You are on page 1of 4

2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

An Authentication Model for IoT Clouds

Luciano Barreto∗ , Antonio Celesti† , Massimo Villari† , Maria Fazio† , Antonio Puliafito †

∗ Federal University of Santa Catarina, Brazil - lucianobarreto@das.ufsc.br


† Università degli Studi di Messina, Italia - {acelesti, mvillari, mfazio, apuliafito}@unime.it

Abstract—Nowadays, the combination between Cloud com- way is fundamental [4]. In addition, how to make IoT devices
puting and Internet of Things (IoT) is pursuing new levels of trusted with the Cloud system is a big concern. In fact, security
efficiency in delivering services, representing a tempting business is one of the major issues that slows down the large adoption
opportunity for IT operators of increasing their revenues. How- of IoT Cloud providers.
ever, security is considered as one of the major factors that slows
down the rapid and large scale adoption and deployment of both In this paper, considering such a scenario, we present an
IoT and Cloud computing. In this paper, considering such an IoT authentication system model for IoT Clouds and we discuss
Cloud scenario, we present an architectural model and several several authentication use cases that allow users and manufac-
use cases that allow different types of users to access IoT devices. turers to access IoT devices in a secure way. In particular, our
use cases are based on the Identity Provider/Service Provider
Keywords—Cloud computing, internet of things, security, au- (IdP/SP) model. The paper is organized as follows. Section
thentication. II briefly describes the state of the art of IoT Cloud security.
A generic authentication system blueprint for IoT Clouds is
presented in Section III. In Section IV, we describe several
I. I NTRODUCTION authentication use cases for IoT Cloud and the resulting
Nowadays, the combination between IoT and Cloud com- protocol flows formalized by means of different sequence
puting is pursuing new levels of efficiency in delivering diagrams. Section V concludes the paper.
services, representing a tempting business opportunity for IT
operators of increasing their revenues. As highlighted in the II. R ELATED W ORK
Digital Agenda for Europe [1], one of the key challenges for Nowadays, security is considered as one of the major
the European Commission is to have a globally competitive factors that slows down the rapid and large scale adoption
Cloud infrastructure for the “Internet of Services” intercon- and deployment of both IoT and Cloud computing. In fact,
nected with “Things” distributed over remote areas. IoT is cur- security in IoT and Cloud computing is a widely discussed
rently applied to different contexts, such as building construc- topic [5]. An overview of the main security challenges in
tion, car traffic monitoring, environmental analysis, health-care IoT-aided robotics applications is presented in [6], specifically
assistance, weather forecasting, video surveillances, and so on. focusing on network security. In [7] the authors investigate the
As a consequence, IoT will offer new services for making possibility to unify resilient Cloud computing and secure IoT
cities “smarter” and it will improve the interaction of people in Smart Cities scenarios. In [8], the authors investigate the
and IoT devices/services with the surrounding environments, security issues and challenges on the IoT-based Smart Grids
increasing the citizens’ quality of life [2]. The emerging (SG), and define the major security services that should be
business perspectives coming from IoT are pushing private, considered when dealing with SG security. In [9], the authors
public, and hybrid Cloud providers to integrate their systems discuss how to perform a self-identification process in order
with IoT devices (i.e., embedded devices including sensors and to achieve a secure auto-configuration of IoT devices joining
actuators) in order to provide new services [3]. Thus, new types the Cloud. In [10], the authors describe the security issues
of providers that combine the traditional Cloud computing related to IoT data acquisition, identifying three threats: i) data
paradigm with IoT have been rising. There is not limit to the transfer between IoT devices; ii) data transfer between devices
possible scenarios that can be accomplished putting together and other parties, such as users and Clouds; iii) security issues
IoT and Cloud computing. In our opinion, IoT can appear as related to the configuration made by users on their devices.
a natural extension of Cloud computing, in which the Cloud
allows users to access IoT based resources and capabilities to
III. AUTHENTICATION M ODEL FOR I OT C LOUDS
manage many different intelligent pervasive environments. In
addition, Cloud computing can support the delivery of IoT as In this Section, we present an architectural system model
a Service (IoTaaS). In fact, we can talk about IoT Cloud or including all the software components required to allow users
Sensing Cloud to indicate a new type of distributed system to access IoT resources and services in a secure way. In
consisting of a set of smart objects or embedded systems particular, we focus on how users can access IoT devices
interconnected with a remote Cloud infrastructure, platform, or either directly or through the Cloud provider. In our reference
software through the Internet able to provide different types of scenario, we assume that IoT devices can be connected to the
IoTaaS. Commonly, users deal with the sensing information in Cloud provider either in a transparent way or explicitly. To
order to make decisions in different application fields. Based this end, in this paper, we specifically focus on authentica-
on these assumptions, accessing these pieces of data in a secure tion mechanisms for users accessing the IoT Cloud. In our

ASONAM '15, August 25-28, 2015, Paris, France 1032


© 2015 ACM. ISBN 978-1-4503-3854-7/15/08 $15.00
DOI: http://dx.doi.org/10.1145/2808797.2809361
2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

architectural model, we consider both direct user’s request A. IoT Device


access to IoT devices and user’s request access to IoT devices
performed through the IoT Cloud. In order to achieve a secure The IoT device includes two layers: hardware and software.
IoT Cloud, several software components need to be integrated In the hardware layer, physical items such as sensors, actuators,
to enable users to access IoT devices in a secure way. . An and a Trusted Platform Module (TPM) are integrated. The
overview of the proposed architectural model is depicted in reliability of connected IoT devices is of utmost importance.
Figure 1. In this paper, we specifically focus on authentication. According to such a requirement, in the proposed system
model, each IoT device includes a TPM in order to accomplish
a chain of trust from hardware to software components. The
TPM is typically a chip connected on the board of a device.
In our model, through the TPM, clients can be sure that
IoT Cloud Provider Manufacturer the hardware/software configuration of the IoT device has
IdM
Basic User IoT Plataform not been corrupted. This is possible by means of remote
attestation mechanism that is out of scope in this paper. Further
Advanced User
Admin Flow
details on trusted computing in IoT are available in [11].
Layer
SW

User Ring Admin Ring


Authentication Flow Despite of the use of TPM, it generally implies a model with
Sensor
Layer

Data Flow
HW

FPGA
Actuator
TPM
Smartcard static certificates. For this reason, in this paper, we consider
IoT Device dynamic certificates issued by a trusted third parties, such as
a Certification Authority (CA), as already discussed in [12].
Fig. 1: IoT Cloud system model. Besides the components for maintaining the safety of the IoT
device, sensors and actuators are connected to the hardware.
Sensors are responsible for reading environmental data (e.g.,
temperature, light movement, and so on), whereas the actuators
Authorization and auditing mechanisms are out of scope of are responsible for performing actions (e.g., turning on/off a
this scientific work. In order to design an authentication model light, switch on/off an engine, and so on). As previously stated,
for IoT Clouds, we specifically considered the IdP/SP model. IoT devices have to be available according to different kinds of
More specifically, it allows the exchange of authentication clients: Basic User, Admin User, Cloud Platform, and Manu-
assertions between an IdP (i.e., a producer of assertions) facturers. Basic Users should have access to only the high-level
and a generic SP (i.e., a consumer of assertions). Typically, functions of IoT devices (through the Cloud) such as reading
the IdP/SP model consists of: a subject, i.e., a person or data and sending commands to actuators (if applicable). On the
a software/hardware entity that assumes a particular digital other hand, Admin Users, Cloud Providers, and Manufacturers
identity and that interacts with a SP; a SP or relying party, should have low-level access to IoT devices in order to manage
a system, or administrative domain, that relies on information digital certificates and also, in the case of Manufacturers, to
supplied by a trusted IdP; an IdP or asserting party, a system, update the firmware. Given these requirements, in the software
or administrative domain, that is trusted with one or more layer, the User Ring and Admin Ring components respectively
SPs and that asserts authentication information regarding a manages the authentications for accessing high-level and low-
subject. This model allows to carry out the Single-Sign-On level functionalities.
(SSO) authentication, i.e., once the subject has performed an
authentication on an IdP, he/she gains the access to all the
SPs that are trusted with that IdP. In addition, this model also B. Basic and Admin Users
allows to carry out Single-Log-Out (SLO) tasks. Similarly to traditional Cloud computing environments,
also in IoT users may have different access requirements.
According to the IdP/SP model, the proposed architec- For some users, a per-processed information coming from the
tural blueprint can be broken down into different software services offered by the IoT Cloud platform are enough, instead
components. Some of them acting as SPs, (i.e., IoT device for others, raw sensing data are required. In this regard, we
and Cloud Platform), other acting as subjects (i.e., Basic identified two kinds of users: “Basic User” and “Advanced
Users, Advanced User, IoT Platform, and Manufacturer). In User”; The “Basic User” is able to access the resources and
addition, we considered two administrative domains respec- services of IoT devices through an IoT Platform supplied
tively managing two types of user’s authentications: Basic by the Cloud provider. In this case, the user access virtual
and Advanced. According to the Basic User authentication, sensing resources and services offered by IoT devices, through
the Basic User can access services and resources of the IoT the IoT Cloud Platform, but he/she is not aware about their
device through the Cloud Platform. In this case, IoT devices hardware/software configurations. This software abstraction is
are transparent for the Basic User. The Cloud Platform plays typically called virtual sensing, and services are provided in
two roles: in the first phase of the Basic User authentication form of IoTaaS. The “Advanced User” is able to perform a
it acts as SP, in order to allow the user to access the Cloud, direct access to IoT devices. In this case, users can directly
whereas, in the second phase, it acts as principal performing an access raw data coming from sensors, and if required, they
authentication on the IoT device on behalf of the Basic User. can directly control actuators. In addition, users are also able
Instead, in the Advanced User authentication, the Admin User, setup the devices.
the Cloud Platform, and the Manufacturer can directly access
the IoT device for advanced maintenance tasks. For example, C. Manufacturer
the Admin User can perform an advanced setup, whereas the
Manufacturer can perform firmware updates. In the following, Manufactures are responsible for selling/providing IoT
we better describe the aforementioned components. devices to users and to manage the life cycle of their pieces

1033
2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

of firmware. Typically, the IoT Cloud provider is responsible process in different IoT Cloud scenarios. In the following,
to control the IoT device once it has joined the system. When using the sequence diagram notation, we describe two use
Manufactures need to remotely access these IoT devices they cases required to establish authentication processes. The first
have always to contact the IdP of the IoT Cloud provider one is related to users accessing IoT devices, instead the second
to which the IoT device is connected to and this latter will one is related to a firmware update of the IoT device performed
grant access through an authentication process. As described, a the manufacturer.
Manufactures have a privileged access to IoT devices through
the Admin Ring interface that allows them to make low-level
tasks. A. User Access Use Case
As we previously described, we have identified two dif-
D. IoT Cloud Provider ferent types of users, i.e., Basic and Advanced. These users
The IoT Cloud provider acts as a traditional Cloud com- interact in different ways with the IoT Cloud provider and as-
puting entity extended with two main components: IoT Cloud sociated IoT devices. Below, we describe how the interactions
Platform and IdP. The details of these components will be of these types of users take place.
described below. The IoT Cloud provider operates in a well- 1) Basic User: Figure 2 depicts the authentication process
known Cloud computing model. However, instead of man- for Basic Users. In particular, they access IoT devices through
aging only computing, storage, and network resources, these the Cloud IoT platform. More specifically, the user interacts
providers also manage IoT devices. IoT Cloud provider acts as with the IoT Cloud Provider (Figure2 - Step 1) and starts
a distributed system to which these devices can be connected, an authentication process in order to access the IoT platform
maintaining security, QoS, and other features. Basic Users (Steps 2 and 3). If the user identity is verified, he/she accesses
access IoT devices via the Cloud Provider, so that the provider the IoT Cloud Platform (Step 5) and he/she is able to request
has to manage access control policies. In addition, an IoT IoT services and resources to the IoT Cloud Platform, which
Cloud provider can be considered as a particular type of in turn, accesses IoT devices in a transparent manner for the
Advanced User because it is able to perform a direct access user. In order to maintain security contexts, the IoT device
to IoT devices. authenticates the Cloud Provider using SSO mechanisms (Step
1) IoT Cloud Platform: The IoT Cloud Platform is system 7) and then it sends the Cloud Provider related information.
able to manage IoT devices. According to a Platform as a After this step, the Cloud provider processes raw pieces of
Service (PaaS) model, it offers Application Program Inter- sensing data and sends them back to the user. A similar
faces (APIs) for controlling IoT devices in a simplified way. scenario is possible also considering actuators.
Commonly, services are provided in form IoTaaS and they
allow users to access and process pieces of data coming from
IoT devices and to control actuators. This type of platform User IoT Device IoT Cloud Pr ovider
IoT Cloud Pr ovider
IdM

organization well suits a scenario in which, IoT devices owners 1: IoT Data Request
may not be interested in making devices directly available 2: Request Credentials
for end users, but just through IoT Cloud Providers. Thus, 3: Send Credencials

this platform acts as an intermediate software layer between


end-users and IoT devices, abstracting them. The IoT Cloud 4: Authenticate User

Platform can act as either Advanced User or Basic User 5: Grant Access to
according to different scenarios. 6: Request Data
IoT Plataform

2) IdM: One of the major issues of Cloud Computing 7: SSO Cloud Authentication

systems is how to secure the access to resources and services.


To this end, usually, Cloud providers adopt an IdP that plays 8: Send Data

the role of Identity Manager (IdM). The main task of an IdM is 9: Format raw data
the management of users’ credentials. Particularly, according to
10: User get the data
our system model, the IdP addresses the identity management
functionalities of users accessing IoT devices. Considering Ad-
vanced Users, Cloud Platforms, or Manufacturers who/which
directly access several IoT devices, the IdP allows them to take Fig. 2: Basic User Access.
the advantages of the SSO and SLO functionalities, drastically
reducing the number or required credentials.

IV. AUTHENTICATION U SE C ASES OF I OT C LOUDS 2) Advanced User: Figure 3 depicts the authentication pro-
cess for Advanced Users. Advanced Users directly access IoT
In this Section, according to both our authentication system devices. However, in order to perform such an authentication,
model and the Secure Assertion Markup Language (SAML) users have to authenticate themselves by means of the IoT
approach, we describe general authentication use cases for IoT Cloud IdP, as well as Basic Users. The authentication process
Clouds. In addition, the resulting protocol flows are formalized occurs in a similar way. However, after the step 4, the user
by means of specific sequence diagrams. More specifically, our is directly redirected to the IoT device be means of a SSO
goal is to describe how the involved actors and components authentication. If the user is authorized, he can access the IoT
interact each other in order to carry out an authentication device for administrative tasks.

1034
2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining

IoT Cloud Pr ovider


Manufacturer IoT Device
User IoT Device IoT Cloud Pr ovider IdM

1: Device Firmware Request


1: IoT Access Request
2: Request Credentials
2: Request Credentials
3: Send Credencials
3: Send Credencials

4: Authenticate Manufacturer

4: Authenticate User

5: Generate Authentication Token


5: Redirect to Device
6: Device Access
6: Grant Access (SSO)

7: SSO Authentication
7: Access Device

8: Firmware Update
8: Access Granted
9: Request Data
10: User get the data

Fig. 4: Manufacturer Access.

Fig. 3: Advanced User Access.

[2] M. Villari, A. Celesti, M. Fazio, and A. Puliafito, “Alljoyn lambda:


An architecture for the management of smart environments in iot,”
B. Manufacturer Access Use Case in 2014 International Conference on Smart Computing Workshops
(SMARTCOMP Workshops), Nov 2014, pp. 9–14.
The Manufacturer can periodically access the IoT device [3] M. Fazio, A. Celesti, M. Villari, and A. Puliafito, “The need of a hybrid
for firmware updates, configuration setup, bug fixing, and storage approach for iot in paas cloud federation,” in 28th International
Conference on Advanced Information Networking and Applications
other administration tasks. Figure 4 depicts the authentication Workshops (WAINA), May 2014, pp. 779–784.
process for Advanced Users For these operations, the Manufac- [4] M. Fazio, A. Celesti, A. Puliafito, and M. Villari, “An integrated
turer needs to access the IoT device by means of the IoT Cloud system for advanced multi-risk management based on cloud for iot,”
IdP (Step1). Since the system must guarantee security for each in Advances onto the Internet of Things, ser. Advances in Intelligent
operation, the Manufacturer needs to perform an authentication Systems and Computing, S. Gaglio and G. Lo Re, Eds. Springer
in order do gain the access to the IoT device (Steps 2, 3, 4, and International Publishing, 2014, vol. 260, pp. 253–269.
5). After the authentication process, the Manufacturer accesses [5] Z.-K. Zhang, M. C. Y. Cho, and S. Shieh, “Emerging security threats
and countermeasures in iot,” in Proceedings of the 10th ACM Sym-
to the IoT device using a SSO mechanism (Step 6). From posium on Information, Computer and Communications Security, ser.
now on, the Manufacture has the access to the IoT device and ASIA CCS ’15. New York, NY, USA: ACM, 2015, pp. 1–6.
since its credentials are verified, it is authorized to perform [6] L. Grieco, A. Rizzo, S. Colucci, S. Sicari, G. Piro, D. D. Paola, and
administrative tasks. G. Boggia, “Iot-aided robotics applications: Technological implications,
target domains and open issues,” Computer Communications, vol. 54,
no. 0, pp. 32 – 47, 2014.
V. C ONCLUSION [7] G. Suciu, A. Vulpe, S. Halunga, O. Fratu, G. Todoran, and V. Suciu,
“Smart cities built on resilient cloud computing and secure internet of
In this paper, we proposed asystem model and several au- things,” in Control Systems and Computer Science (CSCS), 2013 19th
thentication use cases for IoT Cloud scenarios. From our study, International Conference on, May 2013, pp. 513–518.
we can conclude that designing and developing authentication [8] “Security issues and challenges for the iot-based smart grid,” Procedia
schemes in emerging IoT Cloud scenarios is not trivial at all Computer Science, vol. 34, no. 0, pp. 532 – 537, 2014.
due to the current technological limitations. In fact, the real [9] M. Villari, A. Celesti, M. Fazio, and A. Puliafito, “A secure self-
identification mechanism for enabling iot devices to join cloud com-
obstacle in the development of our scenario is represented by puting,” in Internet of Things. IoT Infrastructures, ser. Lecture Notes of
the development of TPM and related software features in IoT the Institute for Computer Sciences, Social Informatics and Telecom-
devices. In this regards, even though the Trusted Computing munications Engineering, 2015, vol. 151, pp. 306–311.
Group has recently started to look at IoT, at the time of writing [10] Y. H. Hwang, “Iot security & privacy: Threats and challenges,” in
of this paper, there are not concrete implementations yet. In Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and
this scientific work, we hope we succeeded in stimulating the Security, ser. IoTPTS ’15. New York, NY, USA: ACM, 2015, pp.
1–1.
interest of researchers and developers towards this topic.
[11] Trusted Computing Group (TCG),
http://www.trustedcomputinggroup.org.
R EFERENCES [12] P. England and T. Tariq, “Towards a programmable tpm,” Lecture Notes
in Computer Science (including subseries Lecture Notes in Artificial
[1] Unleashing potential of Future Internet and Cloud computing, Intelligence and Lecture Notes in Bioinformatics), vol. 5471 LNCS,
http://ec.europa.eu/digital-agenda/en/news/unleashing-potential-future- pp. 1–13, 2009.
internet-and-cloud-computing, November 2013.

1035

You might also like