A formal study of collaborative access control in distributed datalog Serge Abiteboul – Inria & ENS Cachan Pierre Bourhis CNRS & Lille Univ. & Inria Victor.

Slides:



Advertisements
Similar presentations
Viewing the Web as a Distributed Knowledge Base Serge Abiteboul INRIA Saclay, Collège de France and ENS Cachan ICDE 2012Mai 30, 2012.
Advertisements

Agents & Mobile Agents.
ARCHITECTURES FOR ARTIFICIAL INTELLIGENCE SYSTEMS
Translation-Based Compositional Reasoning for Software Systems Fei Xie and James C. Browne Robert P. Kurshan Cadence Design Systems.
Lecture 11: Datalog Tuesday, February 6, Outline Datalog syntax Examples Semantics: –Minimal model –Least fixpoint –They are equivalent Naive evaluation.
WIMS 2014, June 2-4Thessaloniki, Greece1 Optimized Backward Chaining Reasoning System for a Semantic Web Hui Shi, Kurt Maly, and Steven Zeil Contact:
Implementing Reflective Access Control in SQL Lars E. Olson 1, Carl A. Gunter 1, William R. Cook 2, and Marianne Winslett 1 1 University of Illinois at.
Database Theory: Back to the Future Victor Vianu UC San Diego / INRIA.
ICDT'2001, London, UK1 On Answering Queries in the Presence of Limited Access Patterns Chen Li Stanford University joint work with Edward Chang, UC Santa.
Introduction to Operating Systems CS-2301 B-term Introduction to Operating Systems CS-2301, System Programming for Non-majors (Slides include materials.
1 WebdamExchange and WebdamLog: some models for web data management Emilien Antoine, Meghyn Bienvenu, Alban Galland Webdam WS, 04/03/2011.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
1 WebdamExchange and WebdamLog: some models for web data management Alban Galland INRIA Saclay & ENS Cachan Grenoble, 10/12/2010.
Compiler Challenges, Introduction to Data Dependences Allen and Kennedy, Chapter 1, 2.
4/25/08Prof. Hilfinger CS164 Lecture 371 Global Optimization Lecture 37 (From notes by R. Bodik & G. Necula)
Strict Bidirectional Type Checking Adam Chlipala, Leaf Petersen, and Robert Harper.
1 Computational Complexity CPSC 468b, Spring 2007 Time: Tu & Th, 1:00-2:15 pm Room: AKW 500 Dist. Group: IV (not Natural Sci.) Satisfies “QR”
Distributed Combinatorial Optimization
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
Community Manager A Dynamic Collaboration Solution on Heterogeneous Environment Hyeonsook Kim  2006 CUS. All rights reserved.
Joint work with Emilien Antoine, Gerome Miklau, Julia Stoyanovich and Vera Zaychik Moffitt ICDE 2012Mai 30, 2012 Introducing Access Control in Webdamlog.
On the Origin of Data Daniel Deutch Blavatnik School of Computer Science, Raymond and Beverly Sackler Faculty of Exact Sciences.
FLOWFOX A WEB BROWSER WITH FLEXIBLE AND PRECISE INFORMATION CONTROL.
MADALINA CROITORU Software Engineering week 4 Madalina Croitoru IUT Montpellier.
Towards a Logic for Wide- Area Internet Routing Nick Feamster Hari Balakrishnan.
Timed UML State Machines Ognyana Hristova Tutor: Priv.-Doz. Dr. Thomas Noll June, 2007.
1 Serge Abiteboul - Monitoring 1 Monitoring of distributed applications (in P2P) Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu, INRIA Saclay and Université.
Design patterns. What is a design pattern? Christopher Alexander: «The pattern describes a problem which again and again occurs in the work, as well as.
Provable Unlinkability Against Traffic Analysis Amnon Ta-Shma Joint work with Ron Berman and Amos Fiat School of Computer Science, Tel-Aviv University.
Containment and Integrity for Mobile Code Security policies as types Andrew Myers Fred Schneider Department of Computer Science Cornell University.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
CIS 540 Principles of Embedded Computation Spring Instructor: Rajeev Alur
The Data Ring: Community Content Sharing Serge Abiteboul (INRIA) Alkis Polyzotis (UC Santa Cruz)
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
Workflows in Webdam Victor Vianu UC San Diego & INRIA/Webdam.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
Semantic web course – Computer Engineering Department – Sharif Univ. of Technology – Fall Description Logics: Logic foundation of Semantic Web Semantic.
SECURE WEB APPLICATIONS VIA AUTOMATIC PARTITIONING S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, X. Zheng Cornell University.
1 DocFlow - kick off Monitoring 1 Distributed Monitoring in P2P Systems Serge Abiteboul, Bogdan Marinoiu INRIA-Futurs and Univ. Paris 11.
ES component and structure Dr. Ahmed Elfaig The production system or rule-based system has three main component and subcomponents shown in Figure 1. 1.Knowledge.
Webdamlog and Contradictions Daniel Deutch Tel Aviv University Joint work with Serge Abiteboul, Meghyn Bienvenu, Victor Vianu.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
Learning to Share Meaning in a Multi-Agent System (Part I) Ganesh Padmanabhan.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
KR A Principled Framework for Modular Web Rule Bases and its Semantics Anastasia Analyti Institute of Computer Science, FORTH-ICS, Greece Grigoris.
Introduction Program File Authorization Security Theorem Active Code Authorization Authorization Logic Implementation considerations Conclusion.
Content caching and scheduling in wireless networks with elastic and inelastic traffic Group-VI 09CS CS CS30020 Performance Modelling in Computer.
A Lattice Model of Secure Information Flow By Dorothy E. Denning Presented by Drayton Benner March 22, 2000.
2/1/20161 Computer Security Foundational Results.
A Framework for Reflective Database Access Control Policies Lars E. Olson, Carl A. Gunter, and P. Madhusudan University of Illinois at Urbana-Champaign.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
Fall, Privacy&Security - Virginia Tech – Computer Science Click to edit Master title style Decentralized Information Flow A paper by Myers/Liskov.
Overview of the theory of computation Episode 3 0 Turing machines The traditional concepts of computability, decidability and recursive enumerability.
From Use Cases to Implementation 1. Structural and Behavioral Aspects of Collaborations  Two aspects of Collaborations Structural – specifies the static.
Intelligent Agents Chapter 2. How do you design an intelligent agent? Definition: An intelligent agent perceives its environment via sensors and acts.
Copyright 1999Paul F. Reynolds, Jr. Foundations of Logic Programming.
ITEC1301 Object-Oriented Systems Construction Lecture Notes #4 1.
From Use Cases to Implementation 1. Mapping Requirements Directly to Design and Code  For many, if not most, of our requirements it is relatively easy.
Secure Information Flow for Reactive Programming Paradigm Zhengqin Luo SAFA workshop 2009.
Design Engineering 1. Analysis  Design 2 Characteristics of good design 3 The design must implement all of the explicit requirements contained in the.
Rank Aggregation.
Patterns.
Lecture 10: Query Complexity
Universal Semantic Communication
Probabilistic Databases
A Distributed Tabling Algorithm for Rule Based Policy Systems
Representations & Reasoning Systems (RRS) (2.2)
Presentation transcript:

A formal study of collaborative access control in distributed datalog Serge Abiteboul – Inria & ENS Cachan Pierre Bourhis CNRS & Lille Univ. & Inria Victor Vianu UCSD & Inria Serge Abiteboul – Inria & ENS Cachan Pierre Bourhis CNRS & Lille Univ. & Inria Victor Vianu UCSD & Inria

Plan Motivation and Webdamlog Distributed datalog with access control Results Conclusion ICDT16 - Abiteboul-Bourhis-Vianu2

Motivation and Webdamlog ICDT16 - Abiteboul-Bourhis-Vianu3

Controlling your own data A Web user has more and more data distributed in many distinct systems Distributed data management Webdam project [ERC ] Personal information management systems [Abiteboul-André-Kaplan, CACM’15] [Abiteboul-Marian tutorial EBDT’2015] Missing: access control Allowing control when data is disseminated on the Web 4ICDT16 - Abiteboul-Bourhis-Vianu

The Webdamlog language Extends datalog with negation, updates, distribution, delegation, time For a world that is distributed: autonomous and asynchronous peers dynamic: knowledge evolves; peers come and go Influenced by Active XML (INRIA) Dedalus (UC Berkeley) ICDT16 - Abiteboul-Bourhis-Vianu5

The Webdamlog system Webdamlog+AC ⇒ Webdamlog ⇒ Bloom (the language of Bud developed at UC Berkeley) Main issues 1. Variable relation/peer names 2. Delegations 3. Update propagation 4. Access control 6ICDT16 - Abiteboul-Bourhis-Vianu

Main access control features Data access: Users would like to control who can read and modify their information Data dissemination: Users would like to control how their data are transferred from one participant to another, and how they are combined, with the owner of each piece of data keeping some control over it Application control: Users would like to control which applications can run on their behalf, and what information these applications can access ICDT16 - Abiteboul-Bourhis-Vianu7

Principles The privileges: read, write, grant For extensional data, coarse grained access control For intentional data, fine grained access control At the tuple level Access privileges based on the provenance of the data Security assumptions Secure communication channel Non-adversarial peer behavior ICDT16 - Abiteboul-Bourhis-Vianu8

Main works on Webdamlog Language: Serge Abiteboul, Meghyn Bienvenu, Alban Galland, Emilien Antoine, A rule-based language for web data management. PODS 2011 Open-source system: Serge Abiteboul, Emilien Antoine, Gerome Miklau, Julia Stoyanovich, Jules Testard, Rule-based application development using Webdamlog. Demo in SIGMOD 2013 Access control: Vera Zaychik Moffitt, Julia Stoyanovich, Serge Abiteboul, Gerome Miklau, Collaborative Access Control in WebdamLog. SIGMOD 2015 ☜ ICDT16 - Abiteboul-Bourhis-Vianu9

Distributed datalog with access control To simplify, we consider distributed datalog instead of Webdamlog – no negation, no nesting, no update… To simplify, we consider only read privilege (not write/grant) ICDT16 - Abiteboul-Bourhis-Vianu10

Facts Facts are of the form 1,..., a n ) where m is a relation name p is a peer name a 1,..., a n are data values n) Examples 456, Alice) ICDT16 - Abiteboul-Bourhis-Vianu11

Rules Rules are of the form :– $r 1 ($Û 1 ),..., $r 1 ($Û n ) $r, $r i are relation terms $P, $P 1 are peer terms $Û, $Û i are tuples of terms Safety condition Each peer/relation variable must be bound in some $Û i before being used in $r i,$P i,$r,$P ICDT16 - Abiteboul-Bourhis-Vianu12

Semantics Extensional relations occur only in bodies of rules Intentional relations Input: distributed instance over the extensional relations Output: distributed instance over the intentional ones (least model of the rules satisfying the input) Subtlety: peer and relation variables Delegation: blur distinction between data and program complexity ICDT16 - Abiteboul-Bourhis-Vianu13

Example [at Lili] :– [at Alice] :– [at Bob] :– Access control? Alice Lili Bob 14 Sue

Access to extensional facts As standard: based on access control lists [Alice] :– pictures is extensional Bob is allowed to see all the pictures of Alice This defines an access control policy ICDT16 - Abiteboul-Bourhis-Vianu15

Access to intentional facts A peer p can read a fact iff p can read all the tuples that are used to derive (in some derivation) The definition is recursive & based on provenance [at Alice] :– [at Bob] :– Sue who has read privilege to and only, can see only the pictures of Alice in Truman paradigm (from Truman Show) – different peers see different ICDT16 - Abiteboul-Bourhis-Vianu16

Paranoiac access control [at Alice] :– Alice shares her pictures in all her friends’ albums Issue: works only for friends who have read privilege on & ICDT16 - Abiteboul-Bourhis-Vianu17

Hiding provenance to relax access control [at Alice] :– [hide Hide: blocks the provenance from Works also for friends who have read privilege only on This contributes to specifying the access control policy ICDT16 - Abiteboul-Bourhis-Vianu18

Results ICDT16 - Abiteboul-Bourhis-Vianu19

Is this feasible? Proof: can be computed in distributed datalog In practice: With some optimization [MoffittStoyanovichAbiteboulMiklau, SIGMOD 2015], Modest performance overhead in realistic scenarios Theorem: Data complexity of Webdamlog +Access Control is PTIME ICDT16 - Abiteboul-Bourhis-Vianu20

Is a program leaking information? (no hide) Can a peer infer information beyond what it is allowed according to some access control policy? Implicit visibility: Given P, an access control policy, a peer p, an instance I p seen at p, can p infer a fact (that it does not see)? Simple: no intentional relations in bodies of AC-rules Theorem: Undecidable Decidable for simple AC policies ICDT16 - Abiteboul-Bourhis-Vianu21

Is a program leaking information? (hide) p) :– :– [ hide Y ) ] ) :– [ hide Y ) ] Suppose p sees p does not have access to b) is implicitly-visible at p ICDT16 - Abiteboul-Bourhis-Vianu22 Results: Undecidability is more rapidly reached (even for simple AC policies)

Achieving some dissemination goals (no hide) Context: a particular AC policy Goal: achieve a particular dissemination Dissemination specified by a datalog program Who sees what Not always possible: can violate the AC Theorem: Undecidable ICDT16 - Abiteboul-Bourhis-Vianu23

The best you can (no hide): Policy r) :– Program :– r) :– :– q) :– :– Another program that does better under that policy :– :– :– Theorem: Also undecidable Algorithm for static policies (independent of instance) 24

Achieving some dissemination goals (with hide) Note: but leaks by definition To some extent: accepted leaks Theorem: Can always be achieved ICDT16 - Abiteboul-Bourhis-Vianu25

What if we carry provenance? When we send data, we attach provenance Of course, we impose no leak of information Peers {p0, p1, p2, p3, p4} Extensional instance { } AC policy p2) :– p4) :– p3) :– p4) :– :– :– :– :– 26

p2) :– p4) :– p3) :– p4) :– :– :– :– :– is derived with this AC policy p4 is not allowed to see any provenance of 27 Deciding whether a peer can see a fact has higher complexity :- :- :- :- :- :-

Conclusion Formal study of collaborative access control Reasonable complexity Results on leaking Results of goal achievement Highlights interactions between access control and provenance ICDT16 - Abiteboul-Bourhis-Vianu28