Anupam Joshi and Tim Finin Ebiquity UMBC

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Page 1 Copyright © 2010 Data Access Technologies, Inc. Model Driven Solutions May 2009 Cory Casanave Architecture of Services SOA for E-Government Conference.
GT 4 Security Goals & Plans Sam Meder
Enabling Secure Internet Access with ISA Server
Policy based Cloud Services on a VCL platform Karuna P Joshi, Yelena Yesha, Tim Finin, Anupam Joshi University of Maryland, Baltimore County.
1 Context Modeling and Constraints Binding in Web Service Business Process Kosala Yapa Bandara, MingXue Wang, Claus Pahl Dublin City University Summarized.
Integrated Lifecycle of IT Services in a Cloud Environment Karuna P Joshi Ebiquity Research Group, Computer Science and Electrical Engineering Dept, UMBC.
Trust Management of Services in Cloud Environments:
Operating System Security
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
SmartER Semantic Cloud Sevices Karuna P Joshi University of Maryland, Baltimore County Advisors: Dr. Tim Finin, Dr. Yelena Yesha.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
1 DCS860A Emerging Technology Physical layer transparency in Cloud Computing (rev )
NextGRID & OGSA Data Architectures: Example Scenarios Stephen Davey, NeSC, UK ISSGC06 Summer School, Ischia, Italy 12 th July 2006.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Omniran OmniRAN Wi-Fi Hotspot Roaming Use Case Date: Authors: NameAffiliationPhone Max RiegelNSN
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Clinic Security and Policy Enforcement in Windows Server 2008.
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Identity Management Report By Jean Carreon and Marlon Gonzales.
Common Devices Used In Computer Networks
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Knowledge based Learning Experience Management on the Semantic Web Feng (Barry) TAO, Hugh Davis Learning Society Lab University of Southampton.
Deploying Trust Policies on the Semantic Web Brian Matthews and Theo Dimitrakos.
Provenance Metadata for Shared Product Model Databases Etiel Petrinja, Vlado Stankovski & Žiga Turk University of Ljubljana Faculty of Civil and Geodetic.
Tim Finin University of Maryland, Baltimore County 29 January 2013 Joint work with Anupam Joshi, Laura Zavala and our students SRI Social Media Workshop.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
AMPol-Q: Adaptive Middleware Policy to support QoS Raja Afandi, Jianqing Zhang, Carl A. Gunter Computer Science Department, University of Illinois Urbana-Champaign.
Linked-data and the Internet of Things Payam Barnaghi Centre for Communication Systems Research University of Surrey March 2012.
Secure Credential Manager Claes Nilsson - Sony Ericsson
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Semantics for Cybersecurity and Privacy Tim Finin, UMBC Joint work with Anupam Joshi, Karuna Joshi, Zareen Syed andmany UMBC graduate students
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Page 1 Alliver™ Page 2 Scenario Users Contents Properties Contexts Tags Users Context Listener Set of contents Service Reasoner GPS Navigator.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
1 Introduction to Web Services Quality Model And Collaboration Issues for EERP Sojung Kim WSQM TC National Information society Agency.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
1 Web Servers (Chapter 21 – Pages( ) Outline 21.1 Introduction 21.2 HTTP Request Types 21.3 System Architecture.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
Computational Policies in a Need to Share Environment Tim Finin University of Maryland, Baltimore County SemGrail workshop, Redmond WA, 21 June 2007.
1/14/ :59 PM1/14/ :59 PM1/14/ :59 PM Research overview Koen Victor, 12/2007.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Class Diagrams. Terms and Concepts A class diagram is a diagram that shows a set of classes, interfaces, and collaborations and their relationships.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
PMRM Revision Discussion Slides Illustrations/Figures 1-3 o Model, Methodology, “Scope” options Functions, Mechanisms and “Solutions” Accountability and.
Rights Management for Shared Collections Storage Resource Broker Reagan W. Moore
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Anupam Joshi University of Maryland, Baltimore County Joint work with Tim Finin and several students Computational/Declarative Policies.
A Context Framework for Ambient Intelligence
Distribution and components
Policy based Cloud Services on a VCL platform
Securing Home IoT Environments with Attribute-Based Access Control
Chapter 29: Program Security
Presentation transcript:

Anupam Joshi and Tim Finin Ebiquity UMBC

 Constraining Information Flow in Social Networks using Policies and Context  Probing Policy secured systems to recover policy  SOA based Infrastructure  Securing Clouds with Policy 2

3

 Increase in the user generated content on web  Rise in the online interactions and content sharing among users  More dynamic context  Need to provide precise control over the conditions under which users can share their personal information 4

 Availability of GPS functionality on phone devices like iPhone, HTC-G1 and network based positioning methods on internet  Social network maps friends and their locations using Maps API on the web  Content sharing relative to dynamic context (location and time)  Privacy is an important issue with the current systems like Google latitude, Loopt, Brightkite 5

6

Static knowledge about user profile, and networks of friends Knowledge about dynamic user context like current activity, location Privacy enforcement rules Reasoning Engine Network Privacy Control Framework Content Preferences Content Aggregator Social Media Policy network ontology Database 7

 Policy network ontology  Integrates Rein and AIR policy ontology  Rein policies to provide access control and AIR policies to provide justification to the inferences made  Policies specified using N3 rules and Turtle  Reasoning engine  CWM, a forward chaining rule engine ▪ Pychinko, a forward chaining rule engine, written in Python, that implements Rete algorithm and allows for efficient processing of very large rule bases  Supports a significant subset of the math, string, time and logic built-ins 8

9 Policy(N3) Resource (User-location) Meta-Policy Policy Language (loc-access) Policy Language (loc-access) policy language meta-policy Request Requester Credentials Location-Access Answer Valid InValid access requester ans IsA Policy Network Ontology Request Ontology

Privacy Policy follows Deny-Access approach. It specifies authorization logic -- Authentication is separate  What information user is willing to share  With whom  Friends  Group of friends  Under what conditions  Day and time of the week  Location of the user, specifying the area in which user can be seen  Accuracy level of the (location) information 10

Example policies can be :  Share my location with teachers on weekdays only if I am in the university campus and only between 9 am and 6 pm  Share exact location with members of family group all the time, in all locations  Do not share my location if I am at any of the sensitive locations  Do not share my activity status with teachers on weekends  Share my activity status with only close friends 11

Example of location access control policy: Share my location with teachers on weekdays only if I am in the university campus and only between 9 am and 6 pm 12

Example of location access control policy: Share exact location with members of family group all the time, in all locations 13

14 Example of location access control policy: Do not share my location if user is at any of the sensitive locations

15 Example of activity access control policy: Do not share my activity status with teachers on weekends

16 Example of activity access control policy: Do not share my location if user is at any of the sensitive locations

17 Example of Accountability Policy: Checks the compliance of location request with user's policy

 User shares her protected resources and defines the privacy preferences  System follows pull mechanism. All the different types of information sharing activities among participants are established by the privacy control module in the system.  Whenever any participant makes a query, it is sent to the privacy control module which in turn processes the query by reasoning over the policy networks associated with the resource, and returns the valid answer to the query.  Generalization is applied for the valid answers. 18

 Client device is location aware device like GPS enabled phones or wi-fi enabled laptops  Google maps to plot user and her friends  User interface to define privacy preferences  Connects with Facebook accounts to fetch profile information and find networks of friends  Creates and stores policy ontology in persistent memory and reloads when required by reasoning engine 19

Privacy Configuration User Interface 20

Summary of features of our system and their comparison with the state of the art systems 21

22

 Problem: A system whose access policy is known is more vulnerable to attacks and insider threat Attackers may infer likely policies from access observations, partial knowledge of subject attributes, and background knowledge  Objective: Strengthen policies against discovery  Approach: Explore techniques to propose policy theories via machine learning, including ILP and SVMs  Results: promising initial results for simple Role Based Access Control policies

24

 Practically everyone’s plans are to move to Cloud based systems  Everyone thinks about security for clouds, but almost no one is doing it.  A lot of it is technology, but a lot is management as well  Much of the technology work is focused on isolation at the hypervisor level, but this is not enough  Policies driven security can be of great help in both the technological and management planes

 Most existing work focuses on Isolation for Virtualization  You don’t always want to isolate, sometimes it is good (i.e. efficient) to share  Trusting the virtualized service provider on the cloud  Amazon disclaims any data loss, Facebook wants to own your data …  Constrain what the cloud can do  Don’t replicate outside of US jurisdiction, don’t co-locate with a job run by my competitor, …

 Use computational policies to  Leverage Hypervisor level isolation functions to provide granular isolation  Allow users to specify what kind of security they need at the virtualization level ▪ Sharing and isolation requirements  Allow users to describe how their data is shared/used  Allow clouds to specify what security / Isolation they offer

Goal: self configuring network routers running in a coalition envi- ronment demonstrating constraints on border gateway protocol

29

 An event-based model allows components to share context  Shared semantic models for descriptions, communication and policies  Initial prototype uses Apache Axis2 SOA Framework  Adding a shared Blackbook based component for situation awareness, policy reasoning and enhanced agent-based protocols for advertising, neg- otiation and argumentation service calls & interactions discoveryreleaseuse Blackbook policy reasoner DL reasoner back- ground knowledg eand LOD triple store context and situ- ation awareness Blackbook

Identify functional and technical specifications Determine domain, data type and it’s acceptable quality levels “Request for Service” SERVICE CLOUD CONSUMER Service Discovery Engine List of service providers with advertised service, service levels and cost Service Certification Quality of Service (QoS) contracts between primary service providers and dependent services Service Level Agreement (SLA) between consumer and primary service provider Service composed Dependant services Service packaged, delivered – one time or periodically as needed Service payment Service consumed Service Monitoring

Class Contract Class: Service Level Agreement  SLA Name  Description  SLA Metrics  Penalty Class Contract Negotiation Class : Quality of Service (QOS)  QOS Name  Description  QOS Metrics  Penalty is part of results in Class Dependent Service Sub- Contract Class Service Contract subClass of Class Provider Negotiation Class Consumer Negotiation subClass of results in is part of Class : Provider List  Provider  Service details  Service availability  Service Cost Is used in Class : Request for Service  Service Domain  Exp_Svc_Begin_Date  Exp_Svc_End_Date  RFS_Respond_by_dt  Cost_constraint Is used in