Beyond Proof-of-compliance: Security Analysis in Trust Management

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Secure Multiparty Computations on Bitcoin
Rule based Trust management using RT - second lecture Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
8.2 Discretionary Access Control Models Weiling Li.
1 Introduction to Computability Theory Lecture15: Reductions Prof. Amos Israeli.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
1 8. Safe Query Languages Safe program – its semantics can be at least partially computed on any valid database input. Safety is tied to program verification,
Chapter 7  Computer Security 1 Overview  Important components of computer security: o User authentication – determine the identity of an individual accessing.
Trust Management II Anupam Datta Fall A: Foundations of Security and Privacy.
Using Digital Credentials On The World-Wide Web M. Winslett.
Verifiable Security Goals
November 1, 2004Introduction to Computer Security ©2004 Matt Bishop Slide #3-1 Chapter 3: Foundational Results Overview Harrison-Ruzzo-Ullman result –Corollaries.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
Copyright © Cengage Learning. All rights reserved.
Chapter 7 Indexing Objectives: To get familiar with: Indexing
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Role-based Trust Management Security Policy Analysis and Correction Environment (RT-SPACE). Gregory T. Hoffer CS7323 – Research Seminar (Dr. Qi Tian)
SECURITY REQUIREMENT FROM PROBLEM FRAMES PERPECTIVE Fabricio Braz 01/25/08.
1 September 14, 2006 Lecture 3 IS 2150 / TEL 2810 Introduction to Security.
Federal Student Aid Identification username and password – this is how students and parents will sign the FAFSA application. The FSA ID process replaced.
CS590U Access Control: Theory and Practice Lecture 21 (April 11) Distributed Credential Chain Discovery in Trust Management.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.
Rule based Trust management using RT Sandro Etalle thanks to Ninghui Li - Purdue William H. Winsborough – University of Texas S. Antonio. The DTM team.
Ninghui Li (Purdue University) 2 nd Int’l Summer School in Computation Logic June 17, 2004 Logic and Logic Programming in Distributed Access Control (Part.
Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.
Slide #2-1 Chapter 2: Access Control Matrix Overview Access Control Matrix Model Protection State Transitions –Commands –Conditional Commands.
Chapter 14 – Fair Division Part 2: The Knaster Inheritance Procedure.
1 More About Turing Machines “Programming Tricks” Restrictions Extensions Closure Properties.
Introduction to Access Control and Trust Management Daniel Trivellato.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
2/1/20161 Computer Security Foundational Results.
Rule based Trust management using RT – third lecture Sandro Etalle University of Twente & Eindhoven thanks to Ninghui Li - Purdue William H. Winsborough.
1 IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 4 September 18, 2012 Access Control Model Foundational Results.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
1 Authorization Sec PAL: A Decentralized Authorization Language.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Decentralized Access Control: Policy Languages and Logics
University of Texas at El Paso
Verifiable Security Goals
Investigating the correct and legal way to use software
IS 2150 / TEL 2810 Introduction to Security
Introduction to Operations Research
Unit 1: Section A: Parliamentary Law Making Influences on Parliament
OGSA-WG Security Use Cases Jan 29, 2004
IS 2150 / TEL 2810 Information Security & Privacy
Maryna Komarova (ENST)
IS 2150 / TEL 2810 Introduction to Security
Microsoft Office Access 2003
Multivalued Dimensions and Bridges
Security Modeling Jagdish S. Gangolly School of Business
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Computer Security Foundations
What is a Constitution?.
IS 2150 / TEL 2810 Information Security & Privacy
What is a Constitution?.
A Distributed Tabling Algorithm for Rule Based Policy Systems
Protecting Privacy During On-line Trust Negotiation
CS703 - Advanced Operating Systems
Instructor: Aaron Roth
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
What is a Constitution?.
IS 2150 / TEL 2810 Introduction to Security
Presentation transcript:

Beyond Proof-of-compliance: Security Analysis in Trust Management Author: Ninghui Li John C.Mitchell William H. Winsborough Published: Proceedings of 2003 IEEE Symposium on Security and Privacy Presenter: Dongyi Li

Trust Management A form of distributed access control that allows one principal to delegate some access decisions to other principals.

Simple Inclusion Complete trust delegation Alice.authenticatedCash  CityBank.authenticatedCash {Cash authenticated by Alice} ⊒ {Cash authenticated by CityBank}

Simple Inclusion Complete trust delegation Texas.Driver  China.Driver

Intersection Inclusion Partial trust delegation Walmart.qualifiedAlcoholCustomer  (SSA.Adult)∩(CityBank.Accountnumber)

Linking Inclusion Linking trust delegation Alice.friend  Alice.husband.friend.wife

Linking Inclusion TexasTransportation.ticketfree UTsystem.University.student

Threshold Group trust delegation In this paper, we cannot represent this kind of delegation by RT language.

Threshold Group trust delegation

Delegation Simple Inclusion Intersection Inclusion Linking Inclusion Threshold

Simple Member without any delegation UTSA.student  Bob

Simple Member without any delegation. Rachael.trustworthy  Joey Rachael.trustworthy  Monica

Trust Management Simple Member Delegation Simple Inclusion Intersection Inclusion Linking Inclusion Threshold

Delegation Advantages Greatly enhances flexibility and scalability in distributed systems.

Glossary Principal: This paper uses A,B,C,D,E,F,X,Y and Z some time with subscript, to denote principals. I use real names such as Alice and Carrie in my presentation. Role Name: A word over some given standard alphabet, this paper use r, u and w, sometime with subscripts, to denote role names, I use some more comprehensive word.

Glossary Role: Takes the form of a principal followed by a role name, separated by a dot; For example: Rachael.friends. Rachael.friends means Rachael has the authority to designate the members of Rachael.friends.

Glossary Policy, Policy Statement: Describes memberships and delegations, P; State, State of the TM: The union of all policies of all principals, p; p ↦ p': the state p is changed to p'. p ⊢Q: Given a state p and a Query Q, the relation means that Q is true in p, or Q is allowed in p.

Problem in Delegation Delegation reduces the control that a principal has over the resources it owns.

Alice.guest Bob

Alice.guest Bob.date Bob.date Charlie

However… How could you bring her to my party!

Alice.guest Bob Alice.guest Bob.date Bob.date Charlie So, Alice.guest  Charlie Alice.guest = {Bob,Charlie}

P ↦ P’ {Alice.guest  Bob} ↦ {Alice.guest  Bob; Alice.guest  Bob.date; Bob.date  Charlie} {Bob} ↦ {Bob,Charlie}

Problem origin Problem happens when we add or delete some policies, such as we add Alice.guest  Bob. date; Bob. date Charlie Things may be more and more out of control if Bob delegate more to others.

Security Analysis Bob has to be invited. Charlie should not be invited.

Security Analysis Existential Simple Safety, Existential Membership: Liveness, Existential Boundedness Universal Simple Availability, Universal Membership Bounded Safety, Universal Boundedness Mutual Exclusion, Universal Containment, Universal

Existential Membership Simple Safety Does there exist a state in which a specific principal has access to a given resource? Is Alice.guest  Charlie possible? p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' … TM is safe when the answer is no.

Existential Boundedness Liveness Is it possible that a set of all principals that have access to a given resource bounded by a given set of principals. Is {Bob} ⊒ Alice.guest possible? p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' … Alice.invited Alice.guest∩Alice.dislike Is { } ⊒ Alice.invited possible?

Universal Membership Simple Availability In every state, does a specific principal have access to a given resource. Is Alice.guest  Bob necessary? p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' …

Universal Boundedness Bounded Safety In every state, is the set of all principals that have access to a given resource bounded by a given set of principals. Is {Bob} ⊒ Alice.guest necessary? p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' …

Universal Mutual Exclusion In every state, are two given properties mutually exclusive. p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' …

Universal Inclusion Containment In every state, does every principal that has one property also have another property. Is {Alice’s guest} ⊒ {Bob’s date} necessary? Alice.guest Bob.date p ↦ p' ↦ p'' ↦ p''' ↦ p'''' ↦ p''''' ↦ p'''''' …

HRU Model Harrison-Ruzzo-Ullman Model Access Matrix ‘The safety problem for protection systems under this model is to determine in a given situation whether a subject can acquire a particular right to an object.’ Simple Safety is undecidable

Restrictions ‘…to our knowledge, no prior work investigates security analysis for trust management systems in the sense of verifying security properties that consider state changes in which restrictions are placed on allowed changes. ’

‘ Some of previous studies only considering queries in a fixed state’ ‘Some consider universal analysis where no restriction is placed on how the state may grow’

Restrictions Growth-restricted: no policy defining these roles can be added Shrink-restricted: policy defining these roles cannot be removed. p ↦R p' ↦R p'' ↦R p''' ↦R p'''' ↦R p''''' …

Trusted Principals We call those who make the agreement on some restrictions and would like to report their changes on policies as Trusted Principals. So what security questions can we answer even if we cannot monitor those who are un-trusted and can add or delete policies arbitrarily.

Lower Bound Imagine …

Lower Bound The only policies remaining are in the R-restricted set. Universal Membership, we are able to know who will always be in the member list. Existential Boundedness, if the answer is ‘no’ in the case of Lower Bound, then the answer is ‘no’ forever.

Upper Bound Suppose …

Upper Bound G-unbounded: Definite: g-unrestricted roles (un-trusted) Possible: g-restricted roles (trusted) Alice.guest  Bob.date; Bob.date Charlie

Upper Bound Existential Membership Is it possible that the authorization leaked to some ‘bad guy’? Universal Boundedness Can we always constrain the authorization to a certain group?

How to compute upper Bound We can consider one principal that does not occur in p to determine whether a role is g-unbounded. To decide whether A.r is g-unbounded Step 1: we add E to principal(p) Step 2: check whether there exists a reachable state p' such that A.r E

Security Analysis Existential Simple Safety, Existential Membership: Liveness, Existential Boundedness Universal Simple Availability, Universal Membership Bounded Safety, Universal Boundedness Mutual Exclusion, Universal Containment, Universal

Future Work Containment Analysis Making restrictions according to current policy state.

Thank you!