Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains

G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L. Grieco
{"title":"Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains","authors":"G. Grieco, D. Striccoli, G. Piro, R. Bolla, G. Boggia, L. Grieco","doi":"10.1109/NetSoft54395.2022.9844030","DOIUrl":null,"url":null,"abstract":"Digital services and digital service chains are the heart beating of the modern economy. Their composition involves several players, i.e., processes, software, devices, and many kinds of data exchanged among them. In such a scenario, it is important to guarantee data confidentiality, integrity, as well as authentication and authorization procedures between the communicating parties of a service chain. Cyber-security frameworks are explicitly designed for this purpose. They rely on the integration of different software modules, mutually interfaced to accomplish complex security tasks. Nevertheless, it is important to guarantee a high level of protection during data exchange among the modules. Currently, standardized authentication and authorization mechanisms are implemented through proprietary “As-a-Service” products, but the deployment of a mature on-premise solution is still missing. To bridge this gap, this contribution proposes an authentication and authorization module that automatically protects the information flowing among the modules of cyber-security frameworks. It guarantees resource availability only to authenticated subjects. Thus, their operations are confined in what actions they are authorized for. The proposed module has been implemented and tested in a real cyber-security framework under development into the H2020 GUARD project. Experimental tests show that the proposed module enables authentication and authorization procedure delegation among GUARD modules, which eases their implementation, while maximizing the flexibility of the set of access control policies and an efficient protection of the services.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NetSoft54395.2022.9844030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Digital services and digital service chains are the heart beating of the modern economy. Their composition involves several players, i.e., processes, software, devices, and many kinds of data exchanged among them. In such a scenario, it is important to guarantee data confidentiality, integrity, as well as authentication and authorization procedures between the communicating parties of a service chain. Cyber-security frameworks are explicitly designed for this purpose. They rely on the integration of different software modules, mutually interfaced to accomplish complex security tasks. Nevertheless, it is important to guarantee a high level of protection during data exchange among the modules. Currently, standardized authentication and authorization mechanisms are implemented through proprietary “As-a-Service” products, but the deployment of a mature on-premise solution is still missing. To bridge this gap, this contribution proposes an authentication and authorization module that automatically protects the information flowing among the modules of cyber-security frameworks. It guarantees resource availability only to authenticated subjects. Thus, their operations are confined in what actions they are authorized for. The proposed module has been implemented and tested in a real cyber-security framework under development into the H2020 GUARD project. Experimental tests show that the proposed module enables authentication and authorization procedure delegation among GUARD modules, which eases their implementation, while maximizing the flexibility of the set of access control policies and an efficient protection of the services.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全框架中的身份验证和授权:保护数字服务链的新方法
数字服务和数字服务链是现代经济的命脉。它们的组成涉及几个参与者,即过程、软件、设备以及它们之间交换的多种数据。在这种情况下,重要的是要保证数据的机密性、完整性以及服务链通信各方之间的身份验证和授权过程。网络安全框架就是为此目的而明确设计的。它们依靠不同软件模块的集成,相互接口来完成复杂的安全任务。然而,在模块之间的数据交换期间,保证高水平的保护是很重要的。目前,标准化的身份验证和授权机制是通过专有的“即服务”产品实现的,但是仍然缺少成熟的本地解决方案的部署。为了弥补这一差距,本文提出了一个身份验证和授权模块,该模块可以自动保护网络安全框架模块之间流动的信息。它保证资源仅对经过身份验证的主体可用。因此,他们的操作仅限于他们被授权的行动。提出的模块已经在H2020 GUARD项目开发的真实网络安全框架中实施和测试。实验测试表明,该模块能够在GUARD模块之间实现认证和授权过程的委托,简化了各个模块的实现,同时最大限度地提高了访问控制策略集的灵活性和对服务的有效保护。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks NLP4: An Architecture for Intent-Driven Data Plane Programmability CHIMA: a Framework for Network Services Deployment and Performance Assurance Encrypted Network Traffic Classification in SDN using Self-supervised Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1