38 research outputs found

    Root cause and liability analysis in the microservices architecture for edge IoT services

    Get PDF
    In this work, we present a liability analysis framework for root cause analysis (RCA) in the microservices architecture with IoT-oriented containerized network services. We keep track of the performance metrics of microservices, such as service response time, memory usage and availability, to detect anomalies. By injecting faults in the services, we construct a Causal Bayesian Network (CBN) which represents the relation between service faults and metrics. Service Level Agreement (SLA) data obtained from a descriptor named TRAILS (sTakeholder Responsibility, AccountabIlity and Liability deScriptor) is also used to flag service providers which have failed their commitments. In the case of SLA violation, the constructed CBN is used to predict the fault probability of services under given metric readings and to identify the root cause

    Demonstrating liability and trust metrics for multi-actor, dynamic edge and cloud microservices

    Get PDF
    Transitioning edge and cloud computing in 5G networks towards service-based architecture increases their complexity as they become even more dynamic and intertwine more actors or delegation levels. In this paper, we demonstrate the Liability-aware security manager Analysis Service (LAS), a framework that uses machine learning techniques to compute liability and trust indicators for service-based architectures such as cloud microservices. Based on the commitments of Service Providers (SPs) and real-time observations collected by a Root Cause Analysis (RCA) tool GRALAF, the LAS computes three categories of liability and trust indicators, specifically, a Commitment Trust Score, Financial Exposure, and Commitment Trends

    Liability-aware security management for 5G

    Get PDF
    ​© 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Multi-party and multi-layer nature of 5G networks implies the inherent distribution of management and orchestration decisions across multiple entities. Therefore, responsibility for management decisions concerning end-to-end services become blurred if no efficient liability and accountability mechanism is used. In this paper, we present the design, building blocks and challenges of a Liability-Aware Security Management (LASM) system for 5G. We describe how existing security concepts such as manifests and Security-by-Contract, root cause analysis, remote attestation, proof of transit, and trust and reputation models can be composed and enhanced to take risk and responsibilities into account for security and liability management

    The owner, the provider and the subcontractors : how to handle accountability and liability management for 5G end to end service

    Get PDF
    The adoption of 5G services depends on the capacity to provide high-value services. In addition to enhanced performance, the capacity to deliver Security Service Level Agreements (SSLAs) and demonstrate their fulfillment would be a great incentive for the adoption of 5G services for critical 5G Verticals (e.g., service suppliers like Energy or Intelligent Transportation Systems) subject to specific industrial safety, security or service level rules and regulations (e.g., NIS or SEVESO Directives). Yet, responsibilities may be difficult to track and demonstrate because 5G infrastructures are interconnected and complex, which is a challenge anticipated to be exacerbated in future 6G networks. This paper describes a demonstrator and a use case that shows how 5G Service Providers can deliver SSLAs to their customers (Service Owners) by leveraging a set of network enablers developed in the INSPIRE-5Gplus project to manage their accountability, liability and trust placed in subcomponents of a service (subcontractors). The elaborated enablers are in particular a novel sTakeholder Responsibility, AccountabIity and Liability deScriptor (TRAILS), a Liability-Aware Service Management Referencing Service (LASM-RS), an anomaly detection tool (IoT-MMT), a Root Cause Analysis tool (IoT-RCA), two Remote Attestation mechanisms (Systemic and Deep Attestation), and two Security-by-Orchestration enablers (one for the 5G Core and one for the MEC)

    Sécurisation d'un système de transactions sur terminaux mobiles

    No full text
    Mobile-based transactions have driven growing attention for the past few years. This thesis focuses on mobile-based transaction systems which are managed by a mobile network operator. In such a context, transactions are carried out with electronic money emitted by the operator by the subscribers of the service only. This thesis addresses the problem of securing such services. We propose an architecture which achieves end-to-end security between the payment platform and the payment application in the mobile device. Is is based on a Secure Element (SE) and a Trusted Execution Environment. Several types of transactions were considered such as payments or transfers as well as di erent modes based on the connection availability of the various actors. The protocols proposed were formally veri ed. Their performances were also taken into account. Several classi cation algorithms were compared to be adapted to the fraud detection problem in mobile-based systems. To achieve this, the payment platform and the user's behavior were modeled to create a synthetic data generator. The latter is preliminarily validated in the thesis. The originality of this simulator is that it is based on data from an existing system.Les transactions sur mobile suscitent depuis quelques années un intérêt grandissant. Cette thèse se place dans le contexte d'un tel service géré par un opérateur de téléphonie mobile. Les transactions sont réalisées entre souscrivants du service uniquement à l'aide de monnaie électronique privative émise par l'opérateur. Le problème de cette thèse réside dans la sécurisation de ces types de services. Nous proposons dans cette thèse une architecture permettant de garantir une sécurité de bout-en-bout entre l'application et la plateforme de paiement. Celle-ci est basée sur l'utilisation conjoint d'un élément de sécurité SE et d'un environnement d'exécution sécu risée TEE. Différentes transactions ont été considérées, paiement marchand et transferts entre particuliers, ainsi que différents modes, tout-connecté, déconnecté ou semi-connecté. Les protocoles proposés ont été vérifiés formellement et leurs performances ont été étudiées. Une étude comparative entre différents algorithmes de classification est également réalisée pour les adapter à la détection de la fraude. A cet effet, le système de paiement et le comportement de ses utilisateurs a été modélisé pour créer un générateur de données synthétiques. Une validation préliminaire de ce simulateur a été réalisée. L'originalité du simulateur est qu'il se base sur l'exploitati on de données provenant d'un service déployé sur le terrain

    Security and trust for mobile phones based on virtualization

    No full text
    National audienceIn this paper, we present a concept of a trusted computing platform aimed for mobile devices. Most of previous works on trusted computing platforms were aimed for computers. The proposed method is based on the existence of a secure element in the mobile, mobile OS virtualization and trusted boot process. Such a platform is feasible and easy to implement if specific requirements are respected

    Predictive Security Analysis - Concepts, Implementation, first Results in Industrial Scenario

    No full text
    International audienceThe Internet today provides the environment for novel applications and processes which may evolve way beyond pre-planned scope and purpose. Geographically dispersed real and virtual infrastructures, services and resources are the elementary components of such processes within large-scale, massively interconnected systems of systems. However, this evolving environment also enables new threats and scales up the risks of financial and also physical impact. Elevating dependability of applications in this ambient environment requires the monitoring of a system's operation using process information. Analysis of this information with respect to security and dependability aspects is growing in complexity with the increase in functionality, connectivity, and dynamics of current information technology and industrial control systems. To tackle this complexity, the application of models is becoming standard practice. Considering today's frequent changes to processes, model-based support for security and dependability analysis is not only needed in pre-operational phases but also at runtime

    Perspectives on security kernels for IoT

    No full text
    National audienceIoT market's growth surge encouraged developers to focus on fast delivery rather than security resulting in several major attacks. Efforts to provide secure-by-design applications or IoT devices rely on trusting physical secure elements or on the lower software layers. Thus, the entire system roots its overall security in the kernel given it is the first software layer above the hardware. However, constrained objects often struggle to combine functionality and security due to inherent low resources and few mechanisms address this problem. In this article, we explore existing approaches and highlight the need for a minimal and formally proven root of trust for constrained objects while presenting the challenges this implies

    Compartimentation dynamique imbriquée pour objets contraints

    No full text
    National audienceCe papier présente un framework pour mettre en place une compartimentation imbriquée pour objets contraints. Tous les espaces mémoire compartimentés sont protégés par la Memory Protection Unit (MPU). Ce framework permet de prendre en compte le dynamisme des nouvelles applications sur objets contraints telle que la création temporaire d'un sous-espace mémoire protégé. Nous appliquons ce framework sur trois noyaux existants et montrons une protection des ressources équivalente. Nous proposons une implémentation de ce framework par l'utilisation de la MPU afin de créer et gérer ces sous-espaces selon un modèle de permission dynamique

    Evaluation d'une solution d'isolation pour objets contraints

    No full text
    International audienceDans cet article, nous présentons l'évaluation de Pip-MPU qui est une solution d'isolation qui cible les objets contraints et basée sur la Memory Protection Unit (MPU). Nous y décrivons notre banc de test et la manière dont l'évaluation a été conduite. Notre prototype de Pip-MPU prend moins de 10 Ko de Flash pour son code et 550 octets de RAM pour sa pile. Pip-MPU affiche un coût supplémentaire de 16% en terme de cycles mesurés ainsi que sur sa consommation énergétique, mais réduit la mémoire accessible d'une application jusqu'à 2% de son envergure initiale et ses opérations privilégiées de 100%
    corecore