1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.

Slides:



Advertisements
Similar presentations
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie.
Advertisements

Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Trust Management of Services in Cloud Environments:
1 Trust-based Privacy Preservation for Peer-to-peer Data Sharing Y. Lu, W. Wang, D. Xu, and B. Bhargava yilu, wangwc, dxu, cs.purdue.edu Department.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Are you ready for HIPPO??? Welcome to HIPAA
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
/7/2015 8:01:19 PM 7. Using Trust for Role-Based Access Control (RBAC) Prof. Bharat Bhargava Center for Education and Research in Information Assurance.
6. Trust Negotiations and Trading Privacy for Trust * Presented by: Prof. Bharat Bhargava Department of Computer Sciences and Center for Education and.
1 Towards Decentralized and Secure Electronic Marketplace Yingying Chen, Naftaly Minsky, Constantin Serban, and Wenxuan Zhang Dept of Computer Science.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Privacy Management for a Global Enterprise.
Protection of Identity Information in Cloud Computing without Trusted Third Party 作者 :Rohit Ranchal, Bharat Bhargave, Lotfi Ben Othmane, Leszek Lilien,
1 Building A Trustworthy, Secure, And Privacy Preserving Network Bharat Bhargava CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue.
Private and Trusted Interactions * Bharat Bhargava, Leszek Lilien, and Dongyan Xu {bb, llilien, Department of Computer.
Trust, Privacy, and Security Moderator: Bharat Bhargava Purdue University.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Distributed DBMS© 2001 M. Tamer Özsu & Patrick Valduriez Page 0.1 Outline Introduction Background Distributed DBMS Architecture Distributed Database Design.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust, Privacy, and Security Moderator: Bharat Bhargava 1 Coordinators: Bharat Bhargava 1, Csilla Farkas 2, and Leszek Lilien 1 1 Purdue University and.
/16/2015 9:20:53 PM 9. Role-Based Access Control (RBAC) Role Classification Algorithm Prof. Bharat Bhargava Center for Education and Research in.
Using Digital Credentials On The World-Wide Web M. Winslett.
1 Using Certified Policies to Regulate E-Commerce Transactions Victoria Ungureanu Rutgers University.
Using Entropy to Trade Privacy for Trust Yuhui Zhong Bharat Bhargava {zhong, Department of Computer Sciences Purdue University This work.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
PRIVACY, TRUST, and SECURITY Bharat Bhargava (moderator)
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
HIPAA COMPLIANCE IN YOUR PRACTICE MARIBEL VALENTIN, ESQUIRE.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
National Public Health Performance Standards Local Assessment Instrument Essential Service:3 Inform, Educate, and Empower People about Health Issues.
Database Design - Lecture 1
DBS201: DBA/DBMS Lecture 13.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
1 Identity and Transparency ( Bridging the GAPS of Governance Bridging the GAPS of Governance in eGov Initiatives in eGov Initiatives )‏ Badri Sriraman.
Creating a Shared Vision Model. What is a Shared Vision Model? A “Shared Vision” model is a collective view of a water resources system developed by managers.
 Dr. Syed Noman Hasany.  Review of known methodologies  Analysis of software requirements  Real-time software  Software cost, quality, testing and.
Security Challenges Facing Seaport Operations Day 1 - Module 3.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Policy-based Dynamic Authorization Framework for Sharing Medical Data Apurva Mohan and Douglas M. Blough, Georgia Institute of Technology Andrew Post,
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill Chapter 6 The Privacy and Security of Electronic Health Information.
Notes of Rational Related cyt. 2 Outline 3 Capturing business requirements using use cases Practical principles  Find the right boundaries for your.
Reclaimed Wastewater Quality Criteria, Standards, and Guidelines
Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Computer Science and Engineering 1 Mobile Computing and Security.
Policy-Based Dynamic Negotiation for Grid Services Authorization Ionut Constandache, Daniel Olmedilla, Wolfgang Nejdl Semantic Web Policy Workshop, ISWC’05.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
Functioning as a Business Associate Under HIPAA William F. Tulloch Director, PCBA March 9, 2004.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
COMMUNITY-WIDE HEALTH INFORMATION EXCHANGE: HIPAA PRIVACY AND SECURITY ISSUES Ninth National HIPAA Summit September 14, 2004 Prepared by: Robert Belfort,
Understanding Privacy An Overview of our Responsibilities.
Understanding Privacy An Overview of our Responsibilities.
Presented by Edith Ngai MPhil Term 3 Presentation
iSecurity Compliance with HIPAA
Software Project Configuration Management
Data Security Policies
The Nature of Groups.
THE STEPS TO MANAGE THE GRID
Disability Services Agencies Briefing On HIPAA
Ethical questions on the use of big data in official statistics
Formalization of Trust, Fraud, and Vulnerability Analysis
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

1 Trust and Privacy in Authorization Bharat Bhargava Yuhui Zhong Leszek Lilien CERIAS Security Center CWSA Wireless Center Department of CS and ECE Purdue University Supported by NSF IIS , NSF IIS

2 Applications/Broad Impacts Guidelines for the design and deployment of security-sensitive applications in the next- generation networks –Data sharing for medical research and treatment –Collaboration among government agencies for homeland security –Transportation systems (travel security checks, hazardous material disposal) –Collaboration among government officials, law enforcement, security personnel, and health care facilities during bio-terrorism and other emergencies

3 Trust-based Authorization Authorization based on: Role Based Access Control model Uncertain evidence Dynamic Trust Authorization process considering: Tradeoff between privacy and trust

4 A. Trust-based Authorization Problem –Dynamically establish and maintain trust among entities in an open environment Research directions –Handling uncertain evidence –Modeling dynamic trust Challenges –Uncertain information complicates inference –Subjectivity leads to varying interpretations of the same information –Trust is multi-faceted and context-dependent – hence trust modeling requires tradeoffs: representation comprehensiveness vs. computation simplicity

5 Uncertain Evidence Evaluating uncertainty of a role assignment policy given a set of uncertain evidence Probability-based approach –Atomic formula: Bayes network + causal inference + conditional probability interpretation of opinion –AND/OR expressions: rules [J ø sang'01] –Subjectivity handled by discounting operator [Shafer'76]

6 Dynamic Trust Trust established based on direct interaction –Identify behavior patterns and their characteristic features –Determine which pattern is the best match for the current interaction sequence –Develop algorithms establishing trust Unique feature: we consider behavior patterns Reputation evaluation –Choose reputation information providers –Scale reputation ratings Bob’s 0.7 means 0.5 to Alice but 0.8 to Carol

7 TERA Architecture

8 Trust Enhanced Role Assignment (TERA) Prototype Trust enhanced role mapping (TERM) server assigns roles to users based on –Uncertain & subjective evidence –Dynamic trust Reputation server –Dynamic trust information repository –Evaluate reputation from trust information by using algorithms specified by TERM server Prototype and demo are available at

9 B. Trading Privacy for Trust Problems –Minimize loss of privacy necessary to gain the required level of trust –Control dissemination of “traded” private data Research directions –Measuring privacy –Modelling privacy - trust tradeoff –Controlling private data dissemination Challenges –Specify policies through metadata and establish guards as procedures –Efficient implementation self-descriptiveness, apoptosis, evaporation –Define context-dependent privacy disclosure policies depending on who will get this information, possible uses of this information, information disclosed in the past, etc. –Propose more universal privacy metrics usually they are ad hoc and customized Details at:

10 Privacy Metrics Determine the degree of data privacy –Size-of-anonymity-set metrics –Entropy-based metrics Privacy metrics should account for: –Dynamics of legitimate users –Dynamics of violators –Associated costs

11 Privacy-Trust Tradeoff Gain required level of trust with minimal privacy loss Build trust based on digital users’ credentials that contain private information Formulate the privacy-trust tradeoff problem Estimate privacy loss due to disclosing a set of credentials Estimate trust gain due to disclosing credentials Develop algorithms that minimize privacy loss for required trust gain

12 Controlling Private Data Dissemination  Design self-descriptive private objects  Construct a mechanism for apoptosis of private objects apoptosis = clean self-destruction  Develop proximity-based evaporation of private objects

13 Examples of one-dimensional distance metrics –Distance ~ business type –Distance ~ distrust level: more trusted entities are “closer” Multi-dimensional distance metrics –Security/reliability as one of dimensions Examples of Proximity Metrics Insurance Company B Bank I - Original Guardian Insurance Company C Insurance Company A Bank II Bank III Used Car Dealer 1 Used Car Dealer 2 Used Car Dealer 3 If a bank is the original guardian, then: -- any other bank is “closer” than any insurance company -- any insurance company is “closer” than any used car dealer

14 Private and Trusted System (PRETTY) Prototype (1) [2a] (3) User Role [2b] [2d] [2c1] [2c2] (2) (4) TERA = Trust-Enhanced Role Assignment

15 Information Flow in PRETTY 1)User application sends query to server application. 2)Server application sends user information to TERA server for trust evaluation and role assignment. a)If a higher trust level is required for query, TERA server sends the request for more user’s credentials to privacy negotiator. b)Based on server’s privacy policies and the credential requirements, privacy negotiator interacts with user’s privacy negotiator to build a higher level of trust. c)Trust gain and privacy loss evaluator selects credentials that will increase trust to the required level with the least privacy loss. Calculation considers credential requirements and credentials disclosed in previous interactions. d)According to privacy policies and calculated privacy loss, user’s privacy negotiator decides whether or not to supply credentials to the server. 3)Once trust level meets the minimum requirements, appropriate roles are assigned to user for execution of his query. 4)Based on query results, user’s trust level and privacy polices, data disseminator determines: (i) whether to distort data and if so to what degree, and (ii) what privacy enforcement metadata should be associated with it.