SlideShare una empresa de Scribd logo
1 de 27
AGILE M18 Review, 20 October 2017, Brussels (Belgium)
Security Research
JUAN DAVID PARRA / UNI PASSAU / WP 5 LEADER
1
Outline
1. Demo
2. Mapping within overall WP structure
3. Mapping within the overall Architecture
4. Goals of the Security Work Package
5. Research on Security Aspects for AGILE
6. Practical Security Aspects Relevant for AGILE
7. Security Implementation Status
8. Future Steps
2
DEMO
What the Demo is About
•Role Based Access Control (by default)
• Used to decide who can create entities
• Who can set some attributes
•Users can still have the possibility to define who can access their
attributes
• Credentials are only readable to the user itself
• Administrators can set some attributes (such as role)
4
Steps
•We log in with two different users (an AGILE-LOCAL user and a Dropbox
user) both registered with AGILE-IDM
•We show how both have the possibility to add attributes to other users
(buttons shown in the UI)
•We show how even though the Dropbox user is admin, he cannot read
the credentials from the agile-local user (default policies for credentials
are meant for users only)
•We show that after removing the admin role from the Dropbox user, he
cannot set attributes and he cannot upgrade his privileges by setting
himself as admin
•After placing the role back to the Dropbox user, everything goes back to
normal.
5
Demo Setup
6
Admins
https://youtu.be/z1V3E9Mo1Cw
WORK-PACKAGE MAPPING
Mapping to AGILE overall Work-
Package structure
8
ARCHITECTURE MAPPING
Mapping to AGILE Architecture –
Development View
10
MAIN CONTENTS
Goals of the Security Work Package
1. Provide authentication (internal and external applications) and
Identity Management (IDM, Task 5.1)
2. Let users control by whom and under which circumstances their
data is used (inside the gateway) (UC, Task 5.2)
3. Let users store data (outside of the gateway) while protecting
confidentiality of their data as much as possible (DS, Task 5.3)
4. Provide security features in a flexible and understandable manner,
such that pilots and gateway adopters can use them. (PS, Task 5.4)
12
Research on Security Aspects for AGILE
•Analyze where data is located in IoT scenarios based on a Perimeter
•Perimeter contains trusted elements to process the data
•Smaller Perimeter => More “paranoid” user
Parra Juan, Schreckling Daniel and Posegga Joachim. Addressing Data-Centric Security
Requirements for IoT-Based Systems. In 2016 International Workshop on Secure Internet of
Things (SIoT), pages 1-10, September, 2016
13
Practical Aspects Relevant for AGILE (P1, P2)
Identity Management (IDM: Goal 1) – Delivered in M12 (D5.1)*
•IDM needs to include the path from Devices to Visualization Device
(including external systems)
•To ease integration we should include external Identity Providers
Delivered as AGILE Deliverable 5.1: First Prototype of the AGILE Identity Management System
14
Practical Aspects Relevant for AGILE (P1, P2)
Data Usage Control (UC: Goal 2) – To be Delivered in M20(D5.2)
•Data must be declassified before being delivered to (internal or
external) applications or systems.
•Policies should be flexible enough to specify aspects related to previous
access to the data to provide higher privacy guarantees (relates to diff.
privacy)
15
Practical Aspects Relevant for AGILE (P1, P2)
Secure Data Sharing (DS: Goal 3) – To be Delivered in M24 (D5.3)
Attempt to keep confidentiality guarantees:
•Even when attackers have physical access to the gateway
•Even when data is stored externally
16
Practical Applications for AGILE (P1, P2)
Pilot and Adopters Support (PS: Goal 4) – Task 5.4
•Strive to provide a security framework that is as generic as possible.
•A generic attribute-based security framework is the way to go here.
17
Security Implementation Status
D5.1 [M12] D5.2 [M20] D5.3 [M24]
D5.1. First Prototype of the AGILE Identity Management System
D5.2 Usage Control and Provenance Management
D5.3 Secure Data Sharing System
D5.4 Pilot Integration
M18
18
Security Implementation Status
Generic attribute-based IDM
•Defines a generic security model based a generic entity schema (Goals:
All)
•Defines a security model based on read and write policies (and meta-
policies) on entities’ attributes. (Goals: All)
•Currently it is configured by default to do Role-based access control
(admin and non admin users) (Goals: UC, PS)
•Authentication supports external providers: Local Authentication ,
Dropbox, Github, Google, PAM, WebID. (Goals: DS, PS)
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support)
Delivered as AGILE Deliverable 5.1: First Prototype of the AGILE Identity Management System
19
Security Implementation Status
Integration with User Interface
•Login functionality of Desktop-like framework integrated with IDM
(Goals: IDM, PS)
•Setting attributes in the Agile Control Panel (Goals: All, WP 4 Cloud
Integration)
•Visualization of Entities in the Agile Control Panel (Goals: All)
•Registration of Devices as entities when they are paired with the
gateway (Goals: All)
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 20
Security Implementation Status
Integration with Developers UI (Node-RED)
•Login information propagated to the Developer’s UI (Goals: All)
•Accessing authentication information for currently authenticated user
from Node-RED Workflows (Goals: IDM, WP 4 Cloud Integration)
•Reading entity’s attributes such as Cloud Credentials from Node-RED
Workflows (Goals: PS, WP 4 Cloud Integration)
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 21
Security Implementation Status
Integration with the AGILE SDK
•All security-relevant API calls are available through http and the agile-
sdk (Goals: PS)
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 22
Progress after M18 (June 2017)
Ongoing implementation of Usage Control (M20) Delivered in August*
•Usage control is now integrated in a Policy Decision API as well as in
IDM to decide policies on reading attributes based on the current user
(Goals: All)
•Provide generic ways to define policies on actions (performed on
entities) (Goals: UC, PS)
•Developed monitoring mechanisms to let users know when and by
whom their data is being accessed (Goals: UC, PS)
•Extend Data and Local Store component to track provenance of data
subscriptions and information (Goals: UC, PS)
Delivered as AGILE Deliverable 5.12 Usage Control and Provenance Management
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 23
Future Steps
Task Time Span Status
5.1. Identity Management M4 - M 12 Delivered in time
5.2 Usage Control and
Provenance
M11 -M 20 Delivered in time (next
review)
5.3 Secure Data Sharing M10 - M 24 Ongoing
5.4 Platform Integration M24 - M36 Ongoing
24
THANK YOU
Future Steps Beyond M18 (Backup slide)
Secure Data Sharing (due in M24)
•Integrate services to enable gateway applications to rely on encrypted
external storage (Goals: DS, PS)
•Develop further a Lightweight one-time token generation schema
(Goals: DS, PS)
•Make the security aspects of the User Interface more generic and
improve them (Goals: PS)
•Provide support to pilots and analyze additional features needed by
them or the open call projects (Goals: PS)
(IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support)
26
Future Steps
D5.1 [M12] D5.2 [M20] D5.3 [M24]
D5.1. First Prototype of the AGILE Identity Management System
D5.2 Usage Control and Provenance Management
D5.3 Secure Data Sharing System
D5.4 Pilot Integration
MS1: Initial Design & Draft Framework
MS2: Agile Framework Release and Initial Integration
MS3: Agile Component Final Integration
MS4: Agile Integration with External Clouds
MS1[M9] MS2[M18] MS3[M24] MS5MS4[M30]
27

Más contenido relacionado

La actualidad más candente

AGILE Use Case & Challenges
AGILE Use Case & ChallengesAGILE Use Case & Challenges
AGILE Use Case & ChallengesAGILE IoT
 
WP1 Gateway HW Design & Implementation
WP1 Gateway HW Design & ImplementationWP1 Gateway HW Design & Implementation
WP1 Gateway HW Design & ImplementationAGILE IoT
 
WP5 - Gateway Security, Data Provenance & Access Control
WP5 - Gateway Security, Data Provenance & Access ControlWP5 - Gateway Security, Data Provenance & Access Control
WP5 - Gateway Security, Data Provenance & Access ControlAGILE IoT
 
WP2 - T2.1 - Automatic configuration based on hardware modules
WP2 - T2.1 - Automatic configuration based on hardware modulesWP2 - T2.1 - Automatic configuration based on hardware modules
WP2 - T2.1 - Automatic configuration based on hardware modulesAGILE IoT
 
AGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoTAGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoTAGILE IoT
 
2016 07-20-wp1-q2 f2 f berlin
2016 07-20-wp1-q2 f2 f berlin2016 07-20-wp1-q2 f2 f berlin
2016 07-20-wp1-q2 f2 f berlinAGILE IoT
 
2016 07-20-wp5-q2 f2 f meeting in berlin
2016 07-20-wp5-q2 f2 f meeting in berlin2016 07-20-wp5-q2 f2 f meeting in berlin
2016 07-20-wp5-q2 f2 f meeting in berlinAGILE IoT
 
Why IoT needs Open Source Communities
Why IoT needs Open Source CommunitiesWhy IoT needs Open Source Communities
Why IoT needs Open Source CommunitiesAGILE IoT
 
The IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsThe IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsCharalampos Doukas
 
FIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE
 
WP3 – AGILE Sw Architecture
WP3 – AGILE Sw ArchitectureWP3 – AGILE Sw Architecture
WP3 – AGILE Sw ArchitectureAGILE IoT
 
201410 1 fiware-overview
201410 1 fiware-overview201410 1 fiware-overview
201410 1 fiware-overviewFIWARE
 
FIWARE Developers Week_IoT basic exercises
FIWARE Developers Week_IoT basic exercisesFIWARE Developers Week_IoT basic exercises
FIWARE Developers Week_IoT basic exercisesFIWARE
 
CPaaS.io - u2-based Toolbox
CPaaS.io - u2-based ToolboxCPaaS.io - u2-based Toolbox
CPaaS.io - u2-based ToolboxStephan Haller
 
CPaaS.io - FIWARE-based Toolbox
CPaaS.io - FIWARE-based ToolboxCPaaS.io - FIWARE-based Toolbox
CPaaS.io - FIWARE-based ToolboxStephan Haller
 
Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsCharalampos Doukas
 
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...Rockwell Automation
 
FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...
 FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M... FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...
FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...FIWARE
 

La actualidad más candente (20)

AGILE Use Case & Challenges
AGILE Use Case & ChallengesAGILE Use Case & Challenges
AGILE Use Case & Challenges
 
WP1 Gateway HW Design & Implementation
WP1 Gateway HW Design & ImplementationWP1 Gateway HW Design & Implementation
WP1 Gateway HW Design & Implementation
 
WP5 - Gateway Security, Data Provenance & Access Control
WP5 - Gateway Security, Data Provenance & Access ControlWP5 - Gateway Security, Data Provenance & Access Control
WP5 - Gateway Security, Data Provenance & Access Control
 
WP2 - T2.1 - Automatic configuration based on hardware modules
WP2 - T2.1 - Automatic configuration based on hardware modulesWP2 - T2.1 - Automatic configuration based on hardware modules
WP2 - T2.1 - Automatic configuration based on hardware modules
 
AGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoTAGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoT
 
2016 07-20-wp1-q2 f2 f berlin
2016 07-20-wp1-q2 f2 f berlin2016 07-20-wp1-q2 f2 f berlin
2016 07-20-wp1-q2 f2 f berlin
 
2016 07-20-wp5-q2 f2 f meeting in berlin
2016 07-20-wp5-q2 f2 f meeting in berlin2016 07-20-wp5-q2 f2 f meeting in berlin
2016 07-20-wp5-q2 f2 f meeting in berlin
 
Why IoT needs Open Source Communities
Why IoT needs Open Source CommunitiesWhy IoT needs Open Source Communities
Why IoT needs Open Source Communities
 
The IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 standsThe IoT Open Source World: Where WSO2 stands
The IoT Open Source World: Where WSO2 stands
 
FIWARE IoT Proposal & Community
FIWARE IoT Proposal & CommunityFIWARE IoT Proposal & Community
FIWARE IoT Proposal & Community
 
WP3 – AGILE Sw Architecture
WP3 – AGILE Sw ArchitectureWP3 – AGILE Sw Architecture
WP3 – AGILE Sw Architecture
 
Io t solutions world congress 2018 review Henk Jan van Wijk Conclusion Connect
Io t solutions world congress 2018 review Henk Jan van Wijk  Conclusion Connect Io t solutions world congress 2018 review Henk Jan van Wijk  Conclusion Connect
Io t solutions world congress 2018 review Henk Jan van Wijk Conclusion Connect
 
201410 1 fiware-overview
201410 1 fiware-overview201410 1 fiware-overview
201410 1 fiware-overview
 
FIWARE Developers Week_IoT basic exercises
FIWARE Developers Week_IoT basic exercisesFIWARE Developers Week_IoT basic exercises
FIWARE Developers Week_IoT basic exercises
 
CPaaS.io - u2-based Toolbox
CPaaS.io - u2-based ToolboxCPaaS.io - u2-based Toolbox
CPaaS.io - u2-based Toolbox
 
Internet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter KitInternet of Things - Advantech IoT Gateway Starter Kit
Internet of Things - Advantech IoT Gateway Starter Kit
 
CPaaS.io - FIWARE-based Toolbox
CPaaS.io - FIWARE-based ToolboxCPaaS.io - FIWARE-based Toolbox
CPaaS.io - FIWARE-based Toolbox
 
Adoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple EnvironmentsAdoptive Gateways for dIverse MuLtiple Environments
Adoptive Gateways for dIverse MuLtiple Environments
 
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...
RA TechED 2019 - IN03 - Develop Analytics That Scale Using FactoryTalk Innova...
 
FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...
 FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M... FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...
FIWARE Developers Week_IoT Agents with Thinking Things and OMA lightweight M...
 

Similar a Security Research

IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET Journal
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud ComputingAnshi Bhadoria
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentStephan Haller
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud ComputingIRJET Journal
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET Journal
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like DropboxIRJET Journal
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22jemtallon
 
Logicaworks brochure
Logicaworks brochureLogicaworks brochure
Logicaworks brochureAshwini Rath
 
Simple stock market analysis
Simple stock market analysisSimple stock market analysis
Simple stock market analysislynneblue
 

Similar a Security Research (20)

IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using BiometricsIRJET- Protection of Personal Data on Distributed Cloud using Biometrics
IRJET- Protection of Personal Data on Distributed Cloud using Biometrics
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
GDSC Cloud Jam.pptx
GDSC Cloud Jam.pptxGDSC Cloud Jam.pptx
GDSC Cloud Jam.pptx
 
DoChronicle
DoChronicleDoChronicle
DoChronicle
 
IRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud StorageIRJET- Sharing Session Key to Protect Data in Cloud Storage
IRJET- Sharing Session Key to Protect Data in Cloud Storage
 
Basics of Cloud Computing
Basics of Cloud ComputingBasics of Cloud Computing
Basics of Cloud Computing
 
CPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen EmpowermentCPaaS.io Y1 Review Meeting - Citizen Empowerment
CPaaS.io Y1 Review Meeting - Citizen Empowerment
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Secure Data Protection in Cloud Computing
IRJET-  	  Secure Data Protection in Cloud ComputingIRJET-  	  Secure Data Protection in Cloud Computing
IRJET- Secure Data Protection in Cloud Computing
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Presentaion final
Presentaion finalPresentaion final
Presentaion final
 
IRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on CloudIRJET-Domain Data Security on Cloud
IRJET-Domain Data Security on Cloud
 
Cloud Storage System like Dropbox
Cloud Storage System like DropboxCloud Storage System like Dropbox
Cloud Storage System like Dropbox
 
CISSP Week 22
CISSP Week 22CISSP Week 22
CISSP Week 22
 
Logicaworks brochure
Logicaworks brochureLogicaworks brochure
Logicaworks brochure
 
Simple stock market analysis
Simple stock market analysisSimple stock market analysis
Simple stock market analysis
 

Más de AGILE IoT

Dockerized IoT Gateway Stack
Dockerized IoT Gateway StackDockerized IoT Gateway Stack
Dockerized IoT Gateway StackAGILE IoT
 
AGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoTAGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoT AGILE IoT
 
AgriWare / Holonix
AgriWare / HolonixAgriWare / Holonix
AgriWare / HolonixAGILE IoT
 
Towards Configuration Technologies for IoT Gateways
Towards Configuration Technologies  for IoT GatewaysTowards Configuration Technologies  for IoT Gateways
Towards Configuration Technologies for IoT GatewaysAGILE IoT
 
ASP-based Knowledge Representations for IoT Configuration Scenarios
ASP-based Knowledge Representations for  IoT Configuration ScenariosASP-based Knowledge Representations for  IoT Configuration Scenarios
ASP-based Knowledge Representations for IoT Configuration ScenariosAGILE IoT
 
Recommendation Technologies for IoT Edge Devices
Recommendation Technologies for IoT Edge DevicesRecommendation Technologies for IoT Edge Devices
Recommendation Technologies for IoT Edge DevicesAGILE IoT
 
About Open Source Business Models
About Open Source Business ModelsAbout Open Source Business Models
About Open Source Business ModelsAGILE IoT
 
2016 07-20-wp8-q2 f2 f berlin
2016 07-20-wp8-q2 f2 f berlin2016 07-20-wp8-q2 f2 f berlin
2016 07-20-wp8-q2 f2 f berlinAGILE IoT
 
2016 07-20-wp7-q2 f2 f berlin
2016 07-20-wp7-q2 f2 f berlin2016 07-20-wp7-q2 f2 f berlin
2016 07-20-wp7-q2 f2 f berlinAGILE IoT
 
2016 07-20-wp7-eclipse proposal
2016 07-20-wp7-eclipse proposal2016 07-20-wp7-eclipse proposal
2016 07-20-wp7-eclipse proposalAGILE IoT
 
2016 07-20-wp4-q2 f2 f berlin
2016 07-20-wp4-q2 f2 f berlin2016 07-20-wp4-q2 f2 f berlin
2016 07-20-wp4-q2 f2 f berlinAGILE IoT
 
2016 07-20-demo session
2016 07-20-demo session2016 07-20-demo session
2016 07-20-demo sessionAGILE IoT
 
Data Ownership & Trust in the IoT
Data Ownership & Trust in the IoTData Ownership & Trust in the IoT
Data Ownership & Trust in the IoTAGILE IoT
 
Adaptation: Iot is Art
Adaptation: Iot is ArtAdaptation: Iot is Art
Adaptation: Iot is ArtAGILE IoT
 
Art Event for AGILE 2017
Art Event for AGILE 2017Art Event for AGILE 2017
Art Event for AGILE 2017AGILE IoT
 
The cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesAGILE IoT
 
WP8 - Pilot – Testbed
WP8 - Pilot – TestbedWP8 - Pilot – Testbed
WP8 - Pilot – TestbedAGILE IoT
 
WP8 Pilot Design, Execution & Evaluation
WP8 Pilot Design, Execution & EvaluationWP8 Pilot Design, Execution & Evaluation
WP8 Pilot Design, Execution & EvaluationAGILE IoT
 

Más de AGILE IoT (18)

Dockerized IoT Gateway Stack
Dockerized IoT Gateway StackDockerized IoT Gateway Stack
Dockerized IoT Gateway Stack
 
AGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoTAGILE: Building the Open Gateway for IoT
AGILE: Building the Open Gateway for IoT
 
AgriWare / Holonix
AgriWare / HolonixAgriWare / Holonix
AgriWare / Holonix
 
Towards Configuration Technologies for IoT Gateways
Towards Configuration Technologies  for IoT GatewaysTowards Configuration Technologies  for IoT Gateways
Towards Configuration Technologies for IoT Gateways
 
ASP-based Knowledge Representations for IoT Configuration Scenarios
ASP-based Knowledge Representations for  IoT Configuration ScenariosASP-based Knowledge Representations for  IoT Configuration Scenarios
ASP-based Knowledge Representations for IoT Configuration Scenarios
 
Recommendation Technologies for IoT Edge Devices
Recommendation Technologies for IoT Edge DevicesRecommendation Technologies for IoT Edge Devices
Recommendation Technologies for IoT Edge Devices
 
About Open Source Business Models
About Open Source Business ModelsAbout Open Source Business Models
About Open Source Business Models
 
2016 07-20-wp8-q2 f2 f berlin
2016 07-20-wp8-q2 f2 f berlin2016 07-20-wp8-q2 f2 f berlin
2016 07-20-wp8-q2 f2 f berlin
 
2016 07-20-wp7-q2 f2 f berlin
2016 07-20-wp7-q2 f2 f berlin2016 07-20-wp7-q2 f2 f berlin
2016 07-20-wp7-q2 f2 f berlin
 
2016 07-20-wp7-eclipse proposal
2016 07-20-wp7-eclipse proposal2016 07-20-wp7-eclipse proposal
2016 07-20-wp7-eclipse proposal
 
2016 07-20-wp4-q2 f2 f berlin
2016 07-20-wp4-q2 f2 f berlin2016 07-20-wp4-q2 f2 f berlin
2016 07-20-wp4-q2 f2 f berlin
 
2016 07-20-demo session
2016 07-20-demo session2016 07-20-demo session
2016 07-20-demo session
 
Data Ownership & Trust in the IoT
Data Ownership & Trust in the IoTData Ownership & Trust in the IoT
Data Ownership & Trust in the IoT
 
Adaptation: Iot is Art
Adaptation: Iot is ArtAdaptation: Iot is Art
Adaptation: Iot is Art
 
Art Event for AGILE 2017
Art Event for AGILE 2017Art Event for AGILE 2017
Art Event for AGILE 2017
 
The cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of dronesThe cellular network: a vital link in the world of drones
The cellular network: a vital link in the world of drones
 
WP8 - Pilot – Testbed
WP8 - Pilot – TestbedWP8 - Pilot – Testbed
WP8 - Pilot – Testbed
 
WP8 Pilot Design, Execution & Evaluation
WP8 Pilot Design, Execution & EvaluationWP8 Pilot Design, Execution & Evaluation
WP8 Pilot Design, Execution & Evaluation
 

Último

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Último (20)

Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Security Research

  • 1. AGILE M18 Review, 20 October 2017, Brussels (Belgium) Security Research JUAN DAVID PARRA / UNI PASSAU / WP 5 LEADER 1
  • 2. Outline 1. Demo 2. Mapping within overall WP structure 3. Mapping within the overall Architecture 4. Goals of the Security Work Package 5. Research on Security Aspects for AGILE 6. Practical Security Aspects Relevant for AGILE 7. Security Implementation Status 8. Future Steps 2
  • 4. What the Demo is About •Role Based Access Control (by default) • Used to decide who can create entities • Who can set some attributes •Users can still have the possibility to define who can access their attributes • Credentials are only readable to the user itself • Administrators can set some attributes (such as role) 4
  • 5. Steps •We log in with two different users (an AGILE-LOCAL user and a Dropbox user) both registered with AGILE-IDM •We show how both have the possibility to add attributes to other users (buttons shown in the UI) •We show how even though the Dropbox user is admin, he cannot read the credentials from the agile-local user (default policies for credentials are meant for users only) •We show that after removing the admin role from the Dropbox user, he cannot set attributes and he cannot upgrade his privileges by setting himself as admin •After placing the role back to the Dropbox user, everything goes back to normal. 5
  • 8. Mapping to AGILE overall Work- Package structure 8
  • 10. Mapping to AGILE Architecture – Development View 10
  • 12. Goals of the Security Work Package 1. Provide authentication (internal and external applications) and Identity Management (IDM, Task 5.1) 2. Let users control by whom and under which circumstances their data is used (inside the gateway) (UC, Task 5.2) 3. Let users store data (outside of the gateway) while protecting confidentiality of their data as much as possible (DS, Task 5.3) 4. Provide security features in a flexible and understandable manner, such that pilots and gateway adopters can use them. (PS, Task 5.4) 12
  • 13. Research on Security Aspects for AGILE •Analyze where data is located in IoT scenarios based on a Perimeter •Perimeter contains trusted elements to process the data •Smaller Perimeter => More “paranoid” user Parra Juan, Schreckling Daniel and Posegga Joachim. Addressing Data-Centric Security Requirements for IoT-Based Systems. In 2016 International Workshop on Secure Internet of Things (SIoT), pages 1-10, September, 2016 13
  • 14. Practical Aspects Relevant for AGILE (P1, P2) Identity Management (IDM: Goal 1) – Delivered in M12 (D5.1)* •IDM needs to include the path from Devices to Visualization Device (including external systems) •To ease integration we should include external Identity Providers Delivered as AGILE Deliverable 5.1: First Prototype of the AGILE Identity Management System 14
  • 15. Practical Aspects Relevant for AGILE (P1, P2) Data Usage Control (UC: Goal 2) – To be Delivered in M20(D5.2) •Data must be declassified before being delivered to (internal or external) applications or systems. •Policies should be flexible enough to specify aspects related to previous access to the data to provide higher privacy guarantees (relates to diff. privacy) 15
  • 16. Practical Aspects Relevant for AGILE (P1, P2) Secure Data Sharing (DS: Goal 3) – To be Delivered in M24 (D5.3) Attempt to keep confidentiality guarantees: •Even when attackers have physical access to the gateway •Even when data is stored externally 16
  • 17. Practical Applications for AGILE (P1, P2) Pilot and Adopters Support (PS: Goal 4) – Task 5.4 •Strive to provide a security framework that is as generic as possible. •A generic attribute-based security framework is the way to go here. 17
  • 18. Security Implementation Status D5.1 [M12] D5.2 [M20] D5.3 [M24] D5.1. First Prototype of the AGILE Identity Management System D5.2 Usage Control and Provenance Management D5.3 Secure Data Sharing System D5.4 Pilot Integration M18 18
  • 19. Security Implementation Status Generic attribute-based IDM •Defines a generic security model based a generic entity schema (Goals: All) •Defines a security model based on read and write policies (and meta- policies) on entities’ attributes. (Goals: All) •Currently it is configured by default to do Role-based access control (admin and non admin users) (Goals: UC, PS) •Authentication supports external providers: Local Authentication , Dropbox, Github, Google, PAM, WebID. (Goals: DS, PS) (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) Delivered as AGILE Deliverable 5.1: First Prototype of the AGILE Identity Management System 19
  • 20. Security Implementation Status Integration with User Interface •Login functionality of Desktop-like framework integrated with IDM (Goals: IDM, PS) •Setting attributes in the Agile Control Panel (Goals: All, WP 4 Cloud Integration) •Visualization of Entities in the Agile Control Panel (Goals: All) •Registration of Devices as entities when they are paired with the gateway (Goals: All) (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 20
  • 21. Security Implementation Status Integration with Developers UI (Node-RED) •Login information propagated to the Developer’s UI (Goals: All) •Accessing authentication information for currently authenticated user from Node-RED Workflows (Goals: IDM, WP 4 Cloud Integration) •Reading entity’s attributes such as Cloud Credentials from Node-RED Workflows (Goals: PS, WP 4 Cloud Integration) (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 21
  • 22. Security Implementation Status Integration with the AGILE SDK •All security-relevant API calls are available through http and the agile- sdk (Goals: PS) (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 22
  • 23. Progress after M18 (June 2017) Ongoing implementation of Usage Control (M20) Delivered in August* •Usage control is now integrated in a Policy Decision API as well as in IDM to decide policies on reading attributes based on the current user (Goals: All) •Provide generic ways to define policies on actions (performed on entities) (Goals: UC, PS) •Developed monitoring mechanisms to let users know when and by whom their data is being accessed (Goals: UC, PS) •Extend Data and Local Store component to track provenance of data subscriptions and information (Goals: UC, PS) Delivered as AGILE Deliverable 5.12 Usage Control and Provenance Management (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 23
  • 24. Future Steps Task Time Span Status 5.1. Identity Management M4 - M 12 Delivered in time 5.2 Usage Control and Provenance M11 -M 20 Delivered in time (next review) 5.3 Secure Data Sharing M10 - M 24 Ongoing 5.4 Platform Integration M24 - M36 Ongoing 24
  • 26. Future Steps Beyond M18 (Backup slide) Secure Data Sharing (due in M24) •Integrate services to enable gateway applications to rely on encrypted external storage (Goals: DS, PS) •Develop further a Lightweight one-time token generation schema (Goals: DS, PS) •Make the security aspects of the User Interface more generic and improve them (Goals: PS) •Provide support to pilots and analyze additional features needed by them or the open call projects (Goals: PS) (IDM: Identity Management, UC: Usage Control, DS: Secure Data Sharing, PS: Pilot Support) 26
  • 27. Future Steps D5.1 [M12] D5.2 [M20] D5.3 [M24] D5.1. First Prototype of the AGILE Identity Management System D5.2 Usage Control and Provenance Management D5.3 Secure Data Sharing System D5.4 Pilot Integration MS1: Initial Design & Draft Framework MS2: Agile Framework Release and Initial Integration MS3: Agile Component Final Integration MS4: Agile Integration with External Clouds MS1[M9] MS2[M18] MS3[M24] MS5MS4[M30] 27

Notas del editor

  1. Most interesting scenarios go up to P2