Ontology driven security for mobile applications Sofien BEJI, Nabil El Kadhi RIADI ENSI Tunisia, ECCE Dept Chairman Ahlia Univ. Bahrain and LERIA EPITECH France [email protected], [email protected] Abstract Heterogeneity and novelty of mobile applications impose new requirements, especially for security. To assist mobile applications developers to face the security challenge, we propose a knowledge base solution through the conceptualization of a security ontology. Our proposal is based on existing ontologies and adds specific feature related to the mobile field. Mainly the ontology is composed of security actors, countermeasures, vulnerabilities, attacks and additional non functional requirements. The ontology is implemented using OWL, its former target is to organize and unify the terminology in mobile security field and the latter objective is to answer queries concerning

the appropriate security countermeasures that should be applied according to a given context.

1. Introduction Mobility is defining the future of computing systems and mobile devices are pervading our society and lifestyles. During 2007, an extensive research was commission by the GSM Association[1] in 17 countries across Europe, Asia and North America. Over 2,500 consumers were surveyed and two-thirds of them said that they expect to begin using their mobile phone to pay at point of sale. Moreover, 50% of the 240 merchants from 10 countries surveyed see promotional opportunities in using the mobile phone as a payment device [2]. Equipped with low resources and broadcasting sensitive data in an uncontrolled media, mobile applications are suspected to be opened to new threats and attacks. Hence it is worthy to focus on security aspects in the mobility field. Our first section will be a presentation of the mobile applications landscape. Since we are in a bottom-up approach, we will discuss in the next section the problem origin which are constraints of the mobile world and why we are dealing with this ontology.

Later, we will present our contribution through an ontology that conceptualize the security in the field of mobile applications. Future works and extensions will be given in the final section.

2. Paper position and Previous works The current work is part of our research concerning mobile applications security and especially how to deal with the security requirement during the development process of mobile applications. We target developer assistance during its application development life cycle. In [10] and [32] we have adopted a bottom-up approach where we have mentioned the vulnerabilities and the need of security in the mobile field. In the current work, we are trying to give an ontology based modeling of security in the mobile context. Moreover, the ontology will be the knowledge component of more elaborated system where the picked up security recommendations will be applied to the applications' models such as UML[20] diagrams.

3. Mobile field overview Mobile applications are software programs running through a permanent or partial wireless connection within a mobile device. We are mainly interested in four categories of applications : thick client application, web application, synchronization and messaging. This classification relies on the use context and the associated technology. Synchronization is a computer to device data transfer that aims to keep both of components in a coherent state. JME[3] and .Net Compact Framework [4] are the leading platforms that fits device capabilities, recently at summer 2008, a new Google's platform named Android [5] was introduced. According to the global context of our case study which focus on the mobile applications in the telephony field, JME was the widely deployed platform and it is adopted by the world's leading cellular phone

manufacturers e.g. Nokia, SonyEricsson, Siemens and Samsung. JME is based on configurations and profiles where a configuration defines groups of products based on the available processor power and memory of each device. A profile defines a set of Application Programming Interface (API) which reside on top of a configuration and offers access to device specific capabilities. Mobile phones belong to Connected Limited Device Configuration (CLDC) and Mobile Information Device Profile (MIDP)[21]. Thin clients applications are mainly web based ones. WAP 1.x and WAP 2.0 are the leading generations of mobile web. WAP 1.0 and WAP 1.2 were WAP Forum consortium initiatives [6]. WAP 2.0 is a convergence specification to a best practice technologies mainly based on xHTML and xHTML Mobile Profile languages [7], which are W3C [8] standards. The messaging service includes both text and multimedia messages and the Short Message Service or SMS [9] is one of the most popular services used in mobile communication. Since SMS is mainly used for person-to-person communication, some mobile services like SMS banking has led this service to a professional use. SMS is also used as a token in several authentication schemes. For more details about this classification, see [10].

4. Mobile security : the requirement of an ontology With diversified actors, roles and constraints , it is time-consuming and a complex task to establish effective countermeasures. A data model or a knowledge base may be used to express these terms but these solutions are suitable for a specific use. Data model are tied to application whereas knowledge base are suitable for a particular Knowledge-Based System. What we target is, to share and provide concepts that will be consistently used across the community of the mobile field and not to be dependable of the use case. A formal knowledge design of the mobile security concepts will be of a big interest to provide a solid base for an applicable approach. Hence we have adopted the ontology formalism to capture and express the knowledge required for a mobile security domain. In Artificial Intelligence, an ontology is “the specification of a conceptualization. That is, defined terms and the relationships between them, usually in some formal and preferably machine readable format”[23]. The proposed ontology will provide a means of representing, a conceptualization of mobile security. Hence the proposed ontology will mark up the concepts of mobile security in a well-understood and

consistent manner, it will also formalize the relationships and influence between the given concepts. Developers and integrators of mobile applications are our target users. The need for a security ontology has been recognized by the research community[11][24][25][26]. According to our survey several works have been done about that. In [11], the center for hight assurance computer systems gives an ontology for annotating security resources for service oriented architecture. In addition to sub-ontologies that focus on services, the authors deal with Credentials, algorithms, information object, security assurance as sub-ontologies. All of these subontologies are imported as concepts to a core security ontology that deals with mechanisms, protocols, policies and objectives. In [12], the authors emphasis on a framework for security ontology rather than on the concepts of the ontology. In fact, four main steps were given to show how the framework is managed. Firstly the ontology is built than the requirements are collected. At a later stage, security actions are defined and finally they are deployed and monitored. A relevant point in this work is the fact that security concepts are defined according to standards sources like ISO/IEC 17799 [13], British Standard 7799 Part 2 [14], Australian Standard Handbook of Information Security Risk Management (AS/NZS 4360) [15], and Common Criteria framework [16]. In [24], authors deal with security concepts of information systems and detail description of the ontology is given with commented axioms. A valuable aspect of this work is the relationships between concepts. A special interest is given to network countermeasures. Obviously, we have been inspired from these works and the ontology we present shares the main concepts like the relationship between vulnerabilities, assets and countermeasures which are almost the same for all the studied works. Our proposal adds not only several specific mobile concepts but also deals with additional non functional requirements. More than 300 class are presented and most of them are commented according to standard definitions FIPS[17], ISO[18], IEEE[19].

5. Ontology presentation 5.1 Overview Our proposed ontology deals with the mobile context and aims at a first stage to set up a knowledge formal model about security in the mobile context with the associated concepts. The second target is to point out the possible countermeasures that should be applied

for the satisfaction of the security requirement in the special context of mobility. Our ontology is intended to answer the following questions : Q1: What are mechanisms associated to security services in the mobile field ? Q2: What are the mechanisms offered by each actor ? Q3: What are the used technologies for implementing a mechanism ? Q4: What are relationships between security and other non functional requirements ? Q5: How does vulnerabilities affect threats ? Q6: What are the mechanisms that should be used to mitigate a threat ? For the ontology structure, we note that we will not describe all concepts and relationships but rather the most relevant ones. Our survey has led to the set of classes : Vulnerability, Threat, Asset, Constraints, Actor, Mechanism, Resource, Service and ValueTypes. Even though , we are dealing with the same ontology, we argue that our proposal is semantically composed of three sub-ontologies. We have: • The Asset-Vulnerability-Threat ontology (AVTo). • The MobileProfile ontology (Mpo). • The DefenseMechanism ontology (DMo).

profile uses some values from the resources class and this classification is related to the available resources. We have defined mainly the wide and near field profiles. Bluetooth[22] applications for example belong to the near field profile and is constrained by the response time. On the other hand, the messaging profile which is a sub-class of the wide profile is constrained by the data size and the number of messages. The top class Resource deals with the available resources for the mobile field. The hierarchy in Fig. 4 shows the Resource main classes with the hardware part including the memory, processing, input/output and network. Through our survey of [24][25], the AssetVulnerability-Threat is a widely adopted sub-ontology where top classes and main relationships are the same and only sub classes of vulnerabilities differ from one context to an other. Our contribution was through the enrichment of the ontology with special vulnerabilities and associated threats of the mobile context. The vulnerabilities have been classified into three main classes: physical, software and those related to communications. Figure xx will give an overview of the main classes.

Fig. 1 gives an overview of the main ontology with some relationships between sub-ontologies.

Figure 2. The vulnerabilities main classes.

Figure 1. The main ontology We have made this distinction in order to enable reuse and sharing. Our main topic is security but it is useful for the mobile field community to get access to some of these sub-ontology for additional requirements. The MPo defines the available features of a given kind of use with the associated resources. Each mobile

Finally, the DMo deals with the security services and the associated security mechanisms. Some security services are largely adopted countermeasures like the typical sub-class algorithm which includes Symmetric, Asymmetric or Digital Signature whereas others are mobile specific like SIM locking for example. Obviously, class instances are different from those deployed in regular computing to those of the mobile field. More details are available in Fig. 3. For the Constraints class, it includes non functional requirements (NFR) such as usability and portability, this class will be more explained in the next section.

The former properties group reflects the relationships of the concepts. As shown in Fig. 1, victimOf, Threatens, enabledBy and existsOn are relationships for the AVTo classes. Provide, Satisfy, Use, Require to name just a few are used for the DMo classes. Satisfy reflects the relationship between the security service and the associated mechanisms. The Provide relationship links semantically the actor with the security mechanisms. Implement is used at a lower layer where we can associate API and actors. As an illustration of the semantic expressiveness, we can give the axioms below : SmartCard Provide some SymmetricEncryption. SymmetricEncryption Satisfice some Confidentiality, WPKI Require some CertificationAuthority. The later object properties group which is QualitySatisfaction include contextual properties that denote the impact of the profiles, actors and mechanisms on the other non functional requirements. We use the labeled verbs Make, Help, Hurt, Break which are inspired from the NFR framework proposed by [28]. The NFR Framework is a goal-oriented approach for addressing NFRs. This framework represents NFRs as softgoals to be satisficed. Our approach is partially inspired from the NFR framework, the difference resides in that we use knowledge engineering to design softgoals whereas this is done visually with the NFR framework. Each one of the actor and mechanisms class has relationship with the quality constraints class.

Figure 3. The mechanism class hierarchy. Two entry points are possible, either from threats or from security services. If we deal with assets protection, our ontology entry point should be security services which are in relationship with mechanisms, actors, constraints and resources. 5.2 Relationships Two kinds of properties contribute to the modeling of the ontology, the first set is named data properties, it contributes to the static description of the class and has a basic data type range like String or int e.g. “SymmetricAlgorithm hasKeyLength int”. The second type of properties reflects existing relationships between classes and is called object properties. Since their importance for our ontology, we will focus on the object properties.

Figure 4. The resource hierarchy class.

Here are some examples: SmartCard Help some portability, SmartCard Hurt some timeliness. 5.3 Implementation Several ontology languages are available, some of them are W3C standards while others stand from research projects. Actually, in this work, we are not interested in semantic web but rather in formally expressing security field knowledges. Hence, our language of choice will be based on the criteria below: • Expressiveness. • Supported tools. • Supported inference engines. • Learnability. RDF/S[29], DAML+OIL[31] and OWL[30] are the widely used languages. OWL is on the top of this layer, it is also a W3C standard based on DAML+OIL [31]. OWL comes up with three sub-languages lite, DL and full. OWL Lite supports users needing a classification hierarchy and simple constraint features. OWL DL supports users who want the maximum of expressiveness without losing computational completeness and decidability(all computations will finish in finite time) of reasoning systems. OWL Full is meant for users who want maximum expressiveness and the syntactic freedom of RDF with no computational guarantees. Since our requirements are deeper than a simple classification or taxonomy, we have used the DL version. The computation guarantee is also necessary to get results in reasonable time after querying the ontology. OWL is also widely used and supported by several tools and API. 5.4 The ontology in action We argue that an efficient way of understanding our ontology is through some samples. We will show in this section some axioms and queries and give the associated comments. 5.4.1 Axioms sample As mentioned earlier, our ontology gives a formal knowledge representation of relevant security concepts and depicts the relationship with other non functional requirements. A first example will illustrate the representation of the OperatorCertificate concept.

OperatorCertificate: StoredOn SmartCard or Device hasSignatureAlgorithm some DigitalSignatureAlgorithm hasValidity exactly 1 Literal hasSubjectName exactly 1 Literal hasDigitalSignatureData exactly 1 Literal HasIssuer some CertificationAuthority hasFormat some CertificateFormat Figure 5. OperatorCertificate concept. Firslty, we show the location of the certificate that may be on device or smartcard than some properties of the certificate are identified. A second example is related to Asymmetric encryption. AsymmetricEncryption: Use some AsymmetricAlgorithm Use some PRNGAlgorithm Satisfice some Integrity Satisfice some Authentication Satisfice some Confidentiality Figure 6. AsymmetricEncryption concept. AsymmetricAlgorithm: Hurt some Efficiency Figure 7. AsymmetricAlgorithm concept. Firstly, relationship with algorithm and pseudo random generator source are illustrated than, we show the services related to asymmetric encryption. A third axiom shows that Asymmetric encryption hurts efficiency. 5.4.2 Asking queries Fig. 8 shows an ontology query asking for the countermeasure that satisfies the confidentiality and integrity services in a situation where efficiency is required. Such context may be related to PAN communication for example. The query asks also for a countermeasure that does not hurt portability. CounterMeasure and Satisfice some Confidentiality and Satisfice some Integrity and Help some Efficiency and not (Hurt some Portability) Figure 8. A Description Logic query sample.

6. Extensions: From ontology to security patterns Since we target the assistance of mobile applications developer during the building process, it will be relevant to our approach to get know-how security patterns [27] through several uses of the ontology. In fact, after querying the ontology for a specific context, a set of countermeasures either as core ones, best practices or mechanisms will be given. A mobile ticketing service or a parking distributor are two examples of applications that share the same security requirements and non functional ones. Both of them should satisfy confidentiality, authentication and integrity, they should also be efficient and portable. A near field mobile pattern could be assigned to such situations. An overview of a security pattern may be represented by these properties: • Name • Description • Required security services • Assets to protect • Countermeasures • Additional non functional requirements

7. Conclusion and ongoing work In this paper, a survey of mobile applications technologies were given in the first section. Through a bottom up methodology, we have led a survey of mobile applications security which led us to an ontology based conceptualization. In fact, several security ontologies exist in the literature whereas the one proposed is based on the mobile field with focus on Actors of the mobile arena e.g. device and manufacturer. The mobile security ontology was designed according to a three sub-ontologies composition that enable reuse and sharing for additional mobility fields. We have tried also through our ontology to conceptualize not only the semantic relationships between actors and the security services or goals they offer but also the side effects of security on the additional non functional requirements. We are still working on the ontology especially with relationships. Security patterns is our current field of research, the design of the security patterns follows the building of the security ontology.

10. References [1] The GSM Association, http://www.gsm.org

[2] The GSM Association, Market Research, 2007, http://gsmworld.com/our-work/programmesandinitiatives/mobile-money/market_research.htm. [3] M. J. Yuan, Entreprise J2ME, Developing Mobile JAVA Applications, Ed. Upper Saddle River: Prentice Hall PTR, 2006, pp. 20-25. [4] D. Fox and J. Box, Building solutions with the Microsoft .NET Compact Framework, Addison-Wesley Professional, 2003. [5] Android platform documentation, http://code.google.com/ android/documentation.html. [6] The WAP forum, http://www.wapforum.org. [7] XHTML™ 1.0 The Extensible HyperText Markup Language. Available at: http://www.w3.org/TR/xhtml1. S. M. Schafer, HTML, XHTML, and CSS Bible, Wiley, 2008, pp. 223-330. [8] World Wide Web Consortium, http://www.w3c.org [9] A. Tanenbaum, Réseaux, 3rd edition, Prentice Hall, 1997, pp. 271-273. [10] S. Beji, N. El Kadhi, "An Overview of Mobile Applications Architecture and the Associated Technologies," icwmc,pp.77-83, 2008 The Fourth International Conference on Wireless and Mobile Communications, 2008, doi.ieeecomputersociety.org/10.1109/ICWMC.2008.55. [11] A. Kim, Jim Luo, and Myong Kang, “Security Ontology for Annotating Resources”, OTM Conferences (2) 2005: 1483-1499. [12] B. Tsoumas, S. Dritsas, and Dimitris Gritzalis, "An Ontology-Based Approach to Information Systems Security Management", LNCS, springer, 2005. [13] ISO/IEC 17799 (2000-12-01), Information technology Code of practice for information security management, ISO. [14] British Standard 7799, Part 2 (1999), Information Technology - Specification for Information Security Management System, BSI. [15] Standards Australia and Standards New Zealand, Australian/New Zealand Standard for Risk Management 4360 (1999). [16] ISO/IEC 15408-1, 2, 3:1999 Information technology Security techniques – Evaluation criteria for IT security Part 1: Introduction and general model, Part 2: Security functional requirements, Part 3: Security assurance requirements. [17] FIPS, Federal Information Processing Standards. [18] ISO, International Organization for Standards. [19] IEEE, Institute of electrical and electronics engineers, [20] G. Boouch, J. Rumbough, I. Jacobson, UML, Eyrolles, 2003. [21] M. J. Yuan, “Entreprise J2ME, DEVELOPING MOBILE JAVA APPLICATIONS“, Ed. Upper Saddle River: Prentice Hall PTR, 2006, pp. 20-25. [22] A. N. Klingsheim, “J2ME Bluetooth Programming (Master Science thesis)” , Department of Informatics, University of Bergen, June 2004. [23] Hendler J., “Agents and the Semantic Web”, IEEE Intelligent Systems, Vol 16 No 2, pp 30-37. [24] A. Herzog, N. Shahmehri, C. Duma, “An Ontology of Information Security”, International Journal of Information Security and Privacy, Volume 1, Issue 4, 2007.

[25] A. Kim, J. Luo, and Myong Kang, “Security Ontology for Annotating Resources”, LNCS 3761, pp. 1483 – 1499. Springer-Verlag Berlin Heidelberg 2005. [26] V. Raskin, C. F. Hempelmann, K. E. Triezenberg, S. Nirenburg, "Ontology in Information Security: A Useful Theoretical Foundation and Methodological Tool", Proceedings of the 2001 workshop on New security paradigms, Cloudcroft, New Mexico, Pages: 53-59. [27] Schumacher M., Fernandez B.E, Hybertson D., Buschmann F., Peter Sommerlad P., Security Patterns: Integrating Security and Systems Engineering, Wiley Series in Software Design Patterns, 2006. [28] J. Mylopoulos, L. Chung, and B. A. Nixon. “Representing and using nonfunctional requirements: A process-oriented approach” IEEE Transactions on Software Engineering, 18, 1992, pp.483–497. Brickley, D. & Guha 1999, ‘Resource Description [29] Specification of the Resource Description Framework (RDF), Available at: http://www.w3.org/RDF. [30] OWL Web Ontology Language Guide, http://www.w3.org/TR/2004/REC-owl-guide-20040210. S. Lauesen, H. Younessi, “Six Styles for Usability Requirements”, Proceedings of REFSQ’98, Presses Universitaires de Namur, 1988. [31] Connolly D., Harmelen .F, Horrocks I., McGuinness D.,Patel-Schneider, P. A. Stein, 'DAML+OIL Reference Description, W3C Note'. [32] S. Beji, N. El Kadhi, "Towards a Mobile Applications Security Approach", SAM'08 - The 2008 International Conference on Security and Management, Nevada, USA (July 14-17, 2008).

Security Ontology proposal for mobile applications

Asymmetric or Digital Signature whereas others are mobile specific like SIM locking for example. Obviously, class instances are different from those deployed in ...

638KB Sizes 3 Downloads 169 Views

Recommend Documents

Security Ontology proposal for mobile applications
phone to pay at point of sale. Moreover, 50% of ... there are two kinds of attacks, one session and multi- session. .... regular PC screens or laptops. The second ...

Security Ontology proposal for mobile applications
The Vonage VT. 2142-VD phone from MOTOROLA receives SIP .... the business field, the time-to-market property of mobile applications and the large target ...

CITY OF MOBILE, ALABAMA REQUEST FOR PROPOSAL ...
Apr 30, 2016 - State company name and all contact information including the name, ... and became disabled prior to age 19 while covered by the City of.

Biperpedia: An Ontology for Search Applications - Research at Google
contains up to two orders of magnitude more attributes than Free- base. An attribute ... the top 100 attributes and 0.52 for the top 5000 attributes). In addition to its .... Name, domain class, and range: The name of an attribute in. Biperpedia is a

Towards a Mobile Applications Security Approach
back the guidelines for secure mobile applications .... storage, performance are quite limited comparing to .... 'telecom/cal.vcs' for the devices calendar file.

Developing an Ontology for Cyber Security Knowledge Graphs (PDF ...
Official Full-Text Paper (PDF): Developing an Ontology for Cyber Security Knowledge Graphs. ... Figure 1: Entities and Relations in the STUCCO Ontology.

Estimating Demand for Mobile Applications
Stern School of Business, New York University & Wharton. School, University of Pennsylvania [email protected]. Sang Pil Han. College of Business, City University of Hong Kong [email protected] .... discussed users' usage patterns of voice call

proposal for recruitment through onbo (mobile ... -
and technical expertise we have an excellent understanding and a 360-degree ... colleges and Universities across India to meet the requirements. gboxz Family ...

Customizing Mobile Applications - CiteSeerX
The advantage of Xrdb is that clients accessing a central server do not need a ..... The PARCTAB is a hand held wireless device that communicates with ...

Extending an Ontology Editor for Domain-related Ontology Patterns ...
Reuse: An Application in the Collaboration Domain.pdf. Extending an Ontology Editor for Domain-related Ontolog ... Reuse: An Application in the Collaboration ...

Customizing Mobile Applications
by convention, re-read configuration files when they receive the HUP signal; ... The X windowing system provides a server-based resource manager, Xrdb [3], ...

Extending an Ontology Editor for Domain-related Ontology Patterns ...
Extending an Ontology Editor for Domain-related Ontolo ... Reuse: An Application in the Collaboration Domain.pdf. Extending an Ontology Editor for ...

pre-proposal for finance wg guidelines for proposal -
OB will e recompensed between General Assemblies (GAs); and ... That the General Assembly (GA) authorize the FWG to open a checking account at WECU as ...

Request for Proposal - Ning
Sep 3, 2013 - Synopsis: Enhancing Mobile Populations' Access to HIV and AIDS Services, Information and. Support a 5 year project funded by Big Lottery ...

request for proposal - AOS92
Feb 26, 2015 - In the event taxes are imposed on the services purchased, the District will not be responsible for payment of the taxes. The vendor shall absorb the taxes entirely. Upon request, the District's Tax Exempt Certificate will be furnished.

request for proposal - AOS92
Feb 26, 2015 - We are currently reducing the number of small printers in our inventory, so any proposal must be able to adjust based on future changes in printer inventory. The AOS92 computing environment consists of approximately 2,000 devices inclu

Designing Mobile Persuasion: Using Pervasive Applications ... - GitHub
Keywords: Mobile social media, design, persuasion, climate change, transportation ... Transportation, together with food and shelter, is one of the biggest carbon ...

Mobile Marketing Applications & Casestudies - Phuc.pdf ...
Mobile Marketing Applications & Casestudies - Phuc.pdf. Mobile Marketing Applications & Casestudies - Phuc.pdf. Open. Extract. Open with. Sign In. Main menu.

Query-driven Ontology for BigData.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Query-driven ...