In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.

Exploiting If This Then That and Usage Control obligations for Smart Home security and management

Giorgi G;Martinelli F;Mori P;Saracino A
2021

Abstract

In this article we present an application of the Usage Control paradigm to a Smart Home infrastructure, based on a model extension and structured use of obligations. In the proposed extended model obligations are exploited to enforce two different access revocation time, namely revoke and suspend. This increases the policy expressiveness and enable to optimize the resource usage. Furthermore, obligations are exploited to send commands via IFTTT to different interconnected Smart Home devices, to impose safety-relevant behaviors, or to act on policy attributes to implement a self-healing paradigm for revoked sessions. The article is motivated by a parental control use case where deep learning is used in combination with Usage Control to regulate dynamically viewing rights of a smart-TV and interactions with interconnected devices. Accuracy and performance experiments show the effectiveness and feasibility of the proposed work.
2021
Istituto di informatica e telematica - IIT
IFTTT
Internet of Things (IoT)
Security
usag
File in questo prodotto:
File Dimensione Formato  
prod_442502-doc_158829.pdf

accesso aperto

Descrizione: Exploiting If This Then That and Usage Control obligations for Smart Home security and management
Tipologia: Documento in Pre-print
Licenza: Creative commons
Dimensione 2.4 MB
Formato Adobe PDF
2.4 MB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/426592
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 2
social impact