Protecting Privacy in Terrorist Tracking Applications Philippe Golle (Palo Alto Research Center) Paul Aoki, Dirk Balfanz, Glenn Durfee, Teresa Lunt, Diana.

Slides:



Advertisements
Similar presentations
Private Inference Control David Woodruff MIT Joint work with Jessica Staddon (PARC)
Advertisements

29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL CONFERENCE OF DATA PROTECTION AND PRIVACY.
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Database Software Creation Process Arvin Meyer, MCP, MVP
Protecting Privacy in Terrorist Tracking Applications Teresa Lunt, PI Jessica Staddon, Dirk Balfanz Glenn Durfee, Tomas Uribe (SRI) Diana Smetters, Jim.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Database Management System
Information Security Principles & Applications
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Ethics and Responsibility
Security in Databases. 2 Srini & Nandita (CSE2500)DB Security Outline review of databases reliability & integrity protection of sensitive data protection.
Modeling System Events Adapted from: Systems Analysis and Design in a Changing World, 2nd Edition by John W. Satzinger, Robert Jackson and Stephen Burd.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Recap Database: –collection of data central to some enterprise that is managed by a Database Management System –reflection of the current state of the.
Department Of Computer Engineering
Distributed Databases
SE571 Security in Computing
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
SEC835 Database and Web application security Information Security Architecture.
IMS 4212: Distributed Databases 1 Dr. Lawrence West, Management Dept., University of Central Florida Distributed Databases Business needs.
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
 Introduction Introduction  Purpose of Database SystemsPurpose of Database Systems  Levels of Abstraction Levels of Abstraction  Instances and Schemas.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
What is FORENSICS? Why do we need Network Forensics?
SOCIAL SECURITY ADMINISTRATION-HIT SUPPORT 1 February 3, 2010 List of HPD Use Cases:  Yellow Pages/Contact Data Query  Look up providers and their associations.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Chapter 12 Information Systems. 2 Managing Information Information system Software that helps the user organize and analyze data Electronic spreadsheets.
SEC835 Practical aspects of security implementation Part 1.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Additional Security Tools Lesson 15. Skills Matrix.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
GOLAN SALMAN RAZI MUKATREN PRIVACY IN A DEMOGRAPHIC DATABASE PROJECT PLAN.
 Agenda 2/20/13 o Review quiz, answer questions o Review database design exercises from 2/13 o Create relationships through “Lookup tables” o Discuss.
Chapter No 4 Query optimization and Data Integrity & Security.
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
ITGS Databases.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 Data Access Control, Password Policy and Authentication Methods for Online Bank Md. Mahbubur Rahman Alam B. Sc. (Statistics) Dhaka University M. Sc.
CSC 370 – Database Systems Introduction Instructor: Alex Thomo.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Computer Security By Duncan Hall.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
 Encryption provides confidentiality  Information is unreadable to anyone without knowledge of the key  Hashing provides integrity  Verify the integrity.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
Describe the use of technology in the financial-information management function.
IST 210 Security. IST 210 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can’t.
Database and Cloud Security
Database System Implementation CSE 507
1 DB2 Access Recording Services Auditing DB2 on z/OS with “DBARS” A product developed by Software Product Research.
Crypto in information security
Database Security and Authorization
Privacy of Client Data.
Offline Auditing for Privacy
Lecture 2 - SQL Injection
Building an Encrypted and Searchable Audit Log
Security in SDR & cognitive radio
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Protecting Privacy in Terrorist Tracking Applications Philippe Golle (Palo Alto Research Center) Paul Aoki, Dirk Balfanz, Glenn Durfee, Teresa Lunt, Diana Smetters, Jessica Staddon, Jim Thornton, Tomas Uribe (SRI)

Problem Countering terrorism involves gathering information from diverse sources to discover key facts and relationships Many of these data sources contain personal information –Identification of data with individuals makes the information sensitive Approach –Inference control to prevent unauthorized individuals from completing queries that would allow identification of ordinary citizens –Access control to return sensitive identifying data only to authorized users –Immutable audit trail for accountability Goal: Allow authorized analysts to search for terrorist- related activity while providing a realistic degree of privacy protection for ordinary citizens’ data

Privacy Appliance data source privacy appliance user query cross- source privacy appliance privacy appliance Government owned Privately owned Independently operated Standalone devices –Under private control –Better assurance of correct operation Sits between the analyst and each private data source –Easily added to an enterprise’s computing infrastructure –Like firewalls Benefits Private data stays in private hands Privacy controls isolated from the government

Functions of the Privacy Appliance Inference control to identify queries that would allow identification of individuals Access control to return identifying data only to appropriately authorized users Logging to create an immutable audit trail for accountability Authorization tables Inference control knowledge base Immutable audit trail user query modified query

Outline 1.Privacy appliance 2.Inference control 3.Access control 4.Immutable audit trail

Withhold identifying attributes –E.g., name, SSN, credit card number, address, phone number Discover which additional fields allow inference of identity –Produce a knowledge base of undesired inferences This serves as input for the access control tool Inference Control Tool type of car Individual identity zipcode employer Block the inference by raising the authorization required for one of these data items

Statistical Inference Extensions k-anonymity –Information for each person cannot be distinguished from at least k-1 other individuals The Census Bureau calls a statistic sensitive if n or fewer values contribute more than k% of the total select sum(earnings) from census-data where city = “Endicott” is sensitive because IBM in Endicott earns 100x the combined earnings of all other businesses in Endicott The inference control tool will enforce k-anonymity and other statistical notions of privacy –An offline statistical analysis can be done periodically to precompute the basis for a large number queries –Results are input to the inference analysis

Prepare the input Produce the access control data for use at runtime Analyze the annotated schemas Inference analysis is performed ahead of time Inference control KB Access control DB  Obtain the source database schemas  Mark fields that are clearly identifying  Specify additional information  Type declarations  Quasi-identifiers  Functional dependencies Perform the inference analysis: –Once initially –When schemas change –When new data sources become available –After a large number of updates

Example input to inference tool (create_table FLIGHT (group (column RECORDLOCATOR :identifying t) (column ARRIVE :type datetime) (column DEPART :type datetime) (column TICKETING) (column DESTIN) (column ORIGIN) (column AIRLINE) (column FLIGHT :type flight) (column AMOUNT) (column FOP :type fop) ;; form of payment (column NAME :identifying t :type name) (column CARDNUMBER :identifying t :type cardnumber) (column PASSENGERTYPE) (column PHONE :identifying t :type homephone) (column BILLINGADDR :identifying t :type addr) (column BILLINGCITY) (column BILLINGSTATE) (column BILLINGCOUNTRY) (column BILLINGPOSTAL) (column DELIVERYADDR :identifying t :type addr) (column DELIVERYCITY) (column DELIVERYSTATE) (column DELIVERYCOUNTRY) (column DELIVERYPOSTAL) (column SEAT) (column MEAl) (column AGENCYID) (column AGENCYPHONE)) (quasi-identifier BILLINGSTATE BILLINGCITY DELIVERYCITY TICKETING) (primary-key RECORDLOCATOR) (fdependency BILLINGPOSTAL (BILLINGCITY BILLINGSTATE BILLINGCOUNTRY)) ) (create_table FTR (group (column STUDENTID :identifying t :type name) (column ORIGIN :type nationality) ;; **country of origin** (column SCHOOLID) (column TYPE) ;; **type of training** (column NAME :identifying t :type name)) (primary-key STUDENTID) (near-key NAME)) (create_table HGR ;; hotel guest record (group (column CUSTOMERID :identifying t) (column HOTELID) (column CHECKIN :type date) (column CHECKOUT :type date) (column AMOUNT) (column FOP) ;; form of payment (column COUNTRY :type nationality) (column NAME :identifying t :type name) (column CARDNUMBER :identifying t :type cardnumber) (column ROOM) (column VEHICLE :identifying t) (column RATE) (column ADDRESS) (column LOCALITY) (column REGION) (column POSTAL)) (primary-key CUSTOMERID)) (create_table AIRLINE (group (column CODE) (column NAME)) (primary-key CODE) )

Output of inference tool (Inference Channels): C1: INS.BIRTHDATE FLIGHT.FLIGHT FTR.ORIGIN INS.GENDER C2: INS.BIRTHDATE FLIGHT.FLIGHT HGR.COUNTRY INS.GENDER C3: FLIGHT.BILLINGPOSTAL FLIGHT.DELIVERYCITY FLIGHT.TICKETING C4: INS.BIRTHDATE FLIGHT.FLIGHT INS.NATIONALITY INS.GENDER C5: INS.BIRTHDATE INS.FLIGHT FTR.ORIGIN INS.GENDER C6: INS.BIRTHDATE INS.FLIGHT HGR.COUNTRY INS.GENDER C7: INS.BIRTHDATE INS.FLIGHT INS.NATIONALITY INS.GENDER C8: INS.BIRTHDATE INS.PORTOFENTRY FTR.ORIGIN INS.GENDER C9: INS.BIRTHDATE INS.PORTOFENTRY HGR.COUNTRY INS.GENDER C10: FLIGHT.BILLINGSTATE FLIGHT.BILLINGCITY FLIGHT.DELIVERYCITY FLIGHT.TICKETING C11: INS.BIRTHDATE INS.PORTOFENTRY INS.NATIONALITY INS.GENDER Singletons: FLIGHT.RECORDLOCATOR. FLIGHT.NAME, FLIGHT.CARDNUMBER, FLIGHT.PHONE, FLIGHT.BILLINGADDR, FLIGHT.DELIVERYADDR, FTR.STUDENTID, FTR.NAME, HGR.CUSTOMERID, HGR.NAME, HGR.CARDNUMBER, HGR.VEHICLE, INS.NAME, INS.PASSPORT

Outline 1.Privacy appliance 2.Inference control 3.Access control 4.Immutable audit trail

Access Control Check authorizations Modify query as needed to withhold data Access control DB Mark access “history” Analyst query Send modified query to data source The privacy appliance will recognize –Which queries touch inference channels –Whether the user is authorized for the query Input special authorizations For higher authorization: –Can retrieve specific identifying info –Must specify scope of data authorized For lowest authorization: –Withhold identifying attributes –Prevent completion of inference channels Analysis can’t combine non-sensitive queries to obtain sensitive info

Access Control Rules Identifying Attributes: –A query is blocked if it requests an identifying attribute. Inference Channels –A channel with k attributes: –Queries may request up to n-1 attributes in channel –This bound applies “globally” to all queries ever asked by any user. Flexible and fast: performance depends on length of inference channel (not size of query histories) Collusion resistance: Users cannot combine non- privacy-violating queries that in sum are privacy- violating (we distribute keys)

Identifying Attributes A query is blocked if it requests an identifying attribute. Select name from flight where flight = 503 and arrive = ' :41:23' Query blocked! Identifying attribute: select cardnumber from flight where flight = 503 and arrive = ' :41:23' Query blocked! Identifying attribute:

Attributes that appear in the "where" clause of a query also count. Select amount from flight where name like '%Nemo%' and flight = 503 and arrive = ' :41:23' Select amount from flight where fop = 'MCRD' and flight = 503 and arrive = ' :41:23' Query blocked! Identifying attribute: amount, , 647,

Example from table “INS”: Inference Channel None of the attributes in this channel have yet been requested.

A query is blocked if it requests all the attributes in the channel (including in the “where” clause) User One: Select flight, nationality, gender, birthdate from ins where arrive > ' :00:00' and arrive < ' :00:00' Query blocked! User One: Select nationality, gender, birthdate from ins where flight = 8864 and arrive = ' :24:46' Query blocked!

A query may request up to n-1 attributes in a channel of length n User One: Select flight, nationality, gender from ins where arrive > ' :30:00' and arrive < ' :00:00' flight, nationality, gender, , BR, F, 998, BR, M, 950, BR, F, Inference channel:

Subsequent queries for the last attribute are blocked for all users User Two: Select birthdate from ins where arrive > ' :00:00' and arrive < ' :00:00' User Three: Select birthdate from ins where flight = 18 Query blocked! Note: future implementation will allow the 2 nd query

But anyone may ask again for attributes already revealed for that channel. User Two: Select nationality from ins where gender = 'F' and flight = 8864 and arrive = ' :24:46' nationality, BR, User Four: Select gender from ins where flight = 998 and arrive > ' :00:00' and arrive < ' :00:00' gender, F, M,

Outline 1.Privacy appliance 2.Inference control 3.Access control 4.Immutable audit trail

Immutable Audit Trail Protection against authorized but dishonest users Dishonest users may execute a pattern of queries from which they hope to discover identities Such abusive patterns may be discernable by retrospective inspection of an audit trail of analyst activity The audit trail will be sensitive and must be protected from inappropriate disclosure The audit trail must be protected from tampering by a dishonest user

Generation of Audit Record Shares Custodian 1 Produce audit record Analyst query Share 3Share 1Share 2 Custodian 2Custodian 3 user identity, authorizations, date, time, data requested, inference channels affected, possibly data returned separated facilities, independent custodians Each query is recorded immediately and permanently –No agent can misuse private data without the strong probability of exposure Use threshold cryptography –Each share is meaningless unless combined with k out of n other shares –Share alteration can be detected when shares are recombined Reduces the window of vulnerability for tampering Generation of shares is fast and can be done in real time Real-time analysis

If an individual feels harmed by government use of private data, he or she can petition to have relevant records inspected by an independent third party Reconstruction of history from shares is fast We will develop methods to search encrypted shares to limit the scope of any investigation –It should be possible to retrieve only those audit records pertaining to a given individual without having to decrypt the entire audit trail (hard or impossible) –It should be possible to retrieve only those audit records pertaining to a given analyst’s actions without having to decrypt the entire audit trail (easy) Inspection of the Audit Trail

Likelihood of Detecting Abuse  Audit record generation is distributed To prevent the logging of their activity, an analyst must attack each relevant privacy appliance Such behavior is highly unlikely to be successful and go undetected  Realtime audit trail analysis can scan for attempted abuse Each privacy appliance can analyze its local data. The results can be pooled for further analysis This can increase the probability that authorities will discover any abuse

Summary Inference analysis identifies sensitive data Dynamic access controls prevent access to such data Immutable audit trail means high likelihood of detection of abuse Integrate all these into a privacy appliance Allow authorized analysts to search for terrorist-related activity while providing a realistic degree of privacy protection for ordinary citizens’ data