastructure P. Jon White, MD Director, Health IT Agency for Healthcare Research and Quality
Presented to: By: Date: Federal Aviation Administration Enterprise Information Management SOA Brown Bag #2 Sam Ceccola – SOA Architect November 17, 2010.
CNRI Handle System and its Applications
Steering Committee CSRIC Working Group 2A Cyber Security Best Practices October 7, 2010.
Lee Kinsman (soon to be) Consultant, Chamonix IT Consulting
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Work Programme for the specific programme for research, technological development and demonstration "Integrating and strengthening the European Research.
1 INFRA : INFRA : Scientific Information Repository supporting FP7 “The views expressed in this presentation are those of the author.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 ITU-T Security Standardization on Mobile Web Services Lee, Jae Seung Special Fellow,
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
© Synergetics Portfolio Security Aspecten.
The Scientific Publications System: A Key Factor for EU Research Policy Celina Ramjoué European Commission, Research Directorate-General Science, Economy.
C-DAX is funded by the European Union's Seventh Framework Programme (FP7-ICT ) under grant agreement n° An information-centric approach for.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Information Society Technologies (IST) Programme 5th EU RTD Framework Programme.
1 Applied Cryptography in CyberTA Brent Waters Work with Dan Boneh and Amit Sahai.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
1 "The views expressed in this presentation are those of the author and do not necessarily reflect the views of the European Commission" Objective 1.6:
GRID Overview Internet2 Member Meeting Spring 2003 Sandra Redman Information Technology and Systems Center and Information Technology Research Center National.
COMPETITIVE AND SUSTAINABLE GROWTH Research DG European Commission Expressions of interest / Dedicated call mechanism.
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 ICT and E-Business Strategies For Development Geneva, October.
Panel Session: Dependability and Security in Complex and Critical Information Systems Department of Communications and Information Engineering University.
Attribute-Based Encryption With Verifiable Outsourced Decryption.
Internet of Things in Industries
Information-Centric Networks Section # 10.2: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
Information-Centric Networks Section # 10.3: Publish/Subscribe Instructor: George Xylomenos Department: Informatics.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
H2020 FOCUS ON EDUCATION Creat-it Conference
Spring RabbitMQ Martin Toshev.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption.
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Online/Offline Attribute-Based Encryption Brent WatersSusan Hohenberger Presented by Shai Halevi.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
COMPUTER STUDIES Introduction. What is Computer Studies?  Many workplaces today utilise computers competencies  When applying for employment you may.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
IoTWeek 2016 Research Day Antonio F. Skarmeta UMU/OdinS SPAIN.
Secure and sMARrter ciTIes Data ManagEment
Ian Deakin, iconectiv 3rd July 2017
Federated IdM Across Heterogeneous Clouding Environment
World-Leading Research with Real-World Impact!
Discussion on the Scope of TR- Trust Management in oneM2M
OmniRAN Overview and status
PLUG-N-HARVEST ID: H2020-EU
Distributed Publish/Subscribe Network
Chinese wall model in the internet Environment
Presentation transcript:

SMARTIE Area of Activity: Framework Programme 7Framework Programme 7 ICT Objective 1.4 IoT (Smart Cities) Period:1 st September st August Funded by: European UnionEuropean Union Total budget: 4,862,363 €; EU contribution: 3,286,144 €

SMARTIE Focus 2

SMARTIE Platform

Infrastructure for Identity and IoT Real need exists for a suitable infrastructure to be in place: –IoT Addressing: an IoT address refers to an identifier of a smart object and/or its virtual representation. –IoT Naming: it refers to mechanisms and techniques for assigning names to objects and supporting their resolution/mapping to IoT addresses. –IoT Discovery: it refers to the process of locating and retrieving IoT resources in the scope of a large and complex space of smart objects. The attributes managed and associated to an identifier can be exploited by an identity management system: –Restricting the access to attributes to authorized smart objects. – Anonymous credential provisioning and partial identity management based on the attributes that are registered. – Generation of authorization credentials to enable M2M secure communications, based on attributes to make access control decisions.

Challenges Lack of economic incentives for data protection Non control over data disclosure Difficulties to implement PET or data protection Accountability of data provided by IoT Data analytics improve the interrelation of up to now disconnected data Doubt 1: Is it possible to connect anything to the Internet? Doubt 2: Do we want to connect everything to the Internet? –Business protection –Security and Privacy –Trustworthy 5

Motivation –IoT scale and data sensibility  PbD and PII minimal disclosure principles harder to be achieved –IoT is about sharing  need for flexible and scalable approaches while security and privacy are still preserved –Security properties need to be on the basis  application of crypto schemes Foundations –Attribute-Based Encryption (ABE)  crypto keys associated to a set of identity attributes –Publish/Subscribe Model  decoupled communications through IoT sharing platforms Privacy in Smartie

Ciphertext-Policy Attribute-Based Encryption (CP-ABE) –Data is encrypted under a combination or policy of attributes –Private keys associated with a set of attributes Producers specify how the information is disseminated on a per-data basis  policies describe the intended decrypter(s) CP-ABE as a example of sticky policies foundations –CP-ABE policy is stuck with data –Direct integration with group communications (e.g. multicast or pub/sub models) Privacy in Smartie

Publish/Subscribe –Loose decoupling  Topics as a meeting point between publishers and subscribers –Scalability  1 message to share with N entities through the broker Roles: publishers as producers, subscribers as consumers CoAP/MQTT as main candidate IoT protocols CP-ABE application to guarantee E2E confidentiality of PII Privacy in Smartie

Example: sharing my location Privacy in Smartie Producers (publishers) pushing data under a decryption policy on the broker Broker checks subscriptions with Topic Manager interest and tag matches but it can not get access to data Consumers (subscribers) get access only if their secret keys satisfy the decryption policy Realization through HTTP, CoAP, MQTT

Endorsed by: Vint CERF, one of the two "Fathers of the Internet" 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT) "Smart Innovation for Vibrant Ecosystems" December 2016 Reston, Virginia, USA WF-IoT Web site : Organised by Geoff Mulligan, General Chair; Latif Ladid, co-Chair; Antonio Skarmeta, Chair, TPC