SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack Graphs

  • Alessandro Palma
  • , Nikolaos Papadakis
  • , Georgios Bouloukakis
  • , Joaquin Garcia-Alfaro
  • , Mattia Sospetti
  • , Kostas Magoutis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Federated data spaces allow organizations to share and control their own data across various domains, but their exposure to cyber attacks has increased due to a surge in newly discovered vulnerabilities. Existing solutions to secure them focus on messaging protocol protection (e.g., using cryptographic means), but this is not sufficient. Attackers may exploit additional vulnerabilities to cause significant issues (e.g., disrupting the availability of services). To this end, we propose SHIELD, a security-by-design approach for federated data spaces, which leverages attack graphs and trust computation to mitigate the risks of cyber attacks. Mitigation is accomplished by proactively assessing the data spaces' weaknesses and implementing security messaging measures to prevent detrimental attacks. A prototype implementation of SHIELD using publish/subscribe as a messaging mechanism is experimentally evaluated over a real architecture in a V2X (Vehicle-to-Everything) scenario.

Original languageEnglish
Title of host publication40th Annual ACM Symposium on Applied Computing, SAC 2025
PublisherAssociation for Computing Machinery
Pages480-489
Number of pages10
ISBN (Electronic)9798400706295
DOIs
Publication statusPublished - 14 May 2025
Event40th Annual ACM Symposium on Applied Computing, SAC 2025 - Catania, Italy
Duration: 31 Mar 20254 Apr 2025

Publication series

NameProceedings of the ACM Symposium on Applied Computing

Conference

Conference40th Annual ACM Symposium on Applied Computing, SAC 2025
Country/TerritoryItaly
CityCatania
Period31/03/254/04/25

Keywords

  • attack graph
  • federated data spaces
  • security by design
  • trust management

Fingerprint

Dive into the research topics of 'SHIELD: Assessing Security-by-Design in Federated Data Spaces Using Attack Graphs'. Together they form a unique fingerprint.

Cite this