Smart-m3 Security Demo (k. yudenok)
Click here to load reader
-
Upload
kirill-krinkin -
Category
Technology
-
view
342 -
download
3
description
Transcript of Smart-m3 Security Demo (k. yudenok)
![Page 1: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/1.jpg)
The basic elements of the security mechanisms for
the Smart Space Smart-M3 platform
Kirill Yudenok, ETU OSLL
![Page 2: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/2.jpg)
Smart-M3 over HIP
working of the Smart Space Smart-M3platform over the Host Identity Protocol(HIP);
supporting of some base securitymechanisms that are inherited from theprotocol.
![Page 3: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/3.jpg)
Host Identity Protocol
hosts mobility and multihoming;
security and privacy over IPv4 and IPv6networks;
NAT traversal and Name Lookup.
![Page 4: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/4.jpg)
Smart-M3 over HIP HIP allows working with IPv4/IPv6
applications;
using HIPL realization of HIP;
mapping IP HIT [LSI – IPv4 addressesof HIP], change SIB IP to HIP LSI andconnect as usual.
![Page 5: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/5.jpg)
Smart-M3 – HIP scheme
![Page 6: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/6.jpg)
RDF-graph mapping to the VFS
mapping of Smart Space (SS) RDF-graphtriples to the virtual file system (VSF),which will use basic FS securitymechanisms, as ACL, roles;
mapping model is similar to thediscretionary security model and can beeasily extended to the role.
![Page 7: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/7.jpg)
RDF-graph mapping to the VFS RDF-graph mapping to the VFS allows us to
set permissions rights in a Linux-usual way; this implementation can be realized with the
FUSE technology (fusekit);
![Page 8: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/8.jpg)
VFS directory structure
mapping RDF-graph to the special VFSdirectory structure for a more accuratesetting of access rights to the SS triples(information);
![Page 9: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/9.jpg)
The place of RDF-graph mapping
![Page 10: Smart-m3 Security Demo (k. yudenok)](https://reader038.fdocuments.in/reader038/viewer/2022100420/546458dbb4af9f493f8b495f/html5/thumbnails/10.jpg)
Future steps
HIP-agent development;
implementation of mapping model to theSmart-M3 platform;
set permissions tool development formapping FS;