1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The PEI + UCON Framework for Application Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Future of Access Control: Attributes, Automation, Adaptation
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 What is the Game in Cyber Security? Ravi Sandhu Executive Director and Endowed Professor February 2011
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor July 27, 2011
1 Usage Control (UCON) or ABAC on Steroids Prof. Ravi Sandhu Executive Director and Endowed Chair February 26, 2016
1 Understanding Which New Threats Operators Can Expect To Face Within The Next Two To Five Years To Improve The On- Going Management Of Security Systems.
1 Cyber Security Major R&D Challenges Ram Krishnan Cyber Security Research Institute (CSRI) Cyber Security R&D Workshop.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
Security and Privacy in the Networked World
Introduction to Cyber Security
Introduction and Basic Concepts
Attribute-Based Access Control: Insights and Challenges
Identity and Access Control in the
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Authentication and Authorization Federation
Cyber Security and Privacy: An Optimist’s Perspective
Identity and Access Control in the
Big Data and Privacy Panel Prof. Ravi Sandhu
Executive Director and Endowed Chair
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Application-Centric Security
Assured Information Sharing
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Presentation transcript:

1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

Fundamental Premise  Cyber Security is about tradeoffs  confidentiality, integrity, availability, usage, privacy, cost, usability, productivity, etc  Tradeoffs require application context © Ravi Sandhu 2 World-Leading Research with Real-World Impact! ProductivitySecurity Let’s build it Cash out the benefits Next generation can secure it Let’s not build it Let’s bake in super-security to make it unusable/unaffordable Sweet spots exist How to predictably find them? The cyber security grand challenge

 Proof point: Automatic Teller Machines  secure enough  global and growing  not pitched as a success story  Proof points: others in consumer space  on-line banking  e-retail  electronic payments (suggested by David Chadwick)  Proof points: beyond consumer space  US President’s nuclear football  secret formula for Coca Cola © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Sweet Spots Exist

 Once data has escaped into the wild it cannot be recaptured  Closing the barn door after the horse has fled and been cloned multiple times  Data can leak from legitimate recipients through analog and digital holes  Mal-users can leak  Mal-ware can leak (w/o requiring mal-users) © Ravi Sandhu 4 World-Leading Research with Real-World Impact! Limits of Data Usage Control Preventive Technologies have Absolute Limits Detection and Recourse Technologies have Scaling Limits

 Jaehong Park and Ravi Sandhu The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7, 1 (February 2004),  Alexander Pretschner, Manuel Hilty, and David Basin Distributed usage control. Commun. ACM 49, 9 (September 2006), © Ravi Sandhu 5 World-Leading Research with Real-World Impact! What is Data Usage Control Emphasis on authorizations and obligations before and during usage Emphasis on post-usage obligations

© Ravi Sandhu 6 World-Leading Research with Real-World Impact! Usage Control Motivators Security Architectures Security Objectives

© Ravi Sandhu 7 World-Leading Research with Real-World Impact! UCON ABC Models Continuity Decision can be made during usage for continuous enforcement Mutability Attributes can be updated as side- effects of subjects’ actions

© Ravi Sandhu 8 World-Leading Research with Real-World Impact! Contexts for Data Usage C Individual Consumer P Individual Professional B Business Enterprises Comment by Alexander Pretschner: Need attacker contexts also

© Ravi Sandhu 9 World-Leading Research with Real-World Impact! Contexts for Data Usage Contexts crossover and bleed into one another

 Fair Credit Reporting Act (FCRA)  1970 onwards  Internal Revenue Service  Federal Bureau of Investigation (FBI) vis a vis Central Intelligence Agency (CIA) and National Security Agency (NSA)  pre and post 9/11  Family Educational Rights and Privacy Act (FERPA)  1974 onwards © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Data Usage Control Laws (USA)

 Digital Audio Tape (DAT)  iTunes © Ravi Sandhu 11 World-Leading Research with Real-World Impact! Digital Rights Management

 Laws, norms, business contracts are all necessary  What can be done technically  The Containment Challenge  The Policy Challenge  The Reality Challenge  Not included in delivered talk:  How should microsec and macrosec play into this? © Ravi Sandhu 12 World-Leading Research with Real-World Impact! Grand Challenges