Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.

Slides:



Advertisements
Similar presentations
Institute for Cyber Security
Advertisements

11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Institute for Cyber Security Extending OpenStack Access Control with Domain Trust World-Leading Research with Real-World Impact! 1 Bo Tang and Ravi Sandhu.
Attribute-Based Access Control Models and Beyond
11 World-Leading Research with Real-World Impact! Constraints Specification for Virtual Resource Orchestration in Cloud IaaS Constraints Specification.
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
Evaluating Detection & Treatment Effectiveness of Commercial Anti-Malware Programs Jose Andre Morales, Ravi Sandhu, Shouhuai Xu Institute for Cyber Security.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
Institute for Cyber Security Cross-Tenant Trust Models in Cloud Computing Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA © ICS at UTSA World-Leading.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
1 Attribute-Aware Relationship-Based Access Control for Online Social Networks World-Leading Research with Real-World Impact! Yuan Cheng, Jaehong Park.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
1 Views of Cloud Computing Prof. Ravi Sandhu Executive Director and Endowed Chair March 25, © Ravi Sandhu.
ReBAC in ABAC Tahmina Ahmed Department of Computer Science University of Texas at San Antonio 4/29/ Institute for Cyber Security World-Leading Research.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security An Attribute-Based Protection Model
Access Control Model for the Hadoop Ecosystem
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
World-Leading Research with Real-World Impact!
An Access Control Perspective on the Science of Security
Attribute-Based Access Control: Insights and Challenges
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control: Insights and Challenges
Introductions and Conclusions
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Access Control Evolution and Prospects
World-Leading Research with Real-World Impact!
Towards Maximum Independent Sets on Massive Graphs
Access Control Evolution and Prospects
Presentation transcript:

Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer Science University of Texas at San Antonio 7/29/ Institute for Cyber Security World-Leading Research with Real-World Impact! by

Outline Introduction Background and Motivation Relationship in OSN ReBAC beyond OSN Existence of Object Relationship independent of user Limitations of Existing ReBAC Models Model Characteristics OOReBAC Model OOReBAC: Application Implementation 2 World-Leading Research with Real-World Impact!

Relationships in OSN © Tahmina Ahmed World-Leading Research with Real-World Impact! 3 User to user relationships in a sample social graph [ UURAC, Cheng et al ] User to user, user to resource and resource to resource relationships in a sample social graph [ URRAC, Cheng et al ]

ReBAC in General Computing System beyond OSN © Tahmina Ahmed World-Leading Research with Real-World Impact! 4 user 1 project 1 Participant-of Supervises folder 1 folder 2 doc 2 doc 1 Participant-of Member-of A sample Relationship Graph for Organizational Environment [RPPM, Crampton et al.,2014 ]

Object Relationships in Existing ReBAC  Most of the ReBAC for OSN considers only user to user relationship  OSN has very specific types of resources – photos, notes, comments. Which only makes sense along with users.  Even though some ReBAC models consider general computing system they still need users/subjects existence in relationship graph. © Tahmina Ahmed World-Leading Research with Real-World Impact! 5

Existence of Object Relationship Independent of User © Tahmina Ahmed World-Leading Research with Real-World Impact! 6 Object Relationship in Object –Oriented System (Inheritance, Composition and Association) History of a Git Project (Version Control System) is a DAG

Limitations of Existing ReBAC Models  Cannot configure relationship between objects independent of user.  Cannot express authorization policy solely considering object relationship. Considering these limitations we are proposing an object-to-object relationship based access control model. © Tahmina Ahmed World-Leading Research with Real-World Impact! 7

How the model would look like? © Tahmina Ahmed World-Leading Research with Real-World Impact! 8 policyLevel(a 1,o 1 ) =2 policyLevel(a 2,o 1 ) =0 policyLevel(a 1,o 2 ) =1 policyLevel(a 2,o 2 ) =0 policyLevel(a 1,o 3 ) =3 policyLevel(a 2,o 3 ) =2 policyLevel(a 1,o 4 ) =2 policyLevel(a 2,o 4 ) =0 An Object to Object Relationship Based Access Control Policy Level Example ACL(o 1 ) = {u 1 } ACL(o 2 ) = {} ACL(o 3 ) = {u 2 }

OOReBAC: Model Components and Definition © Tahmina Ahmed World-Leading Research with Real-World Impact! 9

OOReBAC: An Example © Tahmina Ahmed World-Leading Research with Real-World Impact! 10 Configuration: Sequence of operations and its outcome:

OOReBAC: Application © Tahmina Ahmed World-Leading Research with Real-World Impact! 11 Sequence of Operations and Outcomes An OOReBAC Instantiation

© Tahmina Ahmed World-Leading Research with Real-World Impact! 12 Implementation: Openstack Object Storage (Swift) Relationship ACL PolicyLevel

© Tahmina Ahmed World-Leading Research with Real-World Impact! 13 Implementation Functional Specification: Algorithm for Authorization

14 World-Leading Research with Real-World Impact! Conclusion and Future Work OOReBAC is the first attempt towards using object relationship independent of user in authorization policy specification and can only do where single type symmetric relationship is used. Limitations of OOReBAC: – Version Control system uses asymmetric relationship. – Object oriented Programming needs multiple Type asymmetric relationships. We need to extend this model to accommodate multiple type asymmetric relationships to configure version control and object oriented system.

Questions? 15 World-Leading Research with Real-World Impact!