<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Usable Access Control Enabled by Sensing Enterprise Architectures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mikel Uriarte Oscar Lázaro Alicia González</string-name>
          <email>muriarte@nextel.es</email>
          <email>planta 48170 Zamudio, SPAIN olazaro@innovalia.org agonzalez@innovalia.org muriarte@nextel.es</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iván Prada Oscar López Jordi Blasi</string-name>
          <email>iprada@innovalia.org</email>
          <email>iprada@innovalia.org planta 48170 Zamudio, SPAIN planta 48170 Zamudio, SPAIN olopez@nextel.es jblasi@nextel.es</email>
          <email>jblasi@nextel.es</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eneko Olivares</string-name>
          <email>enolgor@upv.es</email>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Carlos E. Palau</string-name>
          <email>cpalau@dcom.upv.es</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Innovalia Association, Rodríguez Nextel S.A. Parque Científico y Nextel S.A. Parque Científico y</institution>
          ,
          <addr-line>Arias, 6, Dto. 605, 48008 Bilbao</addr-line>
          ,
          <institution>Tecnológico de Bizkaia, C/ CaminoTecnológico de Bizkaia</institution>
          ,
          <addr-line>C/ Camino, SPAIN de Laida Edificio 207, Bloque B 1o de Laida Edificio 207, Bloque B 1o</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Nextel S.A. Parque Científico y Innovalia Association, Rodríguez Innovalia Association</institution>
          ,
          <addr-line>Rodríguez, Tecnológico de Bizkaia, C/ Camino Arias, 6, Dto. 605, 48008 Bilbao, Arias, 6, Dto. 605, 48008 Bilbao, de Laida Edificio 207, Bloque B 1o</addr-line>
          <country>SPAIN SPAIN</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Polytechnic University of Valencia, Department of Communications, Superior Technical School of, Telecommunication Engineering</institution>
          ,
          <addr-line>Camino de Vera S / N; 46022, Valencia</addr-line>
          ,
          <country country="ES">SPAIN</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Polytechnic University of</institution>
          ,
          <addr-line>Valencia</addr-line>
          ,
          <institution>Department of</institution>
          ,
          <addr-line>Communications, Superior</addr-line>
          ,
          <institution>Technical School of, Telecommunication Engineering</institution>
          ,
          <addr-line>Camino de Vera S / N; 46022, Valencia</addr-line>
          ,
          <country country="ES">SPAIN</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In: M. Zelm (eds.): Proceedings of the 6th Workshop on Enterprise Interoperability, Nîmes, France, 27-05-2015, published at http://ceur-ws.org</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>We are watching an exponential increase on the amount and type of devices with Internet connectivity capabilities,
from very common nowadays smartphones to other more specialized devices such as machine tools in industrial
environments. This is leading to what is known as the Internet of Everything (IoE), which is an evolution of the
concept of the internet of things (IoT), in which a huge number of devices (50 billion by 2020 according to Cisco)
will interconnect people, things, processes, information, etc. All this connectivity is intrinsically linked with the
generation of a huge amount of heterogeneous information, known as BIG DATA, This boost of information is
turning companies of the future in "Sensing Enterprises", as an enterprise making use of the sensing possibilities
provided by interconnected 'environments', anticipating future decisions by using multi-dimensional information
captured through physical and virtual objects, and providing added value information to enhance its global context
awareness (Santucci et al., 2012).</p>
      <p>Today's businesses are beginning to evaluate and exploit using advanced analytical techniques that allow them to
find patterns among consumers, define more effective business strategies, analyse market reactions, and improve their
processes (cost reduction, increased production quality, streamline activities, improving information for decision
making, enhance collaboration, etc.). This unavoidably immerses them in the competitive nature that comes with the
Copyright © 2015 by the paper’s authors. Copying permitted only for private and academic purposes.
inference between Information Technology and Business Processes. Furthermore, to facilitate collaborative activities,
adapt to new business scenarios and to increased user mobility, plus supporting systems migration to the cloud, in
search for better availability, scalability and reduced total cost of the operation, business are imposed with the need of
enabling information exchange between organizations.1</p>
      <p>This operation scenario, of different connected components and “total availability”, raises a number of
disadvantages stemming mainly from the problems related to privacy, security and trust, and in most cases as a result
of unauthorized access to corporate networks and systems access. Therefore, collaboration between companies
requires security solutions and federated access control that grants trust between the parties.</p>
      <p>Access control is one of the fundamental security services used for mitigating risks in networked environments.
Therefore, it is imperative for companies to implement a robust and reliable system to ensure that their most valuable
information assets are safe. Traditionally, increasing security in access control systems is directly tied to a reduction
in the usability of user services. The ACIO project and its results provide mechanisms to improve usability in
managing access control and interoperability. These mechanisms have been validated in different application
domains, such as transport and port logistics, on stage at the Port of Valencia.</p>
      <p>This article exposes the ACIO approach to enable fast decision making in multi-domain access control
management using context-sensitive features, and the synchronization and exchange of data between the physical and
logical world. The article is structured as follows: section 2 presents the state of the art related to access control
mechanisms in organizations, after this, section 3 introduces the use case on which the solution has been validated
and the proposed architecture in the ACIO project. Following this, article IV explains the performance evaluation
carried out, and finally conclusions and future work are presented in section V.</p>
    </sec>
    <sec id="sec-2">
      <title>2. State of the Art</title>
      <p>Access control is defined as the protection of the resources of a system against unauthorized access and the process
by which the use of resources of the system is regulated according to a security policy and only allowed by entities
authorized (users, programs, processes, or other systems) in accordance with that policy2. There are two types of
access control are the physical and logical.</p>
      <p>Physical access control encompassed those security measures that are implemented in the physical world designed
to prevent unauthorized access to facilities, equipment and resources, and in this sense, protecting staff and resources.
In dependence of the required levels of security, this measures can be: (i) anti-vandalism measures; (ii) dissuasive
measures or (iii) Measures for intrusion detection and electronic surveillance. The control systems of physical access
do not necessarily work in an isolated manner, and there are complete solutions that enable a centralized management
of access control. This type of solutions allow to manage the security levels of the different access points in real time,
generate reports, conduct audits, etc. and incorporate a full range of capabilities that include: (i) Identity
Management; (ii) Management of security policy; (iii) Remote Device Management.</p>
      <p>However, physical access control presents a major shortcoming, as there is a lack of interoperability between
different available access control systems, creating problems of integration and scaling. This lack of interoperability
is caused by the unavailability of efficient standards for the effective and regulated communication between devices
from different manufacturers, since these operate under own proprietary communication protocols. This complexity
also affects negatively the processes of improving the management of access control, since this heterogeneity adds
complexity to the activities of monitoring and auditing.</p>
      <p>On the other side, logical access control is defined as the interposition of security mechanisms to prevent access of
unauthorized users to data resources at virtual level, and also the selective restriction of privileges that authorized
users have on the system's assets. Logical Access control is nowadays evolving rapidly due to the rise of cloud
services, collaboration between organizations and high usability requirements of users, and there are various
standards that have been defined and maintained to cover different aspects of logical access control in cloud
environments: (i) OpenID; (ii) OAUTH 2.0; (iii) The markup Security Assertion (SAML) and (iv) The extensible
markup language access control (XAMCL).</p>
      <p>There are a multitude of models for managing logical access control which differ mainly in the way in which the
system manages user’s privileges: (i) Mandatory Access Control (Mandatory Access Control - MAC); (ii)
discretionary access control (Discretionary access control - DAC); (iii) Access control based on roles (Role Based
Access Control - RBAC); (iv) Access control based on attributes (Attribute-Based Access Control - ABAC); (v)
Semantic-aware attribute-based access control model - SABAC); (vi) Access control based on context and semantics
(Semantic Context-Based Access Control model - SCBAC); (vii) Access control based on experience (Experience
Based Access Management - EBAM); and (viii) Based Access Control capabilities (Capacity-Based Access Control
CapBAC).</p>
      <p>The main deficiency that logical access control models available today present, is related in addressing access
control as a dichotomy between security and usability, reducing one of these aspects when reinforces the other and
vice versa, making them unsuitable for environments requiring high levels of both at the same time.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Solution</title>
      <sec id="sec-3-1">
        <title>3.1 Use Case Description</title>
        <p>The selected use case in order to validate the results of the ACIO proposed architecture for Access Control is the
dependencies of the Port of Valencia. The port has highly complex control requirements both at physical and logical
access control level. This complexity in port Access Control management is a result of the interaction of a great
variety of actors and heterogeneous elements (e.g. Containers, machinery, trucks of different operators, etc.), the high
dependency of the port’s competiveness in the fluidity of the ongoing operations, and the obligation to comply with
different rules and national and international legislation. In the port premises there are five container terminals. Most
of them support more than 4000 truck movements and 10,000 containers per day. The port management system is
based on a PCS (Port Community System) in the cloud, which manages the exchange of information among the large
number of actors from the port (port authority, customs, transport companies, companies providing services etc.),
accessing their facilities and interact in a federated way between them.</p>
        <p>The usability of the Access control management in the use case presents multiple points capable of improving and
some relevant problems. In this sense, Figure 1. Use Case Access Control Chain and related deficienciesshows the
current Access Control chain of the use case and each step related deficiencies that have been identified:</p>
        <p>With the aim of improving these aspects regarding usability without degrading the security of the AC management,
the following features are proposed which can be seen in Figure 2. Proposed Use Case AC management
improvements:</p>
        <p>Therefore, the consequent AC management of the Use case will evolve from a static, inefficient and low security
AC approach, to a secure and user centred AC management, which will provide high usability and enhanced security
in compliance with the seaports requirements.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2 ACIO architecture</title>
        <p>The application of IoE management to digital business processes has resulted in the proposal of new management
architectures for services under the umbrella of "Sensing Enterprise". This SOA 2.0 architecture, encompassing
Service Oriented and Event-driven (SOA-EDA) architectures rely on advanced middleware to interconnect
seamlessly and efficiently information (data and events) of logical and physical worlds (real, virtual and digital
information):
- Real World: Information devices that handle the physical components (sensors, actuators)
- Digital World: Digital services, analysis, modelling, metadata or multimedia information.
- Virtual World: models of virtual and augmented reality.</p>
        <p>Thus, “Sensing Enterprise” architectures allow anticipating future decisions by using multidimensional
information captured through physical objects and synchronized digital-virtual services in a transparent way to users.</p>
        <p>ACIO proposes the application of this type of advanced service management architectures and events as a
mechanism for improving the usability and performance of access control mechanisms in highly complex and
sensorized environments. The main advantage for the AC mechanisms that is provide by the logical and physical
services interconnection, is that the information generated will be used to improve decision making for Access
Control in real-time, in a transparent way to the user.</p>
        <p>For this to be possible, access control models of the different worlds must evolve and integrate into the
middleware which facilitate the sensing enterprises world’s interoperability. ACIO promotes the development of
models and Access Control solutions based in the Sensing Enterprise architectures, that can facilitate the exchange of
security information between the three worlds (real, digital and virtual), and led to a new model for access Control:
The "Sensing access control" which adds value to the access control over the architecture of the Sensing Enterprise,
as presented in Figure 3. Reference architecture model for "Sensing Access Control"</p>
        <p>According to the cluster of digital innovation process and the OSMOSE European project3, the reference
architecture for the Sensing Enterprise consists of the following elements:
- Inter-world router: It handles the exchange of data and events between physical-digital-virtual services such as the
interoperability mechanism.
- Intra-world Bus: It handles the events and data exchange between the systems components (digital-analysis
services, sensors-actuators, simulators, virtual-augmented displays).
- Context manager: Element in charge of the analysis of policy related to message, events and data delivery, and the
planning of their transmission.
- Service Manager: Element responsible for the publication and services subscription to the event and data
reception.
3 http://www.osmose-project.eu/</p>
        <p>To enable the materialization of the model for “Sensing Access Control”, it is necessary to define solutions for the
multi-domain collection of relevant information (interoperability) in real time, its intelligent processing for AC
decision making, and an intelligent actuator system which can respond to the instructions of the system efficiently.
ACIO, as shown in Fig.2, has proposed an instantiation of the reference architecture for Sensing Enterprise, a
solution that improves the usability of access control without compromising security, by using context information,
and synchronization and data exchange between physical and logical world to enable rapid decision-making in the
management of multi-domain access control.</p>
        <p>In the proposed architecture, the central element (Authorization System), is responsible for the communication bus
implementation and also implements access control decision-making in real time through the collection of
information from the different worlds (physical and logical). The sources of information from the Sensing Enterprise
architecture that the ACIO solution interoperates on are:
- Identification System (physical): Composed by improved physical in-motion identification mechanisms, vehicle
identification devices, and container and plate number reading mechanisms (physical perimeter access control).
- Contextual Information System (logical): this system is responsible for the collection, processing and storing of
all the contextual information generated, and of ensuring the interoperability and sharing of all information available
in order to avoid duplicates or inaccuracies.
- Terminal’s logical access control system (logical): Single-Sign-On authentication of user through a Identity
Provider / Service Provider (IdP / SP) model under SAML, and multi-factor authentication based on XACML
architecture for distributed environments.
- Multi-domain security policy Configuration (logical): management of security policies and inter-domain SLAs
based on context.
- Data analysis: Provides multi-source logs standardization and categorization through the use of Big Data analysis
techniques, threat detection algorithms, pattern matching and statistical correlation.
- Geolocation System (logical): Advanced positioning for people and good tracking between different domains and
port subsections.
- Actuator System (physical): intelligent access control mechanisms with IP connectivity to apply the security
actions defined by the authentication server.
The proposed architecture is able to provide the following added features to the Access Control management:
- Automate data acquisition (use case: people, goods, vehicles, services).
- Accelerated (muti-domain) cross system and cross platform data exchange.
- Fast &amp; easy (multi-factor) access control policy delegation with traceability.
- Big data context-related segmentation for fast analysis.
- Seamless Physical-digital world cloud-based data exchange management.</p>
        <p>- Digital evidence management and auditing.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Tests and demonstrators</title>
      <p>For the validation of results for the ACIO architecture, a test environment shown in the following figure (figure 3) has
been used.</p>
      <p>In order to validate the ACIO solution in its application to the port of Valencia, the following components are
implemented: a gateway (GW), a Kafka (CK) cluster, and a Samza (CS) cluster, which provides data to an
information provider, allowing the authorization server to use this information in the process of physical and logical
access control in an integrated way.</p>
      <p>For the outcome of this validation study, the incoming data is generated directly from the GW, and emulates the
receipt and delivery of very large numbers of messages, which could be a base problem for the scalability of the
ACIO solution. The GW sends all input data to CK, which is deployed in multiple instances. Once received the
requests, the CK puts messages on a queue, which we call topic and will be used by the CS. The CS will then extract
the message of a topic based on its policy subscription, performing the processing in cascade through different jobs
written in java. The outputs of processing the data stream in the CK are made available to the information provider;
that will provide them for the access control process, executed by the authorization server.</p>
      <p>The continuous and massive reception of messages from the GW triggers different jobs processing activities, that
culminate in the activity and context information required when making access control decisions. The following table
(table 1), shows the reception and processing of messages:
Component
Kafka1 Cluster
Samza1 Cluster</p>
      <p>Recent measurements on a sensing terminal of the Valencia port environment state a flow of about 8,000 messages
/ second (m / s).</p>
      <p>Through the validation it is found that taking a 35% performance of the deployed cluster in general purpose
systems enables the processing of 21,456 m per second, allowing the proposed deployment to process four times the
current activity. Therefore, and taking into account the transparent scalability shown by the system, the ACIO
solution can be applied in scenarios of growth and evolution under a port like Valencia, which is currently among the
ten busiest in Europe in number of containers, and is destined to be one of the top three in terms of movement of
people and goods.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Conclusions</title>
      <p>The ACIO validation tests show that the solution enables integrated and holistic access control in an environment like
the Port of Valencia, improving the user experience through the recording of activity and the use of transparent
correlation, and all this for the sake of safety, effectiveness and efficiency for port’s processes. Moreover, the
modularity and scalability of the ACIO solution allows the incorporation, in the required volume and accuracy, of the
sensor and actuator systems into the access control management to ensure fluidity.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgements</title>
      <p>ACIO: Access Control In Organisations, to been co-funded by the Ministry of Industry through the Strategic Action
for Digital Economy and Society (AEESD - TSI-100201-2013-50) in 2013 after receiving a CELTIC Plus (C2013 /
1) label by the Eureka cluster and has relied on the work done in the OSMOSE project (GA: 610905) funded by the
European Commission through FP7-ICT
[5] G. D. Skinner, “Cyber Security Management of Access Controls in Digital Ecosystems and Distributed
Environments”, 6th International Conference on Information Technology and Applications (ICITA 2009),
November 2009.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Ravi</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Sandhu</surname>
          </string-name>
          and Pierangela Samarati,: “Access Control:
          <article-title>Principle and Practice”</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          , vol.
          <volume>32</volume>
          , no.
          <issue>9</issue>
          ,
          <year>September 1994</year>
          , pp.
          <fpage>40</fpage>
          -
          <lpage>48</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Jason</given-names>
            <surname>Crampton</surname>
          </string-name>
          and Charles Morisset: “
          <article-title>Towards a Generic Formal Framework for Access Control”</article-title>
          ,
          <source>CoRR</source>
          vol.
          <source>abs/1204.2342</source>
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Debin</given-names>
            <surname>Liu</surname>
          </string-name>
          ,Ninghui Li,
          <string-name>
            <given-names>XiaoFeng</given-names>
            <surname>Wang</surname>
          </string-name>
          ,L. Jean Camp:
          <article-title>“Security Risk Management Using Incentives”</article-title>
          ,
          <source>in Proceeding IEEE Security and Privacy, November</source>
          <year>2011</year>
          , pp.
          <fpage>20</fpage>
          -
          <lpage>28</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Domenico</given-names>
            <surname>Rotondi</surname>
          </string-name>
          , Cristoforo Seccia, Salvatore Piccione:
          <article-title>“Access Control and IoT: Capability Based Authorization Access Control System”</article-title>
          ,
          <year>November 2011</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>