{"id":8199,"date":"2020-08-26T18:37:41","date_gmt":"2020-08-26T18:37:41","guid":{"rendered":"https:\/\/msecproject.eu\/?p=8199"},"modified":"2020-10-02T15:50:13","modified_gmt":"2020-10-02T15:50:13","slug":"m-sec-architecture","status":"publish","type":"post","link":"https:\/\/msecproject.eu\/ja\/m-sec-architecture\/","title":{"rendered":"M-Sec Architecture"},"content":{"rendered":"<p>Simplified view of M-Sec architecture<\/p>\n<div class=\"msec_out\">\n<div id=\"msec_lay1\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay2\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay3\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay4\" class=\"msec_hl\"><\/div>\n<div id=\"msec_lay5\" class=\"msec_vl\"><\/div>\n<div id=\"msec_l1\" class=\"msec_keyLaPos msec_c0 msec_l1\">Application<br \/>\nLayer<\/div>\n<div id=\"msec_keyl1\" class=\"msec_keyCoPos\"><b>Application layer<\/b> defines all the use the IoT technology or in<br \/>\nwhich IoT has deployed<\/div>\n<div id=\"msec_l1a1\" class=\"msec_comp msec_c1 msec_l1\">Eclipse<br \/>\nsensiNact Studio<\/div>\n<div id=\"msec_keyl1a1\" class=\"msec_keyCoPos\"><b>Eclipse sensiNact Studio<\/b><br \/>\nSensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities<\/div>\n<div id=\"msec_l1a2\" class=\"msec_comp msec_c1 msec_l2\">SAT &#038;<br \/>\nDMSS<\/div>\n<div id=\"msec_keyl1a2\" class=\"msec_keyCoPos\"><b>Security Analysis Tool &#038; Development Method for a secure service<\/b> A security requirements modelling support system, for a misuse case diagram that enables the association of security knowledge with elements that constitute the diagram.<\/div>\n<div id=\"msec_l1a3\" class=\"msec_comp msec_c2 msec_l1\">MTSA<\/div>\n<div id=\"msec_keyl1a3\" class=\"msec_keyCoPos\"><b>Modal Transition System Analyser<\/b> A development tool for synthesizing behaviour specification for reactive systems with formal guarantee.<\/div>\n<div id=\"msec_l1a4\" class=\"msec_comp msec_c4 msec_l1\">IoT<br \/>\nMarketplace<\/div>\n<div id=\"msec_keyl1a4\" class=\"msec_keyCoPos\"><b>IoT Marketplace<\/b> The M-Sec IoT Marketplace is a novel Marketplace where smart objects and users can exchange information and services through the use of virtual currencies, allowing real-time matching of supply and demand, and thus enabling the creation of liquid markets with profitable business models of the IoT stakeholders.<\/div>\n<div id=\"msec_l2\" class=\"msec_keyLaPos msec_c0 msec_l3\">Cloud<br \/>\nLayer<\/div>\n<div id=\"msec_keyl2\" class=\"msec_keyCoPos\"><b>Cloud layer<\/b> includes all the infrastructure upon which cloud services are based<\/div>\n<div id=\"msec_l2a1\" class=\"msec_comp msec_l3 msec_c2\">Monitoring<br \/>\n&#038; Visualisation Tool<\/div>\n<div id=\"msec_keyl2a1\" class=\"msec_keyCoPos\"><b>Monitoring &#038; Visualisation Tool<\/b> A software-based solution that collects and examines activity from IoT layer or agents embedded in the IoT gateway devices. This tool not only help with the security health checks by providing insight into how the security is being maintained at IoT gateways, but also helps in further analysis of devices under attack. Thereby, providing 24\/7 security threat monitoring and alerts.<\/div>\n<div id=\"msec_l2a2\" class=\"msec_comp msec_l3 msec_c4 \">Crypto<br \/>\nCompanion DB<\/div>\n<div id=\"msec_keyl2a2\" class=\"msec_keyCoPos\"><b>Crypto Companion Database<\/b>> As the real world matches the digital world, ensuring that information remains secure, private and authentic has become an ongoing challenge. Using blockchain technology, some of the issues can be addressed. However, once data is stored on the blockchain it can&#8217;t be manipulated or altered. Our companion database is proposed as a parallel system to the blockchain for the encrypted storage. The blockchain saves a hash created from sensitive or personal data, and the companion database stores the sensitive data encrypted together with the hash.<\/div>\n<div id=\"msec_l3\" class=\"msec_keyLaPos msec_c0 msec_l5\">Middleware<br \/>\nLayer<\/div>\n<div id=\"msec_keyl3\" class=\"msec_keyCoPos\"><b>Middleware layer<\/b> includes the infrastructure needed for both Peer-to-Peer and IoT-to-Cloud approaches<\/div>\n<div id=\"msec_l3a1\" class=\"msec_comp msec_c3 msec_l5\">Eclipse<br \/>\nsensiNact platform<\/div>\n<div id=\"msec_keyl3a1\" class=\"msec_keyCoPos\"><b>Eclipse sensiNact platform<\/b> SensiNact is designed to allow platforms to interoperate, thus coexist and benefit from the richness of the variety. Additionally, it provides a fine grained security mechanism to allow access to services by only authenticated and authorized entities.<\/div>\n<div id=\"msec_l3a2\" class=\"msec_comp msec_c3 msec_l6\">Secure<br \/>\nSOXFire<\/div>\n<div id=\"msec_keyl3a2\" class=\"msec_keyCoPos\"><b>Secure SOXFire<\/b> SOXFire can provide practical distributed and federated infrastructure for IoT sensor data sharing among various users\/organisations in a way that is scalable, extensible, easy to use and secure, while preserving privacy.<\/div>\n<div id=\"msec_l3a3\" class=\"msec_comp msec_c4 msec_l5\">Quorum Blockchain<br \/>\nBlockchain middleware<\/div>\n<div id=\"msec_keyl3a3\" class=\"msec_keyCoPos\"><b>Quorum Blockchain Blockchain middleware<\/b> A distributed ledger and middleware services system which provides all the necessary groundwork for security\/privacy-enhancing services related to transactions and interactions between actors of various ecosystems.<\/div>\n<div id=\"msec_l3a4\" class=\"msec_comp msec_c4 msec_l6\">T&#038;R Model<br \/>\nengine\/tool<\/div>\n<div id=\"msec_keyl3a4\" class=\"msec_keyCoPos\"><b>Trust &#038; Reputation Model\/Engine<\/b> The Trust &#038; Reputation<br \/>\nManagement Engine (T&#038;RM Engine) is a tool working on top of the M-Sec<br \/>\nblockchain\/Marketplace and in parallel with the corresponding<br \/>\nmiddleware so as to provide a ranking system assessing the<br \/>\nreliability, trustworthiness and reputation of resources providers<br \/>\nwithin the MSec ecosystem.<\/div>\n<div id=\"msec_l4\" class=\"msec_keyLaPos msec_c0 msec_l7\">IoT<br \/>\nLayer<\/div>\n<div id=\"msec_keyl4\" class=\"msec_keyCoPos\"><b>IoT Layer<\/b> includes all the devices, sensors, and their<br \/>\ncorresponding low-level networks that are met in IoT ecosystems<\/div>\n<div id=\"msec_l4a1\" class=\"msec_comp msec_c2 msec_l7\">Secured components<br \/>\nfor devices<\/div>\n<div id=\"msec_keyl4a1\" class=\"msec_keyCoPos\"><b>Secured components for devices<\/b> A secure element, such as a<br \/>\nTPM, is added to the physical platform, It is used to store any<br \/>\nsensitive information that shall be protected from people having<br \/>\nphysical Access to the electronics, such as IoT devices and gateways.<br \/>\nThe secure element handles the integrity of the device during the<br \/>\nboot process and also handles the authentication and encryption for<br \/>\nexternal communication channels.<\/div>\n<div id=\"msec_l4a2\" class=\"msec_comp msec_c2 msec_l8\">Intrusion<br \/>\nDetection System<\/div>\n<div id=\"msec_keyl4a2\" class=\"msec_keyCoPos\"><b>Intrusion Detection System<\/b> Protect vulnerable IoT devices from<br \/>\nmalicious activities using defense-in-depth mechanisms and threat<br \/>\nmonitoring, thereby providing multi-layered security against policy<br \/>\nviolations and cyber attacks, along with security health-checks<\/div>\n<div id=\"msec_l4a3\" class=\"msec_comp msec_c4 msec_l7\">Ganonymizer<\/div>\n<div id=\"msec_keyl4a3\" class=\"msec_keyCoPos\"><b>Ganonymizer<\/b>In situations where video data is used in various<br \/>\nIoT application use cases such as smart cities, personal information<br \/>\nis often a problem. GANonymizer is a technology that automatically<br \/>\ndeletes personal information contained in such videos using AI<br \/>\ntechnology.<\/div>\n<div id=\"msec_l5\" class=\"msec_keyLaPos msec_c5 msec_l1\">Cross<br \/>\nLayer<\/div>\n<div id=\"msec_keyl5\" class=\"msec_keyCoPos\"><b>Cross layer<\/b> is the layer that provides services to all the horizontal layers.<\/div>\n<div id=\"msec_l5a1\" class=\"msec_comp msec_c6 msec_l3\">Security<br \/>\nManagement Tool<\/div>\n<div id=\"msec_keyl5a1\" class=\"msec_keyCoPos\"><b>Security Management Tool<\/b> A set of centralized security<br \/>\nfunctions that are necessary to ensure end-to-end security, privacy<br \/>\nand therefore digital trust. It is designed to support several<br \/>\nsecurity functionalities aggregated in a single backend using the<br \/>\nLDAP standard. The central element for the security manager is a<br \/>\ndirectory service containing all information to manage security<br \/>\nservices for clients, such services known as AAA for Authentication,<br \/>\nAccounting and Authorization.<\/div>\n<div id=\"msec_fg1\" class=\"msec_fg\">Development &#038; Design Tools<\/div>\n<div id=\"msec_keyfg1x\" class=\"msec_keyCoPos\"><b>Development &#038; Design Tools Functional Group<\/b> &#8230;<\/div>\n<div id=\"msec_fg2\" class=\"msec_fg\">Devices Security<\/div>\n<div id=\"msec_keyfg2x\" class=\"msec_keyCoPos\"><b>Devices Security Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg3\" class=\"msec_fg\">Secure City Data Acc<\/div>\n<div id=\"msec_keyfg3x\" class=\"msec_keyCoPos\"><b>Secure City Data Access Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg4\" class=\"msec_fg\">IoT Marketplace<\/div>\n<div id=\"msec_keyfg4x\" class=\"msec_keyCoPos\"><b>IoT Marketplace Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg5\" class=\"msec_fg\">Secured&#038;Trusted Storage<\/div>\n<div id=\"msec_keyfg5x\" class=\"msec_keyCoPos\"><b>Secured &#038; Trusted Storage Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg6\" class=\"msec_fg\">Privacy Management<\/div>\n<div id=\"msec_keyfg6x\" class=\"msec_keyCoPos\"><b>Privacy Management Functional Group<\/b>&#8230;<\/div>\n<div id=\"msec_fg7\" class=\"msec_fg\">End-to-End Security<\/div>\n<div id=\"msec_keyfg7x\" class=\"msec_keyCoPos\"><b>End-to-End Security FG<\/b>&#8230;<\/div>\n<div id=\"msec_fg7\" class=\"msec_fg\">End-to-End Security<\/div>\n<div id=\"msec_keyfg7x\" class=\"msec_keyCoPos\"><b>End-to-End Security FG<\/b>&#8230;<\/div>\n<div id=\"msec_K1\" class=\"msec_key\">Key:<\/div>\n<div id=\"msec_kl\" class=\"msec_hl msec_key\">Layer<\/div>\n<div id=\"msec_keykl\" class=\"msec_keyCoPos\"><b>Layered<\/b> Layered architecture patterns are n-tiered patterns<br \/>\nwhere the components are organized in horizontal layers. This is the<br \/>\ntraditional method for designing most software and is meant to be<br \/>\nself-independent. This means that all the components are<br \/>\ninterconnected but do not depend on each other.<\/div>\n<div id=\"msec_kfg\" class=\"msec_fg msec_key\">Functional Group<\/div>\n<div id=\"msec_keykfg\" class=\"msec_keyCoPos\"><b>Functional Groups<\/b> represents a reusable, functional, identifiable part of the<br \/>\nwhole framework that provides a set of functionalities based on the combination of other components.<\/div>\n<div id=\"msec_kc\" class=\"msec_comp\">Component<\/div>\n<div id=\"msec_keykc\" class=\"msec_keyCoPos\"><b>Component<\/b> represents a smaller functional part that in a combination with other components,<br \/>\nintroduce the functional group component. A component is an self-contained software which can<br \/>\ncommunicate with other components. In this representation a component can also represent a set of components. We are not representing interfaces and connectors.<\/div>\n<div class=\"msec_keyCoPosBg msec_keyCoPos \"><b>Hint:<\/b> cursor over element name shows more information&#8230;<\/div>\n<\/div>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Simplified view of M-Sec architecture Application Layer Application layer defines all the use the IoT technolo [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":8249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-8199","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"ja","enabled_languages":["gb","ja"],"languages":{"gb":{"title":true,"content":true,"excerpt":false},"ja":{"title":false,"content":false,"excerpt":false}}},"_links":{"self":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/posts\/8199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/comments?post=8199"}],"version-history":[{"count":0,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/posts\/8199\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/media\/8249"}],"wp:attachment":[{"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/media?parent=8199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/categories?post=8199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/msecproject.eu\/ja\/wp-json\/wp\/v2\/tags?post=8199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}