A Deep Reinforcement Learning Approach for Security-Aware Service Acquisition in IoT (2404.03276v1)
Abstract: The novel Internet of Things (IoT) paradigm is composed of a growing number of heterogeneous smart objects and services that are transforming architectures and applications, increasing systems' complexity, and the need for reliability and autonomy. In this context, both smart objects and services are often provided by third parties which do not give full transparency regarding the security and privacy of the features offered. Although machine-based Service Level Agreements (SLA) have been recently leveraged to establish and share policies in Cloud-based scenarios, and also in the IoT context, the issue of making end users aware of the overall system security levels and the fulfiLLMent of their privacy requirements through the provision of the requested service remains a challenging task. To tackle this problem, we propose a complete framework that defines suitable levels of privacy and security requirements in the acquisition of services in IoT, according to the user needs. Through the use of a Reinforcement Learning based solution, a user agent, inside the environment, is trained to choose the best smart objects granting access to the target services. Moreover, the solution is designed to guarantee deadline requirements and user security and privacy needs. Finally, to evaluate the correctness and the performance of the proposed approach we illustrate an extensive experimental analysis.
- A blockchain-based decentralized composition solution for iot services. In Icc 2020-2020 ieee international conference on communications (icc), pages 1–6. IEEE, 2020.
- A fully privacy-preserving solution for anomaly detection in iot using federated learning and homomorphic encryption. Information Systems Frontiers, pages 1–24, 2023.
- A novel iot trust model leveraging fully distributed behavioral fingerprinting and secure delegation. Pervasive and Mobile Computing, page 101889, 2024.
- The privacy paradox–investigating discrepancies between expressed privacy concerns and actual online behavior–a systematic literature review. Telematics and informatics, 34(7):1038–1058, 2017.
- Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics, 41:55–69, 2019.
- Service level agreements in service-oriented architecture environments. Carnegie Mellon University, Software Engineering Institute, 2008.
- A security metric catalogue for cloud applications. In Complex, Intelligent, and Software Intensive Systems: Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS-2017), pages 854–863. Springer, 2018.
- Deep reinforcement learning for internet of things: A comprehensive survey. IEEE Communications Surveys & Tutorials, 23(3):1659–1692, 2021.
- Supporting user requirements and preferences in cloud plan selection. IEEE Transactions on Services Computing, 14(1):274–285, 2017.
- Security-aware data allocation in multicloud scenarios. IEEE Transactions on Dependable and Secure Computing, 18(5):2456–2468, 2019.
- Supporting application requirements in cloud-based iot information processing. In IoTBD, pages 65–72, 2016.
- On analytic properties of a sigmoid function. Int. Journal of Mathematics and Computer Science, 13(2):171–178, 2018.
- H2O: secure interactions in iot via behavioral fingerprinting. Future Internet, 13(5):117, 2021.
- Reinforcement and deep reinforcement learning for wireless internet of things: A survey. Computer Communications, 178:98–113, 2021.
- A consideration of service strategy of japanese electric manufacturers to realize super smart society (society 5.0). In Knowledge Management in Organizations: 13th International Conference, KMO 2018, Žilina, Slovakia, August 6–10, 2018, Proceedings 13, pages 634–645. Springer, 2018.
- NIST Interagency Report (IR). Glossary of key information security terms. http://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf, 2013.
- Sla⋆⋆\star⋆: an abstract syntax for service level agreements. In 2010 11th IEEE/ACM International Conference on Grid Computing, pages 217–224. IEEE, 2010.
- Deep reinforcement learning for autonomous internet of things: Model, applications and challenges. IEEE Communications Surveys & Tutorials, 22(3):1722–1760, 2020.
- Deep reinforcement learning for resource protection and real-time detection in iot environment. IEEE Internet of Things Journal, 7(7):6392–6401, 2020.
- Sla-based service composition model with semantic support. In 2012 IEEE Asia-Pacific Services Computing Conference, pages 374–379. IEEE, 2012.
- Deep reinforcement learning for iot network dynamic clustering in edge computing. In 2019 19th IEEE/ACM international symposium on cluster, Cloud and Grid Computing (CCGRID), pages 600–603. IEEE, 2019.
- Web service level agreement (wsla) language specification. Ibm corporation, pages 815–824, 2003.
- Industry 5.0: A survey on enabling technologies and potential applications. Journal of Industrial Information Integration, 26:100257, 2022.
- Playing atari with deep reinforcement learning. arXiv preprint arXiv:1312.5602, 2013.
- Ubipriseq—deep reinforcement learning to manage privacy, security, energy, and qos in 5g iot hetnets. Applied Sciences, 10(20):7120, 2020.
- Deep reinforcement learning for multiagent systems: A review of challenges, solutions, and applications. IEEE transactions on cybernetics, 50(9):3826–3839, 2020.
- Adrian Paschke. Rbsla a declarative rule-based service level agreement language based on ruleml. In International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), volume 2, pages 308–314. IEEE, 2005.
- Security and privacy service level agreement composition for internet of things systems on top of standard controls. Computers & Electrical Engineering, 98:107690, 2022.
- Service level agreement-based gdpr compliance and security assurance in (multi) cloud-based systems. IET Software, 13(3):213–222, 2019.
- Mart Rovers. ISO/IEC 20000-1: 2011-A Pocket Guide. Van Haren, 1970.
- Iot privacy and security: Challenges and solutions. Applied Sciences, 10(12):4102, 2020.
- An application of deep reinforcement learning to algorithmic trading. Expert Systems with Applications, 173:114632, 2021.
- Developing an iot smart city framework. In IISA 2013, pages 1–6. IEEE, 2013.
- C-fdrl: context-aware privacy-preserving offloading through federated deep reinforcement learning in cloud-enabled iot. IEEE Transactions on Industrial Informatics, 19(2):1155–1164, 2022.
- Sla composition in service networks: A tool for representing relationships between slas and contracts. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1219–1224, 2015.
- Marco Arazzi (17 papers)
- Serena Nicolazzo (13 papers)
- Antonino Nocera (23 papers)