{"title":"DIOXIN:雾应用程序的运行时安全策略实施","authors":"E. Russo, Luca Verderame, A. Armando, A. Merlo","doi":"10.1504/IJGUC.2021.114821","DOIUrl":null,"url":null,"abstract":"Fog computing is an emerging distributed computational paradigm that moves the computation towards the edge (i.e., where data are produced). Although Fog operating systems provide basic security mechanisms, security controls over the behaviour of applications running on Fog nodes are limited. For this reason, applications are prone to a variety of attacks. We show how current Fog operating systems (with a specific focus on Cisco IOx) are actually unable to prevent these attacks. We propose a runtime policy enforcement mechanism that allows for the specification and enforcement of user-defined security policies on the communication channels adopted by interacting Fog applications. We prove that the proposed technique reduces the attack surface of Fog computing w.r.t. malicious applications. We demonstrate the effectiveness of the proposed technique by carrying out an experimental evaluation against a realistic Fog-based IoT scenario for smart irrigation.","PeriodicalId":375871,"journal":{"name":"Int. J. Grid Util. Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"DIOXIN: runtime security policy enforcement of fog applications\",\"authors\":\"E. Russo, Luca Verderame, A. Armando, A. Merlo\",\"doi\":\"10.1504/IJGUC.2021.114821\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fog computing is an emerging distributed computational paradigm that moves the computation towards the edge (i.e., where data are produced). Although Fog operating systems provide basic security mechanisms, security controls over the behaviour of applications running on Fog nodes are limited. For this reason, applications are prone to a variety of attacks. We show how current Fog operating systems (with a specific focus on Cisco IOx) are actually unable to prevent these attacks. We propose a runtime policy enforcement mechanism that allows for the specification and enforcement of user-defined security policies on the communication channels adopted by interacting Fog applications. We prove that the proposed technique reduces the attack surface of Fog computing w.r.t. malicious applications. We demonstrate the effectiveness of the proposed technique by carrying out an experimental evaluation against a realistic Fog-based IoT scenario for smart irrigation.\",\"PeriodicalId\":375871,\"journal\":{\"name\":\"Int. J. Grid Util. Comput.\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Grid Util. Comput.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJGUC.2021.114821\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Grid Util. Comput.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJGUC.2021.114821","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
DIOXIN: runtime security policy enforcement of fog applications
Fog computing is an emerging distributed computational paradigm that moves the computation towards the edge (i.e., where data are produced). Although Fog operating systems provide basic security mechanisms, security controls over the behaviour of applications running on Fog nodes are limited. For this reason, applications are prone to a variety of attacks. We show how current Fog operating systems (with a specific focus on Cisco IOx) are actually unable to prevent these attacks. We propose a runtime policy enforcement mechanism that allows for the specification and enforcement of user-defined security policies on the communication channels adopted by interacting Fog applications. We prove that the proposed technique reduces the attack surface of Fog computing w.r.t. malicious applications. We demonstrate the effectiveness of the proposed technique by carrying out an experimental evaluation against a realistic Fog-based IoT scenario for smart irrigation.