Vijayalakshmi Atluri MSIS Department and CIMIC Rutgers University - USA Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.

Slides:



Advertisements
Similar presentations
UDDI v3.0 (Universal Description, Discovery and Integration)
Advertisements

Database Systems: Design, Implementation, and Management Tenth Edition
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
OASIS Reference Model for Service Oriented Architecture 1.0
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
DGC Paris Community Authorization Service (CAS) and EDG Presentation by the Globus CAS team & Peter Kunszt, WP2.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
1 SYSTEM and MODULE DESIGN Elements and Definitions.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
1 Lecture 13: Database Heterogeneity Debriefing Project Phase 2.
Introduction to Databases Transparencies
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies Janice Warner and Vijayalakshmi Atluri.
A Credential-Based Approach for Facilitating Automatic, Secure Resource Sharing Among Ad-hoc Dynamic Coalitions Janice Warner and Vijayalakshmi Atluri.
Information Technology in Organizations
Lecture 7 Access Control
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Academic Year 2014 Spring.
Understanding Active Directory
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
COMPUTING FOR BUSINESS AND ECONOMICS-III. Lecture no.6 COURSE INSTRUCTOR- Ms. Tehseen SEMESTER- Summer 2010.
Authorization Scenarios with Signet RL “Bob” Morgan University of Washington Internet2 Member Meeting, September 2004.
Database Design - Lecture 1
CBAC Presentation Vishwas Patil, TIFR. CBAC Coalition-Based Access Control.
An Introduction to Software Architecture
Sanzi-1 CSE5 810 CSE5810: Intro to Biomedical Informatics Dynamically Generated Adaptive Credentials for Health Information Exchange Eugene Sanzi.
CST203-2 Database Management Systems Lecture 2. One Tier Architecture Eg: In this scenario, a workgroup database is stored in a shared location on a single.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Database System Concepts and Architecture
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 1 : Introduction §Purpose of Database Systems §View of Data §Data Models §Data Definition Language §Data Manipulation Language §Transaction Management.
Application code Registry 1 Alignment of R-GMA with developments in the Open Grid Services Architecture (OGSA) is advancing. The existing Servlets and.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 3: SOA Reference Model OASIS 2006.
©Silberschatz, Korth and Sudarshan1.1Database System Concepts Chapter 1: Introduction Purpose of Database Systems View of Data Data Models Data Definition.
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
Lecture # 3 & 4 Chapter # 2 Database System Concepts and Architecture Muhammad Emran Database Systems 1.
G53SEC 1 Access Control principals, objects and their operations.
DataBase Management System What is DBMS Purpose of DBMS Data Abstraction Data Definition Language Data Manipulation Language Data Models Data Keys Relationships.
Page 1 of ?? Wireless Industry Congress 2003 NCAC Workshop (Ottawa) © Ramiro Liscano 2005 Context-based Coalition Access Control for Spontaneous Networking.
Scaling Heterogeneous Databases and Design of DISCO Anthony Tomasic Louiqa Raschid Patrick Valduriez Presented by: Nazia Khatir Texas A&M University.
DATABASE MANAGEMENT SYSTEM ARCHITECTURE
Legion - A Grid OS. Object Model Everything is object Core objects - processing resource– host object - stable storage - vault object - definition of.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
1 Chapter Overview Managing Object and Container Permissions Locating and Moving Active Directory Objects Delegating Control Troubleshooting Active Directory.
Advanced CAMP: BoF Summaries. 2 Role-based Access Control (RBAC)
Slide 1 Systems Analysis and Design With UML 2.0 An Object-Oriented Approach, Second Edition Chapter 2: Introduction to Object-Oriented Systems Analysis.
KIM: Kuali Abstraction Layer for Identities, Groups, Roles, and Permissions.
1 Software Design Lecture What’s Design It’s a representation of something that is to be built. i.e. design  implementation.
Computer Security: Principles and Practice
CSC 8320 Advanced Operating System Discretionary Access Control Models Presenter: Ke Gao Instructor: Professor Zhang.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
1 SOA Seminar Seminar on Service Oriented Architecture SOA Reference Model OASIS 2006.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Databases and Database User ch1 Define Database? A database is a collection of related data.1 By data, we mean known facts that can be recorded and that.
Introduction to DBMS Purpose of Database Systems View of Data
Chapter 14: System Protection
Chapter 2 Database Environment.
Chapter 1: Introduction
THE STEPS TO MANAGE THE GRID
Chapter 2 Database Environment.
Chapter 2 Database Environment Pearson Education © 2009.
Chapter 2 Database Environment.
An Introduction to Software Architecture
Introduction to DBMS Purpose of Database Systems View of Data
Chapter 2 Database Environment Pearson Education © 2009.
Presentation transcript:

Vijayalakshmi Atluri MSIS Department and CIMIC Rutgers University - USA Automatic Enforcement of Access Control Policies Among Dynamic Coalitions

24-Dec-2004V. Atluri 2 Coalition Resource Sharing Dynamic and Ad-hoc – members may leave and new members may join Dynamic and Ad-hoc – members may leave and new members may join Examples: Examples: –Natural Disaster: government agencies (e.g., local police and fire departments), non-government organizations (e.g., Red Cross) and private organizations (e.g. Doctors without Borders) may share data about victims, supplies and logistics. –Homeland Security: Information collected by various governmental agencies shared for comprehensive data mining –Virtual Enterprises: Collaboration between companies

24-Dec-2004V. Atluri 3 Current Sharing Approaches are Either Administratively Prohibitive or Insecure Current Approaches: User ids given to each external member of the coalition and access control is provisioned on these ids. User ids given to each external member of the coalition and access control is provisioned on these ids. Problem: administratively burdensome and requires explicit revocation upon coalition termination or when user is no longer affiliated with coalition entity Single access id provided to each external coalition entity Single access id provided to each external coalition entity Problem: Fine-grained access control is not possible Resources are copied to external coalition member Resources are copied to external coalition member Problem: Updates are difficult and may result in uncontrolled sharing

24-Dec-2004V. Atluri 4 Translation of coalition level policies to implementation level Need to transform higher level (coalition level) security policies on data sharing among agencies to implementation level and vice versa Need to transform higher level (coalition level) security policies on data sharing among agencies to implementation level and vice versa –percolation of low level details to organization level Agreements between agencies A and B (coalition level) are not at the level that specify fine-grained access control policies Agreements between agencies A and B (coalition level) are not at the level that specify fine-grained access control policies –E.g., “a user Alice of agency B can access a file on immigrants of agency A.” Trivial solution: Trivial solution: –form teams (workgroups) comprising of employees at the corresponding levels of both agencies –not practical and scalable, may result in delays

24-Dec-2004V. Atluri 5 Translation of coalition level policies to implementation level (continued) Develop a formal model Develop a formal model –enables handshaking of relevant information by appropriate levels of the agencies –similar to the layers in the TCPIP network protocol –will enable the implementation level details be piggy- backed as the access control policy percolates to the coalition level, The coalition level policies trickle down to the implementation level

24-Dec-2004V. Atluri 6 Principles of Our Model Principle 1:Existing access control mechanisms within each entity should remain intact. Principle 2:A common access control model will best facilitate automation of policy decisions. Principle 3:Administration of the coalition access control model should be decentralized and remain in the hands of the resource users.

24-Dec-2004V. Atluri 7  role segment  user-object request  Layered CBAC Model User-Object Level Role Level Coalition Level  user-object request   role segment  user-object request  Entity AEntity B User-Object Level Role Level Coalition Level  user-object request   coalition segment  role segment  user-object request 

24-Dec-2004V. Atluri 8 Essential Formalisms Objects (OBJS) Objects (OBJS) –Each belongs to an object type which have object-type ids (ot_id) and attributes. –Described by the triple (ot_id, obj_id, obj-attr-values) –Permissions can be assigned on individual objects or object types to allow for aggregation. Credentials (c) Credentials (c) –An instance of a credential type (ct) –Described by a 4-tuple (ct_id, c_id, user_id, user-profile) –User-profile is a set of attributes values for the user

24-Dec-2004V. Atluri 9 Essential Formalisms Coalition (C) Coalition (C) –Described by a tuple (coalition_id, E) where E = {e 1, e 2, …} is a set of coalition entities that have unique identifiers. Coalition Level Policy Specification (p) Coalition Level Policy Specification (p) –p = (coalition_id, source_entity_id, destination_entity_id, source_object_type) –One or more p can apply to a coalition C –Statement of object types allows the policy to be stated at a more abstract level, facilitating the dynamic addition of new objects w/o having to change p

24-Dec-2004V. Atluri 10 Mapping Credentials to Objects Each subject is associated with one or more credentials. Each subject is associated with one or more credentials. The credentials associated with a role r is the union of all the credentials associated with the subjects assigned to a role r. The credentials associated with a role r is the union of all the credentials associated with the subjects assigned to a role r. –At the destination, the credentials associated with a role r d assigned to the requesting user u d are extracted to submit with the request for the object. The set of required credential attributes to access an object (obj) is defined as the credentials associated with a role r that has permission to access obj. The set of required credential attributes to access an object (obj) is defined as the credentials associated with a role r that has permission to access obj. –At the source, the required credential attributes for the requested object are compared against the submitted credentials.

24-Dec-2004V. Atluri 11 Policy Translation Key Idea: Users are not mapped to a specific role at the source entity. Instead, their credential attributes are matched with those required to access an object. Key Idea: Users are not mapped to a specific role at the source entity. Instead, their credential attributes are matched with those required to access an object. Algorithm Algorithm 1.User requests access to remote object. (user-object level) 2.User’s potential local role set is identified. (role level) 3.Credentials associated with local roles are extracted. (role level) 4.Request message containing the credentials are sent to the object source based on policy p. (coalition level) 5.Credential attributes necessary to access object extracted from examining local source roles that have permission and compared with destination credentials. (role level) 6.If destination credentials are sufficient, access to object is permitted. (user-object level)

24-Dec-2004V. Atluri 12 Example Scenario Dr. Roberts, a member of Doctors Without Borders, wishes to access data on infection diseases in the area of an earthquake (Turkey) in a database maintained by the International Red Cross. Dr. Roberts is a member of the internal role “doctor” He has a credential “medical-doctor” which has attributes: –affiliation: Doctors without Borders –speciality: Immunology

24-Dec-2004V. Atluri 13 Object Hierarchy Outbreak Reports (OID=510) Nepal-october1999 (OID=720) Turkey-july2004 (OID=730) Brazil-0202 (OID= 514) Red Cross Emergency Response Info System Infectious Diseases (OID=500) Incident Data (OID=700) ……. Turkey-0503 (OID= 517) bloodtests (OID= 722) Case reports (OID= 729) bloodtests (OID= 731) Case reports (OID= 735) ….

24-Dec-2004V. Atluri 14 Objects Relevant to the Coalition Outbreak Reports (OID=510) Nepal-october1999 (OID=720) Turkey-july2004 (OID=730) Brazil-0202 (OID= 514) Red Cross Emergency Response Info System Infectious Diseases (OID=500) Incident Data (OID=700) ……. Turkey-0503 (OID= 517) bloodtests (OID= 722) Case reports (OID= 729) bloodtests (OID= 731) Case reports (OID= 735) ….

24-Dec-2004V. Atluri 15 Example Scenario Role Interpreter User-Object Access Controller Doctors Without Borders International Red Cross 1  roberts, concept: infectious diseases  Dr. Roberts 2  doctor, ( location: Turkey, specialty: immunology)  concept: infectious diseases   Coalition-level Policy interpreter Role Interpreter User-Object Access Controller Coalition-level Policy interpreter 3  , DB99, RC11,  doctor, (location:Turkey, speciality: immunology)  concept: infectious diseases     doctor, ( location: Turkey, specialty: immunology)  concept: infectious diseases   4  934, 527, 777, 1112  5 6

24-Dec-2004V. Atluri 16 CBAC System Architecture Collaborative Interface Credential Issuer Entity 1 Existing Systems (DBs, File systems, Workflow systems) Role Hierarchy Object Hierarchy Entity 1 Coalition Control System RBAC Module Policy Interpretor Role Mediator User-Object Controller RBAC Module Entity 2 Existing Systems (DBs, File systems, Workflow systems) Role Hierarchy Object Hierarchy Policy Interpretor Role Mediator User-Object Controller Entity 2 Coalition Control System

24-Dec-2004V. Atluri 17 CBAC Components Role Hierarchy Role Hierarchy –Identifies objects in the object db that can be accessed by defined roles. –Specifies credentials that are to be associated with the role. –Indicates actions allowed on the objects or actions specifically denied –Tracks roles granted to coalition members and roles received from coalition members

24-Dec-2004V. Atluri 18 CBAC Components Object Hierarchy DB: Object Hierarchy DB: –Contains description of resources that can be externally shared within coalitions –Is arranged in a hierarchy so that permissions can be given at different levels –Stores attributes of objects including object types, keywords, concepts. –Includes the physical location of objects –Contains conditions on sharing with external organizations

24-Dec-2004V. Atluri 19 Future Research Shared Ownership of Objects Shared Ownership of Objects Formation of Coalitions Based on Published Policies Rather than High Level Agreements Formation of Coalitions Based on Published Policies Rather than High Level Agreements Separation of Duty and other Constraints Separation of Duty and other Constraints Delegation Delegation Implementation Implementation