[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2611286.2611310acmconferencesArticle/Chapter ViewAbstractPublication PagesdebsConference Proceedingsconference-collections
research-article

Policy enforcement within emerging distributed, event-based systems

Published: 26 May 2014 Publication History

Abstract

Computing is becoming increasingly ubiquitous. To fully realise the potential of emerging distributed systems, it must be possible to manage and bring together (coordinate) system components in various ways---perhaps for purposes and in circumstances not contemplated by their designers. Therefore, we believe that the application logic embodied in components should be separated from the policy that specifies where, how and for what purpose they should be used.
This paper explores how supporting infrastructure can enable policy, representing high-level (user) or systems concerns, to drive system functionality. SBUS is a middleware that supports secure, dynamic reconfiguration, providing the means for policy enforcement across system components. We present SBUS to demonstrate the practical aspects and design considerations in a) making infrastructure policy-compliant, and b) leveraging the dynamic policy enforcement capabilities to achieve particular functional goals.

References

[1]
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless Sensor Networks: A Survey. Computer Networks, 38(4):393--422, Mar. 2002.
[2]
J. Bacon, A. I. Bejan, A. R. Beresford, D. Evans, R. J. Gibbens, and K. Moody. Using Real-Time Road Traffic Data to Evaluate Congestion. In LNCS 6875, pages 93--117. Springer, 2011.
[3]
J. Bacon, D. Eyers, T. Pasquier, J. Singh, I. Papagiannis, and P. Pietzuch. Information flow control for secure cloud computing. Transactions on Network and Service Management, Special Issue on Cloud Service Management, PP(99):1--14, 2014.
[4]
J. Bacon, J. Singh, D. Trossen, D. Pavel, A. Bontozoglou, N. Vastardis, K. Yang, S. Pennington, S. Clarke, and G. Jones. Personal and social communication services for health and lifestyle monitoring. In Global Health 2012, Venice, Oct 2012.
[5]
M. Baldauf, S. Dustdar, and F. Rosenberg. A survey on context-aware systems. International Journal of Ad Hoc and Ubiquitous Computing, 2(4):263--277, June 2007.
[6]
A. Ben Hamida, F. Kon, G. Ansaldi Oliva, C. E. M. Dos Santos, J.-P. Lorré, M. Autili, G. De Angelis, A. Zarras, N. Georgantas, V. Issarny, and A. Bertolino. The Future Internet, chapter An Integrated Development and Runtime Environment for the Future Internet, pages 81--92. Springer-Verlag, Berlin, Heidelberg, 2012.
[7]
C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, and D. Riboni. A survey of context modelling and reasoning techniques. Pervasive and Mobile Computing, 6(2):161--180, 2010.
[8]
G. S. Blair, A. Bennaceur, N. Georgantas, P. Grace, V. Issarny, V. Nundloll, and M. Paolucci. The Role of Ontologies in Emergent Middleware: Supporting Interoperability in Complex Distributed Systems. In ACM/IFIP/USENIX Middleware 2011, Springer LNCS 7049, pages 410--430, 2011.
[9]
S. Chakravarthy. Early active database efforts: A capsule summary. IEEE Transactions on Knowledge and Data Engineering, 7(6):1008--1010, 1995.
[10]
M. Chen, S. Gonzalez, A. Vasilakos, H. Cao, and V. C. Leung. Body Area Networks: A Survey. Mobile Networks and Applications, 16(2):171--193, 2011.
[11]
T. Dierks and C. Allen. The TLS Protocol (RFC 2246). Internet Engineering Task Force, 1999.
[12]
B. Haslhofer and W. Klas. A Survey of Techniques for Achieving Metadata Interoperability. ACM Computing Surveys, 42(2):1--37, Mar. 2010.
[13]
N. Ibrahim and F. Le Mouël. A Survey on Service Composition Middleware in Pervasive Environments. International Journal of Computer Science Issues, 1:1--12, Aug 2009.
[14]
D. Ingram. Reconfigurable Middleware for High Availability Sensor Systems. In ACM 3rd International Conference on Distributed Event-Based Systems (DEBS'09), 2009.
[15]
S. Kalasapur, M. Kumar, and B. Shirazi. Dynamic Service Composition in Pervasive Computing. IEEE Transactions on Parallel and Distributed Systems, 18(7):907--918, 2007.
[16]
F. Kon, F. Costa, G. Blair, and R. H. Campbell. The case for reflective middleware. Communications of the ACM, 45(6):33--38, Jun 2002.
[17]
I. Leontiadis, C. Efstratiou, C. Mascolo, and J. Crowcroft. SenShare: Transforming Sensor Networks into Multi-application Sensing Infrastructures. In European Conference on Wireless Sensor Networks, pages 65--81, 2012.
[18]
C. Mascolo, L. Capra, and W. Emmerich. Advanced Lectures on Networking, chapter Mobile Computing Middleware, pages 20--58. Springer, 2002.
[19]
N. Matthys, C. Huygens, D. Hughes, J. Ueyama, S. Michiels, and W. Joosen. Policy-Driven Tailoring of Sensor Networks. In Springer, Sensor Systems and Software, S-CUBE'10, pages 20--35, 2010.
[20]
N. H. Minsky and V. Ungureanu. Law-governed interaction. ACM Transactions on Software Engineering Methodologies, 9(3):273--305, 2000.
[21]
G. Mühl, L. Fiege, and P. Pietzuch. Distributed Event-Based Systems. Springer-Verlag, New York, 2006.
[22]
V. Raychoudhury, J. Cao, M. Kumar, and D. Zhang. Middleware for pervasive computing: A survey. Perv. Mob. C., 9(2):177--200, 4 2013.
[23]
S. M. Sadjadi and P. K. McKinley. A survey of adaptive middleware. Michigan State University Report MSU-CSE-03-35, 2003.
[24]
J. Singh. Controlling the dissemination and disclosure of healthcare events. PhD thesis, University of Cambridge, and Computer Laboratory Technical Report TR 770, 2009.
[25]
J. Singh and J. Bacon. Governance in patient-centric healthcare. In i-Society, pages 502--509, 2010.
[26]
J. Singh and J. Bacon. On middleware for emerging health services. In Journal of Internet Services and Applications (to appear), 2014.
[27]
J. Singh and J. Bacon. SBUS: A generic, policy-enforcing middleware for open pervasive systems. University of Cambridge Computer Laboratory Technical Report TR 850, 2014.
[28]
J. Singh, D. M. Eyers, and J. Bacon. Disclosure control in multi-domain publish/subscribe systems. In ACM 5th International Conference on Distributed Event-Based Systems, DEBS'11, pages 159--170, 2011.
[29]
J. Singh, L. Vargas, J. Bacon, and K. Moody. Policy-Based Information Sharing in Publish/Subscribe Middleware. In IEEE 9th Symposium on Policy for Distributed Systems and Networks, Policy'08, pages 137--144, Palisades, NY, USA, June 2008. IEEE Computer Society.
[30]
M. Sloman. Policy driven management for distributed systems. Kluwer, Journal of Network and Systems Management, 2:333--360, 1994.
[31]
K. Twidle, E. Lupu, N. Dulay, and M. Sloman. Ponder2 - A policy environment for autonomous pervasive systems. In IEEE Symposium on Policy for Distributed Systems and Networks (Policy'08), pages 245--246, 2008.
[32]
M. Wang, J. Cao, J. Li, and S. K. Das. Middleware for wireless sensor networks: A survey. Journal of Computing Science and Technology, 23(3):305--326, 2008.
[33]
A. Wun and H.-A. Jacobsen. A Policy Management Framework for Content-Based Publish/Subscribe. In ACM/IFIP/USENIX Middleware 2007, Springer LNCS 4834, pages 368--388, 2007.

Cited By

View all
  • (2020)A Taxonomy for Security Flaws in Event-Based SystemsApplied Sciences10.3390/app1020733810:20(7338)Online publication date: 20-Oct-2020
  • (2019)CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAPDigital Twin Technologies and Smart Cities10.1007/978-3-030-18732-3_9(151-175)Online publication date: 23-Jul-2019
  • (2019)Present Scenarios of IoT Projects with Security Aspects FocusedDigital Twin Technologies and Smart Cities10.1007/978-3-030-18732-3_7(95-122)Online publication date: 23-Jul-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
DEBS '14: Proceedings of the 8th ACM International Conference on Distributed Event-Based Systems
May 2014
371 pages
ISBN:9781450327374
DOI:10.1145/2611286
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 May 2014

Check for updates

Author Tags

  1. enforcement
  2. event-based systems
  3. internet of things
  4. middleware
  5. pervasive
  6. policy
  7. reconfiguration
  8. security
  9. service

Qualifiers

  • Research-article

Funding Sources

Conference

DEBS '14

Acceptance Rates

DEBS '14 Paper Acceptance Rate 16 of 174 submissions, 9%;
Overall Acceptance Rate 145 of 583 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 17 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)A Taxonomy for Security Flaws in Event-Based SystemsApplied Sciences10.3390/app1020733810:20(7338)Online publication date: 20-Oct-2020
  • (2019)CoAP—Application Layer Connection-Less Lightweight Protocol for the Internet of Things (IoT) and CoAP-IPSEC Security with DTLS Supporting CoAPDigital Twin Technologies and Smart Cities10.1007/978-3-030-18732-3_9(151-175)Online publication date: 23-Jul-2019
  • (2019)Present Scenarios of IoT Projects with Security Aspects FocusedDigital Twin Technologies and Smart Cities10.1007/978-3-030-18732-3_7(95-122)Online publication date: 23-Jul-2019
  • (2018)Attackers Constantly Threaten the Survival of Organisations, but there is a New Shark in the Water: Carcharodon Carcharias Moderator Europa Universalis2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)10.1109/CyberSecPODS.2018.8560684(1-5)Online publication date: Jun-2018
  • (2018)Security Challenges and Concerns of Internet of Things (IoT)Cyber-Physical Systems: Architecture, Security and Application10.1007/978-3-319-92564-6_7(153-185)Online publication date: 21-Sep-2018
  • (2018)Internet of Cloud: Security and Privacy IssuesCloud Computing for Optimization: Foundations, Applications, and Challenges10.1007/978-3-319-73676-1_11(271-301)Online publication date: 27-Feb-2018
  • (2017)Camflow: Managed Data-Sharing for Cloud ServicesIEEE Transactions on Cloud Computing10.1109/TCC.2015.24892115:3(472-484)Online publication date: 1-Jul-2017
  • (2016)Big ideas paperProceedings of the 17th International Middleware Conference10.1145/2988336.2988349(1-15)Online publication date: 28-Nov-2016
  • (2016)Enhancing applications with filtering of XML message streamsProceedings of the 20th International Database Engineering & Applications Symposium10.1145/2938503.2938509(322-327)Online publication date: 11-Jul-2016
  • (2016)Information Flow Control with Minimal Tag DisclosureProceedings of the International Conference on Internet of things and Cloud Computing10.1145/2896387.2896402(1-4)Online publication date: 22-Mar-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media