[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3372297.3417858acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Privaros: A Framework for Privacy-Compliant Delivery Drones

Published: 02 November 2020 Publication History

Abstract

We present Privaros, a framework to enforce privacy policies on drones. Privaros is designed for commercial delivery drones, such as the ones that will likely be used by Amazon Prime Air. Such drones visit various host airspaces, each of which may have different privacy requirements. Privaros uses mandatory access control to enforce the policies of these hosts on guest delivery drones. Privaros is tailored for ROS, a middleware popular in many drone platforms. This paper presents the design and implementation of Privaros's policy-enforcement mechanisms, describes how policies are specified, and shows that policy specification can be integrated with India's Digital Sky portal. Our evaluation shows that a drone running Privaros can robustly enforce various privacy policies specified by hosts, and that its core mechanisms only marginally increase communication latency and power consumption.

Supplementary Material

MOV File (Copy of CCS2020_fpc004_VinodGanapathy - Brian Hollendyke.mov)
Presentation video

References

[1]
United States Federal Aviation Administration. FAA Aerospace Forecast: Fiscal Years 2019--2039, 2019. https://www.faa.gov/data_research/aviation/aerospace_forecasts/media/FY2019--39_FAA_Aerospace_Forecast.pdf.
[2]
Apex AI. Performance Test. https://gitlab.com/ApexAI/performance_test/.
[3]
AppArmor--an effective and easy-to-use Linux application security system. https://gitlab.com/apparmor/apparmor/wikis/home/.
[4]
Ardupilot Autopilot Software. https://ardupilot.org/.
[5]
ARM. Security technology building a secure system using TrustZone technology (white paper). ARM Limited, 2009. https://static.docs.arm.com/genc009492/c/PRD29-GENC-009492C_trustzone_security_whitepaper.pdf.
[6]
United Kingdom-Civil Aviation Authority. The Drone and Model Aircraft Code--Protecting people's privacy. https://register-drones.caa.co.uk/drone-code/protecting-peoples-privacy.
[7]
A. Azab, P. Ning, J. Shah, Q. Chen, R. Bhutkar, G. Ganesh, J. Ma, and W. Shen. Hypervision across worlds: Real-time kernel protection from the ARM TrustZone secure world. In ACM Conf. on Computer and Communications Security, 2014.
[8]
D. E. Bell and L. LaPadula. Secure computer system: Unified exposition and Multics interpretation, March 1976. Tech. Report MTR-2997, MITRE Corporation.
[9]
W. C. Bennett. Civilian drones, privacy, and the federal-state balance. In The Brookings Institution--The Project on Civilian Robots, September 2014. https://www.brookings.edu/research/civilian-drones-privacy-and-the-federal-state-balance/.
[10]
K. J. Biba. Integrity considerations for secure computer systems, June 1975. Technical Report MTR-3153, MITRE Corporation.
[11]
S. Birnbach, R. Baker, and I. Martinovic. Wi-fly?: Detecting privacy invasion attacks by consumer drones. In Network and Distributed Systems Security Symposium, 2017.
[12]
F. Brasser, D. Kim, C. Liebchen, V. Ganapathy, L. Iftode, and A.-R. Sadeghi. Regulating ARM TrustZone devices in restricted spaces. In ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), 2016.
[13]
S. Bugiel, S. Heuser, and A-R. Sadeghi. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. In USENIX Security, 2013.
[14]
J. Busset, F. Perrodin, P. Wellig, B. Ott, K. Heutschi, T. Rühl, and T. Nussbaumer. Detection and tracking of drones using advanced acoustic cameras. Unmanned/Unattended Sensors and Sensor Networks XI and Advanced Free-Space Optical Communication Techniques and Applications, 2015.
[15]
E. E. Case, A. M. Zelnio, and B. D. Rigling. Low-cost acoustic array for small UAV detection and tracking. In IEEE Natl. Aerospace & Electronics Conf., 2008.
[16]
V. Chang, P. Chundury, and M. Chetty. “Spiders in the sky”: User perceptions of drones, privacy, and security. In ACM SIGCHI Conference on Human Factors in Computing Systems, 2017.
[17]
H. Chen, N. Li, W. Enck, Y. Aafer, and X. Zhang. Analysis of SEAndroid policies: Combining MAC and DAC in Android. In Annual Computer Security Applications Conference, 2017.
[18]
ChibiOS free embedded RTOS. http://chibios.org.
[19]
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium on Research in Security and Privacy, 1987.
[20]
CNBC. Amazon says this business opportunity could make you up to $300k a year--here's how to get into the program, September 2018. https://www.cnbc.com/2018/09/06/amazon-delivery-service-partner-program-gets-thousands-of-applications.html.
[21]
British Broadcasting Corporation. Big rise in drone jail smuggling incidents, February 2016. http://www.bbc.com/news/uk-35641453.
[22]
British Broadcasting Corporation. Gatwick airport: Drones ground flights, 2018. https://www.bbc.com/news/uk-england-sussex-46623754.
[23]
M. J. Covington, P. Fogla, Z. Zhan, and M. Ahamad. A context-aware security architecture for emerging applications. In Annual Computer Security Applications Conference, 2002.
[24]
Data Distribution Service (DDS). https://www.omg.org/spec/DDS/1.4/PDF.
[25]
B. Dieber, B. Breiling, S. Taurer, S. Kacianka, S. Rass, and P. Schartner. Security for the Robot Operating System. Robotics and Autonomous Systems, 98, 2017.
[26]
B. Dieber, S. Kacianka, S. Rass, and P. Schartner. Application-level security for ros-based applications. In Intelligent Robots and Systems (IROS), 2016 IEEE/RSJ International Conference on, pages 4477--4482. IEEE, 2016.
[27]
Digital Sky Web Server back-end. http://github.com/iSPIRT/digital-sky-api.
[28]
Digital Sky Web Server front-end. http://github.com/iSPIRT/digital-sky-app.
[29]
How To Get Flipkart Franchise. https://www.steptowardbusiness.com/flipkart-franchise.
[30]
W. Enck, P. Gilbert, B-C. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. Sheth. Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In ACM/USENIX Symposium on Operating System Design and Implementation, 2010.
[31]
The most complete DDS by eprosima, the middleware experts (https://www.eprosima.com). https://github.com/eProsima/Fast-RTPS.
[32]
eProsima fast DDS docs. https://fast-rtps.docs.eprosima.com/en/latest/.
[33]
T. Eshel. Mobile radar optimized to detect UAVs, precision guided weapons. Defense Update, 2013.
[34]
X. Ge, N. Talele, M. Payer, and T. Jaeger. Fine-grained control-flow integrity for kernel software. In IEEE European Symposium on Security and Privacy, 2016.
[35]
X. Ge, H. Vijayakumar, and T. Jaeger. textscSprobes: Enforcing Kernel Code Integrity on the TrustZone. In IEEE Workshop on Mobile Security Technologies, 2014.
[36]
D. Giffin, A. Levy, D. Stefan, D. Terei, D. Mazieres, J. Mitchell, and A. Russo. Hails: Protecting Data Privacy in Untrusted Web Applications. In USENIX Symposium on Operating System Design and Implementation, 2012.
[37]
Government of India. Digital Sky Portal -- Office of the Director General of Civil Aviation. https://digitalsky.dgca.gov.in/.
[38]
Government of India. Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual, First Edition, November 2018. https://diceindia.org.in/wp-content/uploads/DGCA-RPAS-Guidance-Manual.pdf.
[39]
Government of India. Office of the Director General of Civil Aviation: DGCA RPAS Guidance Manual, Revision One of First Edition, June 2019. https://diceindia.org.in/wp-content/uploads/Updated-DGCA-RPAS-Guidance-Manual.pdf.
[40]
Aviation Systems Group. Drones and the UK Privacy Law. https://asg.ltd/drones-and-privacy-law/.
[41]
K. Hartmann and C. Steup. The vulnerability of UAVs to cyber attacks-an approach to the risk assessment. In IEEE Intl. Conference on Cyber Conflict, 2013.
[42]
T. Jain and G. Cooperman. DMTCP: Fixing the single point of failure of the ros master. In ROSCON 2017: the ROS Developers Conference, 2017.
[43]
A. Y. Javaid, W. Sun, V. K. Devabhaktuni, and M. Alam. Cyber security threat analysis and modeling of an unmanned aerial vehicle system. In IEEE Conference on Technology for Homeland Security, 2012.
[44]
A. J. Kerns, D. P. Shepard, J. A. Bhatti, and T. E. Humphreys. Unmanned aircraft capture and control via GPS spoofing. Journal of Field Robotics, 31(4), 2014.
[45]
C. Koettl and B. Marcolini. A closer look at the drone attack on Maduro in Venezuela, August 2018. https://www.nytimes.com/2018/08/10/world/americas/venezuela-video-analysis.html.
[46]
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, M. F. Kaashoek, E. Kohler, and R. Morris. Information Flow Control for Standard OS Abstractions. In ACM Symposium on Operating Systems Principles, 2007.
[47]
R. Liu and M. Srivastava. PROTC: Protecting drone's peripherals through ARM TrustZone. In 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications, 2017.
[48]
T. Liu, A. Hojjati, A. Bates, and K. Nahrstedt. Alidrone: Enabling trustworthy proof-of-alibi for commercial drone compliance. In IEEE 38th International Conference on Distributed Computing Systems, 2018.
[49]
Amazon Logistics. Amazon Logistics--Delivery Services Partners Program. https://logistics.amazon.com/marketing/opportunity.
[50]
P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In USENIX Annual Technical Conference, 2001.
[51]
MAVLink Developer Guide. https://mavlink.io/en/.
[52]
J. McClean, C. Stull, C. Farrar, and D. Mascare nas. A Preliminary Cyber-Physical Security Assessment of the Robot Operating System (ROS). In Unmanned Systems Technology XV, volume 8741, page 874110. International Society for Optics and Photonics, 2013.
[53]
M. D. McIlroy and J. A. Reeds. Multilevel security in the UNIX tradition. Software--Practice and Experience, 22(8), 1992.
[54]
G. McNeal. Drones and aerial surveillance: Considerations for legislatures. In The Brookings Institution--The Project on Civilian Robots, November 2014. https://www.brookings.edu/research/drones-and-aerial-surveillance-considerations-for-legislatures/.
[55]
L. McVoy and C. Staelin. Lmbench: Portable tools for performance analysis. In 1996 Annual Conference on USENIX Annual Technical Conference, 1996.
[56]
M. Miettinen, S. Heuser, W. Kronz, A.-R. Sadeghi, and N. Asokan. Conxsense--context profiling and classification for context-aware access control. In ACM Symposium on Information, Computer and Communications Security, 2014.
[57]
J. Morris, S. Smalley, and G. Kroah-Hartman. Linux security modules: General security support for the Linux kernel. In USENIX Security, 2002.
[58]
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Transactions on Software Engineering and Methodology (TOSEM), 2000.
[59]
A. Nadkarni, B. Andow, W. Enck, and S. Jha. Practical DIFC enforcement on Android. In USENIX Security, 2016.
[60]
B. Nassi, R. Ben-Netanel, A. Shamir, and Y. Elovici. Drones' Cryptanalysis -- Smashing Cryptography with a Flicker. In IEEE Symposium on Security and Privacy, 2019.
[61]
P. Nguyen, H. Truong, M. Ravindranathan, A. Nguyen, R. Han, and T. Vu. Matthan: Drone presence detection by identifying physical signatures in the drone's RF communication. In 15th Annual International Conference on Mobile Systems, Applications, and Services, 2017.
[62]
Office of the Australian Information Commissioner. Survellience and monitoring--drones. https://www.oaic.gov.au/privacy/your-privacy-rights/surveillance-and-monitoring/drones/.
[63]
M. Ongtang, S. McLaughlin, W. Enck, and P. McDaniel. Semantically rich application-centric security in Android. In Annual Computer Security Applications Conference, 2009.
[64]
Pixhawk 4 Flight Controller. https://docs.px4.io/v1.9.0/en/flight_controller/pixhawk4.html.
[65]
J-S. Pleban, R. Band, and R. Creutzburg. Hacking and securing the AR Drone 2.0 quadcopter: Investigations for improving the security of a toy. In Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2014, volume 9030, 2014.
[66]
PX4 Autopilot Software. https://px4.io/.
[67]
M. Quigley, K. Conley, B. Gerkey, J. Faust, T. Foote, J. Leibs, R. Wheeler, and A. Y. Ng. ROS: An Open-source Robot Operating System. In ICRA workshop on open source software, volume 3.2, 2009.
[68]
Transparency Market Research. Robot Operating System Market - Snaphshot, 2018. https://www.transparencymarketresearch.com/robot-operating-system-market.html.
[69]
F. J. Rodr'iguez-Lera, V. Matellán-Olivera, J. Balsa-Comerón, Á. M. Guerrero-Higueras, and C. Fernández-Llamas. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots. Frontiers in ICT, 5, 2018.
[70]
F. Roesner, D. Molnar, A. Moshchuk, T. Kohno, and H. J. Wang. World-driven access control for continuous sensing. In ACM Conference on Computer and Communications Security, 2014.
[71]
ROS.org--Powering the World's Robots. https://www.ros.org.
[72]
ROS 2--ROS 2 documentation, the latest version of the robot operating system. https://index.ros.org/doc/ros2/.
[73]
A. Rozantsev, V. Lepetit, and P. Fua. Flying objects detection from a single moving camera. In IEEE Conference on Computer Vision and Pattern Recognition, 2015.
[74]
The Real-time Publish-Subscribe Protocol DDS Interoperability Wire Protocol. https://www.omg.org/spec/DDSI-RTPS/2.3/PDF.
[75]
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security, 2004.
[76]
Security-enhanced Linux in Android. https://source.android.com/security/selinux.
[77]
S-H. Seo, J. Won, E. Bertino, Y. Kang, and D. Choi. A security framework for a drone delivery service. In 2nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use, 2016.
[78]
D. P. Shepard, J. A. Bhatti, T. E. Humphreys, and A. A. Fansler. Evaluation of smart grid and civilian UAV vulnerability to GPS spoofing attacks. In Radionavigation Laboratory Conference Proceedings, 2012.
[79]
H. Sun, K. Sun, Y. Wang, and J. Jing. Reliable and trustworthy memory acquisition on smartphones. IEEE Transactions on Information Forensics and Security, 10(12), December 2015.
[80]
Nvidia Jetson TX2. https://www.nvidia.com/en-us/autonomous-machines/embedded-systems/jetson-tx2/.
[81]
J. R. Vasquez, K. M. Tarplee, E. E. Case, A. M. Zelnio, and B. D. Rigling. Multisensor 3D tracking for counter small unmanned air vehicles. In Proceedings of SPIE (conference record of the Society of Photo-Optical Instrumentation Engineers), 2008.
[82]
E. Vattapparamban, .I. Güvencc, A. .I Yurekli, K. Akkaya, and S. Uluaug acc . Drones for smart cities: Issues in cybersecurity, privacy, and public safety. In International Wireless Communications and Mobile computing Conference, 2016.
[83]
A. Vijeev, V. Ganapathy, and C. Bhattacharyya. Regulating drones in restricted spaces. In 20th International Workshop on Mobile Computing Systems and Applications, 2019.
[84]
C. Wang, A. Carzaniga, D. Evans, and A. L. Wolf. Security issues and requirements for internet-scale publish-subscribe systems. In 35th Annual Hawaii International Conference on System Sciences. IEEE, 2002.
[85]
R. Wang, A. M. Azab, W. Enck, N. Li, P. Ning, X. Chen, W. Shen, and Y. Cheng. SPOKE: Scalable knowledge collection and attack surface analysis of access control policy for security enhanced Android. In ACM Asia Conference on Computer and Communications Security, 2017.
[86]
R. Wang, W. Enck, D. Reeves, X. Zhang, P. Ning, D. Xu, W. Zhou, and A. Azab. EASEAndroid: Automatic policy analysis and refinement for security enhanced Android via large-scale semi-supervised learning. In USENIX Security, 2015.
[87]
W. Wang, Y. Sun, H. Li, and Z. Han. Cross-layer attack and defense in cognitive radio networks. In IEEE Global Communications Conference, 2010.
[88]
X. Wang, K. Sun, Y. Wang, and J. Jing. DeepDroid: Dynamically Enforcing Enterprise Policy on Android Devices. In Network and Distributed Systems Security Symposium, 2015.
[89]
Y. Wang, H. Xia, Y. Yao, and Y. Huang. Flying eyes and hidden controllers: A qualitative study of people's privacy perceptions of civilian drones in the US. Proceedings on Privacy Enhancing Technologies (PoPETS), 3, 2016.
[90]
R. White, G. Caiazza, H. Christensen, and A. Cortesi. SROS1: Using and developing secure ROS1 systems. In Robot Operating System (ROS). Springer, 2019.
[91]
R. White, D. Christensen, I. Henrik, and D. Quigley. SROS: Securing ROS over the Wire, in the Graph, and through the Kernel. arXiv:1611.07060, 2016.
[92]
R. White, H. Christensen, G. Caiazza, and A. Cortesi. Procedurally provisioned access control for robotic systems. In IEEE/RSJ International Conference on Intelligent Robots and Systems, 2018.
[93]
Y. Xu and E. Witchel. Maxoid: Transparently confining mobile applications with custom views of state. In European Conference on Computer Systems, 2015.
[94]
Y. Yao, H. Xia, Y. Huang, and Y. Wang. Privacy mechanisms for drones: Perceptions of drone controllers and bystanders. In ACM SIGCHI Conference on Human Factors in Computing Systems, 2017.
[95]
A. Young. Passenger jet carrying 240 people nearly hits a drone at 15,000ft, 2018. The Daily Mail, UK, 15 September 2018.
[96]
N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Maziéres. Making information flow explicit in HiStar. In ACM/USENIX Symposium on Operating Systems Design and Implementation, 2006.

Cited By

View all
  • (2024)Mapping the Complexity of Legal Challenges for Trustworthy Drones on Construction Sites in the United KingdomACM Journal on Responsible Computing10.1145/36646171:3(1-26)Online publication date: 22-Jul-2024
  • (2024)DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670442(1-11)Online publication date: 30-Jul-2024
  • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
  • Show More Cited By

Index Terms

  1. Privaros: A Framework for Privacy-Compliant Delivery Drones

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security
    October 2020
    2180 pages
    ISBN:9781450370899
    DOI:10.1145/3372297
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 November 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. drones
    2. mandatory access control
    3. privacy
    4. ros
    5. trusted computing

    Qualifiers

    • Research-article

    Conference

    CCS '20
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)96
    • Downloads (Last 6 weeks)11
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Mapping the Complexity of Legal Challenges for Trustworthy Drones on Construction Sites in the United KingdomACM Journal on Responsible Computing10.1145/36646171:3(1-26)Online publication date: 22-Jul-2024
    • (2024)DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote AttestationProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670442(1-11)Online publication date: 30-Jul-2024
    • (2024)Recovery from Adversarial Attacks in Cyber-physical Systems: Shallow, Deep, and Exploratory WorksACM Computing Surveys10.1145/365397456:8(1-31)Online publication date: 26-Apr-2024
    • (2024)Fly-ABAC: Attribute Based Access Control for the Navigation of Unmanned Aerial Vehicles2024 IEEE International Conference on Big Data (BigData)10.1109/BigData62323.2024.10825924(7471-7476)Online publication date: 15-Dec-2024
    • (2024)Understanding, describing, and mitigating the flow of personal data in ROS 2 systems to comply with the GDPR and beyond.*2024 IEEE International Conference on Advanced Robotics and Its Social Impacts (ARSO)10.1109/ARSO60199.2024.10557807(146-152)Online publication date: 20-May-2024
    • (2023)Security and privacy risks in drone-based last mile deliveryEuropean Journal of Information Systems10.1080/0960085X.2023.221474433:5(617-630)Online publication date: 17-May-2023
    • (2022)SWARMFLAWFINDER: Discovering and Exploiting Logic Flaws of Swarm Algorithms2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833685(1808-1825)Online publication date: May-2022
    • (2022)A Review on Security Issues and Solutions of the Internet of DronesIEEE Open Journal of the Computer Society10.1109/OJCS.2022.31830033(96-110)Online publication date: 2022
    • (2021)Towards a Modular Attestation Framework for Flexible Data Protection for Drone Systems2021 17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMob52687.2021.9606269(96-102)Online publication date: 11-Oct-2021
    • (2020)HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic EncryptionSecurity, Privacy, and Applied Cryptography Engineering10.1007/978-3-030-66626-2_8(147-166)Online publication date: 22-Dec-2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media