Information Theoretic Model for Inference Resistant Knowledge Management in RBAC Based Collaborative Environment Manish Gupta Sivakumar Chennuru.

Slides:



Advertisements
Similar presentations
Critical Reading Strategies: Overview of Research Process
Advertisements

The Social Scientific Method An Introduction to Social Science Research Methodology.
An application of semantic linkage technique within a CRIS Sergey Parinov, Central Economics an Mathematics Institute of RAS, Moscow.
Benchmarking Industry – Science Relationships Based on the OECD report, March 2002 Presented by: Inês Costa Vanessa Figueiredo.
Knowledge Acquisitioning. Definition The transfer and transformation of potential problem solving expertise from some knowledge source to a program.
Chapter 6 Methodology Conceptual Databases Design Transparencies © Pearson Education Limited 1995, 2005.
1-1 The Engineering Method and Statistical Thinking Engineers solve problems of interest to society by the efficient application of scientific principles.
Research Methods in MIS Review Exam# I: Review Textbook (1-6, 8) and Lectures.
Social Networks in Intercultural Collaboration
An Overview of Today’s Class
1-1 The Engineering Method and Statistical Thinking Engineers solve problems of interest to society by the efficient application of scientific principles.
Key Management and Distribution. YSLInformation Security – Mutual Trust2 Major Issues Involved in Symmetric Key Distribution For symmetric encryption.
Data Modeling Introduction. Learning Objectives Define key data modeling terms –Entity type –Attribute –Multivalued attribute –Relationship –Degree –Cardinality.
Methodology Conceptual Database Design
Modeling & Designing the Database
Factors affecting contractors’ risk attitudes in construction projects: Case study from China 박병권.
RESEARCH FRAMEWORK Yulia Sofiatin Department of Epidemiology and Biostatistics 2012 YS 2011.
An Introduction to Assurance and Financial Statement Auditing
Research method2 Dr Majed El- Farra 1 Research methods Second meeting.
Using Bayesian Networks to Analyze Expression Data N. Friedman, M. Linial, I. Nachman, D. Hebrew University.
Preserving Link Privacy in Social Network Based Systems Prateek Mittal University of California, Berkeley Charalampos Papamanthou.
Tutor: Prof. A. Taleb-Bendiab Contact: Telephone: +44 (0) CMPDLLM002 Research Methods Lecture 8: Quantitative.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 5 “Database and Cloud Security”.
Methodology - Conceptual Database Design Transparencies
Software School of Hunan University Database Systems Design Part III Section 5 Design Methodology.
Methodology Conceptual Databases Design
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
1 Chapter 15 Methodology Conceptual Databases Design Transparencies Last Updated: April 2011 By M. Arief
Ch. 2: Planning a Study (cont’d) pp THE RESEARCH PROPOSAL  In all empirical research studies, you systematically collect and analyze data 
Chapter 1 An Introduction to Assurance and Financial Statement Auditing Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or.
WELNS 670: Wellness Research Design Chapter 5: Planning Your Research Design.
TESTING THE WATERS: USING COLLECTIVE REAL OPTIONS TO MANAGE THE SOCIAL DILEMMA OF STRATEGIC ALLIANCES MATTHEW W. MCCARTER JOSEPH T. MAHONEY GREGORY B.
HOW TO WRITE RESEARCH PROPOSAL BY DR. NIK MAHERAN NIK MUHAMMAD.
Methodology - Conceptual Database Design. 2 Design Methodology u Structured approach that uses procedures, techniques, tools, and documentation aids to.
1/26/2004TCSS545A Isabelle Bichindaritz1 Database Management Systems Design Methodology.
PPA 502 – Program Evaluation Lecture 2c – Process Evaluation.
Methodology - Conceptual Database Design
IMPACT OF QUALITY ASSURANCE SYSTEM IN EFFECTIVENESS OF VOCATIONAL EDUCATION IN ALBANIA IMPACT OF QUALITY ASSURANCE SYSTEM IN EFFECTIVENESS OF VOCATIONAL.
Lecture 4 Conceptual Data Modeling. Objectives Define terms related to entity relationship modeling, including entity, entity instance, attribute, relationship,
1 Optical Packet Switching Techniques Walter Picco MS Thesis Defense December 2001 Fabio Neri, Marco Ajmone Marsan Telecommunication Networks Group
Knowledge Management Systems
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
Student name Student ID Degree program Area of specialization
1 The Role of Statistics in Engineering ENM 500 Chapter 1 The adventure begins… A look ahead.
Research Direction Advisor: Frank,Yeong-Sung Lin Presented by Jia-Ling Pan 2010/10/211NTUIM OPLAB.
Its a specific set of linkages among a defined set of persons with the additional property that the characteristics of these linkages as a whole may be.
Introduction to Life Science. Science is a way of learning about the natural world Scientific inquiry – all the diverse ways in which scientist study.
Job Analysis. The process of collecting and organizing information about jobs performed in the organization and the principle elements involved in performing.
Overview of the Training Program Leaning Program on Regional Research Development and Methodology 3 – 21 May 2010.
BY: ALEJANDRA REYES DALILA OCHOA MARY GARCIA Part A Introduction to Research Methods Topics 1-5.
Future Wars in Europe Sergiy Shtukarin. Presentation contents Summary of Content Educational Aims Learning Outcomes Module Evaluation Lecture Titles Seminar.
Information and Statistics in Nuclear Experiment and Theory - Introduction D. G. Ireland 16 November 2015 ISNET-3, ECT* Trento.
Statistical Methods. 2 Concepts and Notations Sample unit – the basic landscape unit at which we wish to establish the presence/absence of the species.
Software Project Management Lecture 4. Organizational Culture A system of shared meanings and common beliefs held by organizational members that determines,
Information Systems in Organizations 1.2 What’s in it for you? 1.3 Ethics of analysis and use of systems, data and information.
Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke1 The Entity-Relationship Model Chapter 2.
Statistical process model Workshop in Ukraine October 2015 Karin Blix Quality coordinator
Statistical Concepts Basic Principles An Overview of Today’s Class What: Inductive inference on characterizing a population Why : How will doing this allow.
METADATA MANAGEMENT AT ISTAT: CONCEPTUAL FOUNDATIONS AND TOOLS Istituto Nazionale di Statistica ITALY.
Database and Cloud Security
Methodology Conceptual Databases Design
Methodology Conceptual Database Design
Associated with quantitative studies
Towards Measuring Anonymity
The Nature of Probability and Statistics
Bivariate Association: Introduction & Basic Concepts
Methodology Conceptual Databases Design
Overview of Database Security
CONTROL SYSTEM AN INTRODUCTION.
Presentation transcript:

Information Theoretic Model for Inference Resistant Knowledge Management in RBAC Based Collaborative Environment Manish Gupta Sivakumar Chennuru

Overview Model to reveal inference vulnerabilities Need for the model Description of the model Results Benefits

Introduction Information – key organizational resource  Dissemination and Sharing Current Access Control Methods  Segregation techniques  Direct Access Control Are these sufficient?

Need for the model Indirect Access Mechanisms  Individual knowledge  On the role knowledge acquisition  Informal communication channels Framework for identifying and analyzing  Data (information)  Roles  Roles’ direct access to data  Association among roles prone to inference

Prior work Database design  Uncover secondary paths leading to inferences  Functional dependencies  Conceptual structures  Semantic data modeling

Why Information Theory?  Mathematical theory to quantify the concept of information  Measure for the Entropy and Information  Mutual information  Amount of information obtained by observing another information  Channel  Interaction between employees with different roles  Continuous transfer over a variable length of time

Model Description Data Units  ORG = {D 1, D 2,......, D N }; where N is total number of data units in the organization.  Each data unit D i will have some information content I i  Each data unit may or may not be linked with other data units.  The information revealed is additive if the data units are statistically independent.

Model Description Data Units (contd)  The mutual information of a data unit l(i;j) is the difference in the uncertainty of D i and the remaining uncertainty of D i after observing D j. Data Inputs  For each data unit Di, all data units in set ORG which are not statistically independent  For each data unit Di, all proper subsets of ORG which are not statistically independent

Model Description Roles  Set of Roles in the organization, R = { R 1, R 2,......, R M }; where M is total number of roles in the organization  Relationship between Data units and Roles  Relationship between Roles  Degree of Proximity of Roles

Roles and Data Units Relation between roles RLINK1 [R 1 ] = { R 2, R 3, R 4, R 5 } RLINK2 [R 1 ] = { R 6, R 7 } Role-Data unit direct access RSET [D 1 ] ∈ { R 1, R 2, R 3 } RSET [D 2 ] ∈ { R 1, R 4, R 5 } RSET [D 3 ] ∈ { R 5, R 6, R 7 } Role-Data unit Indirect Access R 4 D 3 (path P 2 ) R 1 D 3 (path P 1 ) Strength of inference depends upon mutual information.

Proposed ER Model

Inference Extraction Select a role (r) from MASTER_ROLE Select all the data units (d i ) linked to the above role from RSET_DSET Select all the roles linked to the above role from RLINK Select the data units (d k ) accessed by the linked roles and the mutual information of these data units (d k ;d i ) from data units accessed by the role (r) The results are stored in INFER_TABLE

Results Role centric views Roles and Role associations that can be exploited for inference attacks. Scenario 1 Scenario2

Results Data centric views List of data units most vulnerable to design with the given role structure.

Benefits Identifying possible inference attacks Assignment of individuals to the roles Greater assurance against insider attacks

Questions Thank You