1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Cyber-Identity, Authority and Trust in an Uncertain World
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: What You Need to Know Prof. Ravi Sandhu Executive Director and Chief Scientist Institute for Cyber Security.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
1 PANEL Solving the Access Control Puzzle: Finding the Pieces and Putting Them Together Ravi Sandhu Executive Director Endowed Professor June 2010
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director February © Ravi Sandhu.
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Institute for Cyber Security
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
ACCESS CONTROL: THE NEGLECTED FRONTIER Ravi Sandhu George Mason University.
THE ORANGE BOOK Ravi Sandhu ORANGE BOOK CLASSES A1Verified Design B3Security Domains B2Structured Protection B1Labeled Security Protection.
1 Laws of Cyber Security Ravi Sandhu Executive Director and Endowed Professor September 2010
1 New Trends and Challenges in Computer Network Security Ravi Sandhu Executive Director and Endowed Professor September 2010
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
Trusted Computing in Government Networks May 16, 2007 Richard C. (Dick) Schaeffer, Jr. Information Assurance Director National Security Agency.
Cyber Defence Data Exchange and Collaboration Infrastructure (CDXI)
1 Cyber Security Research: A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 18, 2013
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Chapter 1  Introduction 1 Chapter 1: Introduction.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
Trusted Hardware: Can it be Trustworthy? Design Automation Conference 5 June 2007 Karl Levitt National Science Foundation Cynthia E. Irvine Naval Postgraduate.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
SEC835 Database and Web application security Information Security Architecture.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 Challenges of Cyber Security Education at the Graduate Level Ravi Sandhu Executive Director and Endowed Professor Nov. 9, 2012
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Cyber Security A Personal Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair January 15, 2016
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Past, Present and Future
Security and Privacy in the Networked World
Introduction to Cyber Security
Introduction and Basic Concepts
Cyber Security Research: Applied and Basic Combined*
Challenge-Response Authentication
IS4680 Security Auditing for Compliance
THE ORANGE BOOK Ravi Sandhu
UTSA Cyber Security Ecosystem
Big Data and Privacy Panel Prof. Ravi Sandhu
Cyber Security Trends and Challenges
World-Leading Research with Real-World Impact!
Application-Centric Security
Institute for Cyber Security
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
World-Leading Research with Real-World Impact!
Access Control Evolution and Prospects
Presentation transcript:

1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

Cyber security is all about trade-offs confidentiality integrity availablity usage privacy cost usability productivity Application context is necessary for trade- offs © Ravi Sandhu 2 World-Leading Research with Real-World Impact! Fundamental Premise

The ATM (Automatic Teller Machine) paradox Lessons from the Orange Book era Data security and privacy Application security The DASPY system challenge DASPY research thrusts © Ravi Sandhu 3 World-Leading Research with Real-World Impact! Outline

The ATM system is secure enough global in scope Not attainable via current cyber security science, engineering, doctrine not studied as a success story Similar paradoxes apply to on-line banking e-commerce payments © Ravi Sandhu 4 World-Leading Research with Real-World Impact! The ATM Paradox

Monetary loss is easier to quantify and compensate than information loss Security principles stop loss mechanisms audit trail (including physical video) retail loss tolerance with recourse wholesale loss avoidance Technical surprises no asymmetric cryptography no annonymity © Ravi Sandhu 5 World-Leading Research with Real-World Impact! Why is the ATM System Secure?

Monetary loss is easier to quantify and compensate than information loss Security principles stop loss mechanisms audit trail (including physical video) retail loss tolerance with recourse wholesale loss avoidance Technical surprises no asymmetric cryptography no annonymity © Ravi Sandhu 6 World-Leading Research with Real-World Impact! Why is the ATM System Secure? Application Centric

Our Basic Premise Security is fundamentally about tradeoffs There can be no security (no tradeoffs) without application context Orange Book/Rainbow Series ( ) Security is all about high assurance Application context makes high assurance security impossible to achieve © Ravi Sandhu 7 World-Leading Research with Real-World Impact! Lessons from the Orange Book Era

34 titles listed in Wikipedia as the most significant Rainbow series books Only 1 addresses applications Trusted Database Interpretation (TDI) Scope: Trusted Applications in general and database management system in particular © Ravi Sandhu 8 World-Leading Research with Real-World Impact! Rainbow Series

Software ArchitectProject% TimeLabel AliceWin725%U AliceSecureWin775%S BobVista100%U The Polyinstantiation Debate Much work and $$$ by researchers and vendors, late 80s-early 90s What precisely is Secret? There exists a SecureVista project Alice works on SecureVista Alices effort on SecureVista is 75% All or some of the above How do we maintain integrity of the database? Depends

Familiar term used for over 3 decades Fundamental problems identified in the first decade continue to dominate covert channels inference and aggregation homomorphic encryption The general understanding of the term data security and privacy is probably not significantly changed since these early days, although of course in the details and nuances there have been considerable advances. © Ravi Sandhu 10 World-Leading Research with Real-World Impact! Data Security and Privacy

Has come into use relatively recently Remains amorphous The How interpretation: (currently prevalent in industry) scanning for software vulnerabilities such as buffer overflow run time application firewalls to prevent/detect application layer attacks The What interpretation: (the bigger challenge) security policy and trade-offs in existing applications such as on-line banking: relatively straightforward and relatively well understood security policy and trade-offs in newer applications such as social networks, secure information sharing, smart grid, secure data provenance, location-based services, electronic helath records: much fuzzier, less familiar and a major challenge to understand © Ravi Sandhu 11 World-Leading Research with Real-World Impact! Application Security

Wisdom from the past: Generally, security is a system problem. That is, it is rare to find that a single security mechanism or procedure is used in isolation. Instead, several different elements working together usually compose a security system to protect something. R. Gaines and N. Shapiro The DASPY system challenge is how to develop a systems perspective on DASPY © Ravi Sandhu 12 World-Leading Research with Real-World Impact! The DASPY System Challenge

13 The DASPY System Challenge Security and system goals (objectives/policy) Policy models Enforcement models Implementation models Necessarily informal Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting. Security analysis (objectives, properties, etc.). Approximated policy realized using system architecture with trusted servers, protocols, etc. Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.). Technologies such as Cloud Computing, Trusted Computing, etc. Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.) Software and Hardware Concrete System © Ravi Sandhu World-Leading Research with Real-World Impact! PEIMODELSPEIMODELS

Continue to pursue point solutions for various problems in data security and privacy. Continue to pursue solutions on the how aspect of application security. Embark on research to understand the what elements of application security. There are some excellent examples already but this thrust needs further and explicit encouragement. Embark on research to address the DASPY system challenge. Today this is largely ignored. © Ravi Sandhu 14 World-Leading Research with Real-World Impact! DASPY Research Thrusts

The ATM (Automatic Teller Machine) paradox Lessons from the Orange Book era Data security and privacy Application security The DASPY system challenge DASPY research thrusts © Ravi Sandhu 15 World-Leading Research with Real-World Impact! Summary