1 --- 5/7/2015 8:01:19 PM 7. Using Trust for Role-Based Access Control (RBAC) Prof. Bharat Bhargava Center for Education and Research in Information Assurance.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

The 20th International Conference on Software Engineering and Knowledge Engineering (SEKE2008) Department of Electrical and Computer Engineering
1 Trust-based Privacy Preservation for Peer-to-peer Data Sharing Y. Lu, W. Wang, D. Xu, and B. Bhargava yilu, wangwc, dxu, cs.purdue.edu Department.
Rulebase Expert System and Uncertainty. Rule-based ES Rules as a knowledge representation technique Type of rules :- relation, recommendation, directive,
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
IUCRC New Site Planning Grant Purdue University Net-Centric Software and Systems Research Center Joining Existing NSFcenters at Univ. of North Texas, Arizona.
Responding to Policies at Runtime in TrustBuilder Bryan Smith, Kent E. Seamons, and Michael D. Jones Computer Science Department Brigham Young University.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
/16/2015 9:20:53 PM 9. Role-Based Access Control (RBAC) Role Classification Algorithm Prof. Bharat Bhargava Center for Education and Research in.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
September 2003 Fraud Formalization and Detection Bharat Bhargava, Yuhui Zhong, Yunhua Lu Center for Education and Research in Information Assurance and.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
© Prentice Hall, © Prentice Hall, ObjectivesObjectives 1.An understanding of the relationship between data and information 2.Insights.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Chapter 10 Architectural Design
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
16-1 The World Wide Web The Web An infrastructure of distributed information combined with software that uses networks as a vehicle to exchange that information.
Krishnaprasad Thirunarayan, Pramod Anantharam, Cory A. Henson, and Amit P. Sheth Kno.e.sis Center, Ohio Center of Excellence on Knowledge-enabled Computing,
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
ITEC 810 – Project Unit Trustworthy Sensor Networks Daniel Aegerter, Supervisor: Rajan Shankaran.
Chapter 13 Architectural Design
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
A security framework combining access control and trust management for mobile e-commerce applications Gregor v.Bochmann, Zhen Zhang, Carlisle Adams School.
Chapter 18: Introduction to Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Page 1 of ?? Wireless Industry Congress 2003 NCAC Workshop (Ottawa) © Ramiro Liscano 2005 Context-based Coalition Access Control for Spontaneous Networking.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
ReSeTrus Development of a digital library technology based on redundancy elimination and semantic elevation, with special emphasis on trust management.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
The Laboratory of Information Integration, Security and Privacy ● University of North Carolina at Charlotte URL: 306, UNC Charlotte.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Computer Science and Engineering 1 Mobile Computing and Security.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Selected Semantic Web UMBC CoBrA – Context Broker Architecture  Using OWL to define ontologies for context modeling and reasoning  Taking.
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Presented by Edith Ngai MPhil Term 3 Presentation
XACML and the Cloud.
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Chapter 19: Building Systems with Assurance
Rejina Basnet, Subhojeet Mukherjee, Vignesh M. Pagadala, Indrakshi Ray
Intelligent Contextual Data Stream Monitoring
Web Information Systems Engineering (WISE)
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Formalization of Trust, Fraud, and Vulnerability Analysis
Outline Context for database development Goals of database development
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

/7/2015 8:01:19 PM 7. Using Trust for Role-Based Access Control (RBAC) Prof. Bharat Bhargava Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer Sciences Purdue University Collaborators in the RAID Lab ( Prof. Leszek Lilien (former Post Doc) Dr. Yuhui Zhong (former Ph.D. Student) This research is supported by CERIAS and NSF grants from IIS and ANIR.

/7/2015 8:01:19 PM Using Trust for Role-Based Access Control - Outline 1)Access Control in Open Systems 2) Proposed Access Control Architecture 2.1) Basics 2.2) RBAC & TERM server 3) TERM server 3.1) Basic 3.2) Evidence Model 3.3) Architecture a)Credential Management (CM) b)Evidence Evaluation (EE) c)Role Assignment (RA) d)Trust Information Management (TIM) 3.4) Prototype TERM server

/7/2015 8:01:19 PM 1) Access Control in Open Systems (1)  Open environment (like WWW, WiFi networks)  User who may not be known in advance  Still must determine the permission set for an unknown user  Common approach: Grant access based on user’s properties demonstrated by digital credentials  Problems with credentials  Holding credentials does not assure user trustworthiness  Evidence provided by different credential issuers should not be uniformly trusted (apply “degrees of trust”)

/7/2015 8:01:19 PM  A solution for problems with credentials:  Trust should be used by access control mechanisms  To limit granting privileges to potentially harmful users How to establish trust ? In particular with “newcomer” devices What do we need to know about a pervasive device, in order to make a trust decision? Using trust for attribute-based access control Identity-based access control is inadequate in open environments (e.g., vulnerable to masquerading) Multi-dimensional attribute set to determine trust level 1) Access Control in Open Systems (2)

/7/2015 8:01:19 PM 2.1) Proposed Access Control Architecture - Basics Information System Authorized Users Other Users Access Control Mechanism  Authorized Users  Validated credentials (first-hand experience and second-hand recommendations) AND  Trust based on history of cooperative and legitimate behavior  Other Users  Lack of required credentials OR  Lack of trust resulting from history of non-cooperative or malicious behavior

/7/2015 8:01:19 PM 2.2) Proposed Access Control Architecture - RBAC & TERM Server Role-based access control (RBAC) Trust-enhanced role-mapping (TERM) server cooperates with RBAC user TERM Server Send roles RBAC enhanced Web Server Request roles Request Access Respond

/7/2015 8:01:19 PM 3.1) TERM Server - Basic Concepts (1) Evidence Credentials  Statement about some properties of a subject  Examples: X.509, PICS rating Issuer’s opinion  Allows issuer to express confidence w.r.t. her statement (recommendation)  Widely used in daily life Example: Reviewer’s familiarity with topic on review forms  Not supported by current credentials Evidence  Associate issuer’s opinion with credentials Reliability of evidence  Trust w.r.t. evidence from the viewpoint of the relying entity (i.e. TERM server)  Combination of the trust w.r.t. the issuer and the issuer’s opinion

/7/2015 8:01:19 PM 3.1) TERM Server - Basic Concepts (2) Trust based on interpretation of observations of users behaviors Inherently uncertain  User’s behavior affected by multiple reasons  Example: Reasons why a user provides incorrect information Dishonesty / Error / Other reasons Trust context Trust is context-specific  Example: Bob trusts his doctor w.r.t. health problems but not w.r.t. flying with him Different trust characteristics are emphasized in different contexts Trust characteristisc may have different meanings in different contexts Research questions:  How to represent contexts?  How to propagate trust among contexts? Trust in a user and issuer (of recommendations) Trusting a user: belief that user is cooperative Trusting an issuer: believe evidence provided by issuer

/7/2015 8:01:19 PM 3.2) TERM Server – Evidence Model (1) Direct experience User’s or recommendation issuer’s behavior observed by TERM First-hand information Recommendation Recommender’s opinion w.r.t. trust in a user/issuer Second-hand information

/7/2015 8:01:19 PM 3.2) Evidence Model (2) Design considerations: Accommodate different forms of evidence in an integrated framework Support reliability evaluation Evidence type Specify information required by this kind of evidence (et_id, (attr_name, attr_domain, attr_type) *) E.g.: (student, [{name, string, mand}, {university, string, mand}, {department, string, opt}]) Evidence Evidence is an instance of an evidence type

/7/2015 8:01:19 PM 3.2) Evidence Model (3) Opinion (belief, disbelief, uncertainty) Probability expectation of Opinion  Belief * uncertainty  Characterizes the degree of trust represented by an opinion Alternative representation  Fuzzy expression  Uncertainty vs. vagueness Evidence statement

/7/2015 8:01:19 PM 3.3) TERM Server Architecture (1) assigned roles users’ behaviors credential mgmt role-assignment policies specified by system administrators credentials provided by third parties or retrieved from the internet role assignment evidence statement evidence statement, reliability evidence evaluation issuer’s trust user/issuer information database user’s trust trust information mgmt Component implemented Component partially implemented a)Credential Management (CM) – simply transforms different formats of credentials to evidence statements b)Evidence Evaluation (EE) - evaluates reliability of evidence statements c)Role Assignment (RA) - maps roles to users based on evidence statements and role assignment policies d)Trust Information Management (TIM) - evaluates user/issuer’s trust information based on direct experience and recommendations

/7/2015 8:01:19 PM a) CM - Credential Management Transforms different formats of credentials to evidence statements

/7/2015 8:01:19 PM b) EE - Evidence Evaluation Develop an algorithm to evaluate reliability of evidence Issuer’s opinion cannot be used as reliability of evidence Two types of information used: Evidence Statement  Issuer’s opinion  Evidence type Trust w.r.t. issuer for this kind of evidence type

/7/2015 8:01:19 PM Evidence Evaluation Algorithm Input: evidence statement E 1 = Output: reliability RE(E 1 ) of evidence statement E 1 Step1: get opinion 1 = and issuer field from evidence statement E 1 Step2: get the evidence statement about issuer’s testify_trust E 2 = from local database Step3: get opinion 2 = from evidence statement E 2 Step4: compute opinion 3 = (1) b 3 = b 1 * b 2 (2) d 3 = b 1 * d 2 (3) u 3 = d 1 + u 1 + b 2 * u 1 Step5: compute probability expectation for opinion 3 = PE (opinion 3 ) = b * u 3 Step6: RE (E 1 ) = PE (opinion 3 )

/7/2015 8:01:19 PM c) RA - Role Assignment Design a declarative language for system administrators to define role assignment policies Specify content and number of evidence statements needed for role assignment Define a threshold value characterizing the minimal degree of trust expected for each evidence statement Specify trust constraints that a user/issuer must satisfy to obtain a role Develop an algorithm to assign roles based on policies Several policies may be associated with a role The role is assigned if one of them is satisfied A policy may contain several units The policy is satisfied if all units evaluate to True

/7/2015 8:01:19 PM RA Algorithm for Policy Evaluation Input: evidence set E and their reliability, role A Output: true/false P ← the set of policies whose left hand side is role A while P is not empty{ q = a policy in P satisfy = true for each units u in q{ if evaluate_unit(u, e, re(e)) = false for all evidence statements e in E satisfy = false } if satisfy = true return true else remove q from P } return false

/7/2015 8:01:19 PM RA Algorithm for Unit Evaluation Input: evidence statement E1 and its reliability RE (E1), a unit of a policy U Output: true/false Step1: if issuer does not hold the IssuerRole specified in U or the type of evidence does not match evidence_type in U then return false Step2: evaluate Exp of U as follows: (1) if Exp1 = “Exp2 || Exp3” then result(Exp1) = max(result(Exp2), result(Exp3)) (2) else if Exp1 = “Exp2 && Exp3” then result(Exp1) = min(result(Exp2), result(Exp3)) (3) else if Exp1 = “attr Op Constant” then if Op  {EQ, GT, LT, EGT, ELT} then if “attr Op Constant” = true then result(Exp1) = RE(E1) else result(Exp1) = 0 else if Op = NEQ” then if “attr Op Constant” = true then result(Exp1) = RE(E1) else result(Exp1) = 1- RE(E1) Step3: if min(result(Exp), RE(E1))  threshold in U then output true else output false

/7/2015 8:01:19 PM d) TIM - Trust Information Management Evaluate “current knowledge” “Current knowledge:”  Interpretations of observations  Recommendations Developed algorithm that evaluates trust towards a user User’s trustworthiness affects trust towards issuers who introduced user Predict trustworthiness of a user/issuer Current approach uses the result of evaluation as the prediction

/7/2015 8:01:19 PM Defining role assignment policiesLoading evidence for role assignment Software: 3.4) Prototype TERM Server

/7/2015 8:01:19 PM Our Research at Purdue  Web Site: http/  Over one million dollars in current support from: NSF, Cisco, Motorola, DARPA  Selected Publications  B. Bhargava and Y. Zhong, "Authorization Based on Evidence and Trust", in Proc. of Data Warehouse and Knowledge Management Conference (DaWaK), Sept  E. Terzi, Y. Zhong, B. Bhargava, Pankaj, and S. Madria, "An Algorithm for Building User-Role Profiles in a Trust Environment", in Proc. of DaWaK, Sept  A. Bhargava and M. Zoltowski, “Sensors and Wireless Communication for Medical Care,” in Proc. of 6 th Intl. Workshop on Mobility in Databases and Distributed Systems (MDDS), Prague, Czechia, Sept  B. Bhargava, Y. Zhong, and Y. Lu, "Fraud Formalization and Detection", in Proc. of DaWaK, Prague, Czech Republic, Sept

/7/2015 8:01:19 PM THE END