1 Usage Control (UCON) or ABAC on Steroids Prof. Ravi Sandhu Executive Director and Endowed Chair February 26, 2016

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

Cyber-Identity, Authority and Trust in an Uncertain World
1 Formal Model and Analysis of Usage Control Dissertation defense Student: Xinwen Zhang Director: Ravi S. Sandhu Co-director: Francesco Parisi-Presicce.
Cyber-Identity, Authority and Trust in an Uncertain World
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Attribute Mutability in Usage Control July 26, 2004, IFIP WG11.3 Jaehong Park, University of Maryland University College Xinwen Zhang, George Mason University.
1 Safety Analysis of Usage Control (UCON) Authorization Model Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce George Mason University AsiaCCS.
Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
Institute for Cyber Security
A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Usage Control: UCON Ravi Sandhu. © Ravi Sandhu2 Problem Statement Traditional access control models are not adequate for todays distributed, network-
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Usage Control: A Vision for Next Generation Access Control Oct 14, 2003 Ravi Sandhu and Jaehong Park ( Laboratory for Information Security.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
Towards A Times-based Usage Control Model Baoxian Zhao 1, Ravi Sandhu 2, Xinwen Zhang 3, and Xiaolin Qin 4 1 George Mason University, Fairfax, VA, USA.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
Access, Usage and Activity Controls Mar. 30, 2012 UTSA CS6393 Jaehong Park Institute for Cyber Security University of Texas at San Antonio
UCON M ODEL Huỳnh Châu Duy. OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Trust and Security for Next Generation Grids, Tutorial Usage Control for Next Generation Grids Introduction Philippe Massonet et al CETIC.
1 The Quest for Single-Sign On Prof. Ravi Sandhu Executive Director and Endowed Chair February 8, © Ravi Sandhu.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control (ABAC)
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Public-Key Certificates
Discretionary Access Control (DAC)
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Presentation transcript:

1 Usage Control (UCON) or ABAC on Steroids Prof. Ravi Sandhu Executive Director and Endowed Chair February 26, © Ravi Sandhu World-Leading Research with Real-World Impact! CS 6393 Lecture 5

Motivation © Ravi Sandhu2 World-Leading Research with Real-World Impact! Traditional access control models are not adequate for today’s distributed, network-connected digital environment.  Authorization only – No obligation or condition based control  Decision is made before access – No ongoing control  No consumable rights - No mutable attributes  Rights are pre-defined and granted to subjects

Motivation © Ravi Sandhu3 World-Leading Research with Real-World Impact! No access control model available to capture Digital Rights Management (DRM)  Control after dissemination  IPR protection Need for a unified model that can encompass traditional access control models, DRM and other enhanced access control models from recent literature

Usage Control (UCON) © Ravi Sandhu4 World-Leading Research with Real-World Impact! Scope  Encompass traditional access controls, trust management, digital rights management and more  For sensitive information protection, IPR protection, and privacy protection Model  General purpose, policy neutral models  Policy is assumed to be given to the system  Transaction based control  Existence of right is determined when access is attempted by a subject (no predefined access matrix)  Attribute-based access control

Usage Control (UCON) © Ravi Sandhu5 World-Leading Research with Real-World Impact! Security Architectures Security Objectives

Building UCON ABC Models © Ravi Sandhu6 World-Leading Research with Real-World Impact! Continuity Decision can be made during usage for continuous enforcement Mutability Attributes can be updated as side- effects of subjects’ actions

Building UCON ABC Models © Ravi Sandhu7 World-Leading Research with Real-World Impact! Continuity Decision can be made during usage for continuous enforcement Mutability Attributes can be updated as side- effects of subjects’ actions

Examples © Ravi Sandhu8 World-Leading Research with Real-World Impact! Long-distance phone (pre-authorization with post- update) Pre-paid phone card (ongoing-authorization with ongoing-update) Pay-per-view (pre-authorization with pre-updates) Click Ad every 30 minutes (ongoing-obligation with ongoing-updates) Business Hours (pre-/ongoing-condition)

UCON ABC Model Space © Ravi Sandhu9 World-Leading Research with Real-World Impact! 0(Immutable)1(pre)2(ongoing)3(post) preAYYNY onAYYYY preBYYNY onBYYYY preCYNNN onCYNNN N : Not applicable

A Family of UCON ABC Core Models © Ravi Sandhu10 World-Leading Research with Real-World Impact!

UCON preA © Ravi Sandhu11 World-Leading Research with Real-World Impact! Online content distribution service – Pay-per-view (pre-update) – Metered payment (post-update)

UCON onA © Ravi Sandhu12 World-Leading Research with Real-World Impact! Pay-per-minutes (pre-paid Phone Card)

© Ravi Sandhu13 World-Leading Research with Real-World Impact! UCON preA : pre-Authorizations Model UCON preA0  S, O, R, ATT(S), ATT(O) and preA (subjects, objects, rights, subject attributes, object attributes, and pre- authorizations respectively);  allowed(s,o,r)  preA(ATT(s),ATT(o),r) UCON preA1  preUpdate(ATT(s)),preUpdate(ATT(o)) UCON preA3  postUpdate(ATT(s)),postUpdate(ATT(o))

© Ravi Sandhu14 World-Leading Research with Real-World Impact! UCON preA0 : MAC Example L is a lattice of security labels with dominance relation  clearance: S  L classification: O  L ATT(S) = {clearance} ATT(O) = {classification} allowed(s,o,read)  clearance(s)  classification(o) allowed(s,o,write)  clearance(s)  classification(o)

© Ravi Sandhu15 World-Leading Research with Real-World Impact! DAC in UCON: with ACL (UCON preA0 ) N is a set of identity names id : S  N, one to one mapping ACL : O  2 N x R, n is authorized to do r to o ATT(S)= {id} ATT(O)= {ACL} allowed(s,o,r)  (id(s),r)  ACL(o)

© Ravi Sandhu16 World-Leading Research with Real-World Impact! RBAC in UCON: RBAC 1 (UCON preA0 ) P = {(o,r)} ROLE is a partially ordered set of roles with dominance relation  actRole: S  2 ROLE Prole: P  2 ROLE ATT(S) = {actRole} ATT(O) = {Prole} allowed(s,o,r)   role  actRole(s),  role’  Prole(o,r), role  role’

© Ravi Sandhu17 World-Leading Research with Real-World Impact! DRM in UCON: Pay-per-use with pre-paid credit (UCON preA1 ) M is a set of money amounts credit: S  M value: O x R  M ATT(s): {credit} ATT(o,r): {value} allowed(s,o,r)  credit(s)  value(o,r) preUpdate(credit(s)): credit(s) = credit(s) - value(o,r)

© Ravi Sandhu18 World-Leading Research with Real-World Impact! UCON preA3 : DRM Example Membership-based metered payment  M is a set of money amount  ID is a set of membership identification numbers  TIME is a current usage minute  member: S  ID  expense: S  M  usageT: S  TIME  value: O x R  M (a cost per minute of r on o)  ATT(s): {member, expense, usageT}  ATT(o,r): {valuePerMinute}  allowed(s,o,r)  member(s)    postUpdate(expense(s)): expense(s) = expense(s) + (value(o,r) x usageT(s))

© Ravi Sandhu19 World-Leading Research with Real-World Impact! UCON onA : ongoing-Authorizations Model UCON onA0  S, O, R, ATT(S), ATT(O) and onA;  allowed(s,o,r)  true;  Stopped(s,o,r)   onA(ATT(s),ATT(o),r) UCON onA1, UCON onA2, UCON onA3  preUpdate(ATT(s)),preUpdate(ATT(o))  onUpdate(ATT(s)),onUpdate(ATT(o))  postUpdate(ATT(s)),postUpdate(ATT(o)) Examples  Certificate Revocation Lists  revocation based on starting time, longest idle time, and total usage time

UCON B © Ravi Sandhu20 World-Leading Research with Real-World Impact! Free Internet Service Provider  Watch Ad window (no update)  Click ad within every 30 minutes (ongoing update)

© Ravi Sandhu21 World-Leading Research with Real-World Impact! UCON preB0 : pre-oBligations w/ no update S, O, R, ATT(S), and ATT(O); OBS, OBO and OB (obligation subjects, obligation objects, and obligation actions, respectively); preB and preOBL (pre-obligations predicates and pre-obligation elements, respectively); preOBL  OBS x OBO x OB; preFulfilled: OBS x OBO x OB  {true,false}; getPreOBL: S x O x R  2 preOBL, a function to select pre-obligations for a requested usage; preB(s,o,r) =  (obs_i,obo_i,ob_i)  getPreOBL(s,o,r) preFulfilled(obs i,obo i,ob i ); preB(s,o,r) = true by definition if getPreOBL(s,o,r)=  ; allowed(s,o,r)  preB(s,o,r). Example: License agreement for a whitepaper download

© Ravi Sandhu22 World-Leading Research with Real-World Impact! UCON onB0 : ongoing-oBligations w/ no update S, O, R, ATT(S), ATT(O), OBS, OBO and OB; T, a set of time or event elements; onB and onOBL (on-obligations predicates and ongoing-obligation elements, respectively); onOBL  OBS x OBO x OB x T; onFulfilled: OBS x OBO x OB x T  {true,false}; getOnOBL: S x O x R  2 onOBL, a function to select ongoing- obligations for a requested usage; onB(s,o,r) =  (obs_i,obo_i,ob_i, t_i)  getOnOBL(s,o,r) onFulfilled(obs i,obo i,ob i,t i ); onB(s,o,r) = true by definition if getOnOBL(s,o,r)=  ; allowed(s,o,r)  true; Stopped(s,o,r)   onB(s,o,r). Example: Free ISP with mandatory ad window

UCON C © Ravi Sandhu23 World-Leading Research with Real-World Impact! Location check at the time of access request Accessible only during business hours

© Ravi Sandhu24 World-Leading Research with Real-World Impact! UCON preC0 : pre-Condition model S, O, R, ATT(S), and ATT(O); preCON (a set of pre-condition elements); preConChecked: preCON  {true,false}; getPreCON: S x O x R  2 preCON ; preC(s,o,r) =  preCon_i  getPreCON(s,o,r) preConChecked(preCon i ); allowed(s,o,r)  preC(s,o,r). Example: location checks at the time of access requests

© Ravi Sandhu25 World-Leading Research with Real-World Impact! UCON onC0 : ongoing-Condition model S, O, R, ATT(S), and ATT(O); onCON (a set of on-condition elements); onConChecked: onCON  {true,false}; getOnCON: S x O x R  2 onCON ; onC(s,o,r) =  onCon_i  getOnCON(s,o,r) onConChecked(onCon i ); allowed(s,o,r)  true; Stopped(s,o,r)   onC(s,o,r) Example: accessible during office hour

UCON ABC © Ravi Sandhu26 World-Leading Research with Real-World Impact! Free ISP – Membership is required (pre-authorization) – Have to click Ad periodically while connected (on-obligation, on-update) – Free member: no evening connection (on-condition), no more than 50 connections (pre- update) or 100 hours usage per month (post-updates)

Beyond the UCON ABC Core Models © Ravi Sandhu27 World-Leading Research with Real-World Impact!

© Ravi Sandhu28 World-Leading Research with Real-World Impact! Logic Model of UCON 28 Actions: boolean expressions built from attributes in two states.  Alice.credit’=Alice.credit - $50.0 Two types of actions:  Control actions: change the state of single usage process Actions performed by the subject Actions performed by the system  Obligation actions: Actions that have to be performed before or during an access. May or may not be performed by the requesting subject and on the target object.

© Ravi Sandhu29 World-Leading Research with Real-World Impact! Summary of UCON Coined the concept of Usage Control for modern computing systems Developed A family of UCON ABC core models for Usage Control (UCON) to unify traditional access control models, DRM, and other modern enhanced models. UCON ABC model integrates authorizations, obligations, conditions, as well as continuity and mutability properties.

30 Discuss Pretschner 2006 paper © Ravi Sandhu World-Leading Research with Real-World Impact!