Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.

Slides:



Advertisements
Similar presentations
Cyber-Identity, Authority and Trust in an Uncertain World
Advertisements

Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Cyber-Identity, Authority and Trust in an Uncertain World
Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
Attribute Mutability in Usage Control July 26, 2004, IFIP WG11.3 Jaehong Park, University of Maryland University College Xinwen Zhang, George Mason University.
INFS 767 Fall 2003 The RBAC96 Model Prof. Ravi Sandhu George Mason University.
1 Safety Analysis of Usage Control (UCON) Authorization Model Xinwen Zhang, Ravi Sandhu, and Francesco Parisi-Presicce George Mason University AsiaCCS.
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Usage Control: UCON Ravi Sandhu. © Ravi Sandhu2 Problem Statement Traditional access control models are not adequate for todays distributed, network-
Logical Model and Specification of Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University.
Usage Control: A Vision for Next Generation Access Control Oct 14, 2003 Ravi Sandhu and Jaehong Park ( Laboratory for Information Security.
A Logic Specification for Usage Control Xinwen Zhang, Jaehong Park Francesco Parisi-Presicce, Ravi Sandhu George Mason University SACMAT 2004.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Smart Certificates: Extending X.509 for Secure Attribute Service on the Web October 1999 Joon S. Park, Ph.D. Center for Computer High Assurance Systems.
© 2006 Open Grid Forum OGF19 Federated Identity Rule-based data management Wed 11:00 AM Mountain Laurel Thurs 11:00 AM Bellflower.
The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Access Control Methodologies
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Digital Asset Protection in Personal Private Networks Imad Abbadi Information Security Group Royal Holloway, University of London
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Chapter 10: Authentication Guide to Computer Network Security.
UCON M ODEL Huỳnh Châu Duy. OUTLINE UCON MODEL What? What for? When? Why? CORE MODELS 16 basic models Example COMPARISON Traditional access.
Database  A database is an organized collection of data for one or more purposes, usually in digital form. The data are typically organized to model.
Mairéad Martin The University of Tennessee September 13, 2015 Federated Digital Rights Management.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Issues Relevant To Distributed Security CSC 8320 Nidhi Gahlot.
Privacy Communication Privacy Confidentiality Access Policies Systems Crypto Enforced Computing on Encrypted Data Searching and Reporting Fully Homomorphic.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Active Directory Overview n Course: Operating System n Professor: Mort Anvari n Student: Lina Si n Date: 09/07/02.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
On Requirements for Mobile Commerce By Aj.Pongthep Termsnguanwong.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies June 2011.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
1 Usage Control (UCON) or ABAC on Steroids Prof. Ravi Sandhu Executive Director and Endowed Chair February 26, 2016
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
Authentication and Authorisation for Research and Collaboration Taipei - Taiwan Mechanisms of Interfederation 13th March 2016 Alessandra.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Information Security, Theory and Practice.
draft-fitzgeraldmckay-sacm-endpointcompliance-00
Security in ebXML Messaging
Maryna Komarova (ENST)
IS4680 Security Auditing for Compliance
Security and Privacy in the Age of the Internet of Things:
Federated Digital Rights Management
OM-AM and RBAC Ravi Sandhu*
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
PKI (Public Key Infrastructure)
Assured Information Sharing
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Presentation transcript:

Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security Technology (LIST) George Mason University

2 Problem Statement Need for persistent protection of digital information even after dissemination Recent interest is driven by digital rights management (DRM). Access control and trust management have significant relevance to this problem. Develop a conceptual framework called Usage Control (UCON) for this problem that unifies Traditional Access Control, Trust Management and DRM

3 Related Research Traditional Access Control to protect computer/information resources by limiting known users actions or operations within a closed system. Trust Management deals with authorization process in distributed systems environment for the access of unknown users Digital Rights Management mainly focus on intellectual property rights protection

4 UCON Coverage Protection Objectives Confidential information protection IPR protection Privacy protection Protection Architectures Server-side reference monitor Client-side reference monitor

5 Control Domain Control domain is an area of coverage where rights and usage of rights on digital objects are controlled. Control Domain usually facilitates a kind of reference monitors; Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) Server is who provides a digital object and client is who receives/uses the digital object.

6 Control Domain w/ Server-side Reference Monitor (SRM) Control domain w/ SRM facilitates a central means to control subjects usage on objects of the domain on behalf of a provider subject. Subject can be either within same network /organization area or outside the area Digital information can be stored either centrally or locally. If DO can be saved at client side non- volatile storage, it means the changes on the saved DO doesnt have to be controlled (only server-side DO is valid) and freely allowed (bank statements). To be centrally controlled, DO always has to be stored at server-side storage. Access control and trust management belong here. O SRM S S Control domain A Server System

7 Control Domain w/ Client-side Reference Monitor (CRM) No central control authority (SRM) exists. Client-side Reference Monitor (CRM) is to verify access on behalf of provider subject (ex., author, dept, company, publisher, re-distributor) The control mechanism is likely to be a distributed one. Disseminated digital information can be stored either centrally or locally. If a object is saved at local non-volatile storage, the changes on the object can be controlled (blocked or allowed) DRM belongs here. O CRM S S Control domain A Client System CRM O

8 UCON Model Components

9 Subjects and Objects Subjects Subjects are entities associated with attributes, and hold and exercise certain rights on objects Attributes: identity, role, credit, membership, security level, etc. Subjects : user, process Consumer, Provider, Identifiee subjects Identifiee subjects: identified subjects in digital objects that include their privacy-sensitive information. (patients in health care system). Objects Objects are entities that subjects hold usage rights on. associated with attributes, either by themselves or together with rights. Privacy non-sensitive vs. privacy sensitive objects Original vs. derivative objects A derivative object is created in consequence of obtaining or exercising rights on an original object. (usage log, payment information, etc.)

10 Rights A subjects privilege on an object Delegation of rights is not covered here Rights R = {V, M} V: view, M: modification Control C = {0, 1, } 0 : Closed to public, 1 : Open to public, : selective (controlled) 0 < < 1 : openness of control V = {v| v C}, M = {m| m C} C mv = {(m,v)| m M, v V, m <= v, (1,1) (m,v), (0,0) (m,v)} C mv = {(0, 1), (0, ), (, 1), (, )} MV

11 Rights (cont.) (controlled) is most complicated to implement and 1 (open) will be easiest one. C 01 : sample e-book C 0 : e-book/MP3 distribution, digital library for member only C 1 : member-participated website C : patients information (only authorized doctors can see or update certain patients data) C 01 C 0 C 1 C

12 Authorization Rules, Conditions, and Obligations Authorization Rules a set of requirements that should be satisfied before allowing access to or use of digital objects Rights-related Authorization Rule (RAR) Obligation-related Authorization Rule (OAR) Conditions A set of decision factors that the system should verify at authorization process along with authorization rules before allowing usage of rights on a digital object Dynamic condition (stateful) Static condition (stateless) Obligations A list of mandatory requirements that a subject has to do to obtain or exercise rights on an object.

13 Authorizations in UCON A0: Traditional Authorizations (traditional access control, trust management, etc.) belongs here. A1: This provides finer-grained authorization. A2: This can provide better enforcement on exercising usage rights for both provider and consumer sides. A3: DRMs authorization can be here. A0: w/ authorization (RAR) A1: w/ condition A2: w/ obligation A3: w/ cond + obligation

14 A0: w/ Rights-related Authorization Rule Subjects (S), objects (O) and objects with rights (O + R) can be associated with certain attributes (At). In UCON A0, authorization process can be done in three ways based on the kinds of attributes used in authorization rules (AR). Case 1: R(S,O) = AR(At(S), At(O)) Case 2: R(S,O) = AR(At(S), At(O + R)) Case 3: R(S,O) = AR(At(S), At(O + R)) + AR(At(S), At(O)) R(S,O) means a set of authorized rights for S on O.

15 MAC, DAC, RBAC, DRM in A0 MAC policies in UCON Authorization R(S,O) = SecurityProperty(securityLevel(S), securityLevel(O)) DAC policies in UCON authorization R(S,O) = ACL/Capabilities(ID/groupID(S), ID/groupID(O)) RBAC in UCON authorization R(S,O) = Constraints(Role(S), Role(O + R)) R(S,O) = Constraints(Role(S), Role(Class(O) + R)) R(S,O) = Constraints(Role(S), Role(O + R)) + Constraints(ID/groupID(S), ID/groupID(O)) DRM authorization in UCON R(S,O) = creditCompare(Credit(S), Credit(O + R))

16 A1 Examples (w/ Conditions) Conditions are used to restrict a location of usage, time period, frequency, etc. In military system, officers can print certain documents to only on-site printer and during office hours. In digital library system, members can download certain e-books but they are allowed to read the books only on a machine with pre-defined cpu-id. In VOD service, children are allowed to watch one movie per day during daytime only.

17 A2 Examples (w/ Obligations) Obligations are what has to be fulfilled for authorizations. In digital library system, users may have to read (click) license agreement or non-disclosure agreements before exercising usage rights. Users may have to provide usage log information after exercising usage rights. Anyone can download free e-books but he has to provide his personal information (by filling out a form).

18 A3 Examples (w/ Conditions & Obligations) A consolidated model Certain information can be read during office hour and usage log has to be reported. Conditions can be applied for either obligations or authorizations. In military, officers are allowed to read certain documents only on-site, but if its not office hour, they have to provide usage log information or fill out a access approval code. In digital library, anyone can download free e-books, but if its not on-site they have to pay $2 per download.

19 Three sides of UCON Model

20 Reverse UCON Exercising usage rights on a digital object may create another digital information object (derivative object) that also needs controls for the access to and usage on it (payment info, usage log). The usage control on this derivative object is reverse in its control direction (provider and consumer subjects are changed) and called reverse UCON and the rights called reverse rights. Furthermore, exercising reverse rights on this derivative object may also creates another derivative object and reverse rights on it. Controls and protections on rights and usage of rights on these derivative objects have been hardly recognized/discussed in literature. This is where privacy issues are raised. Adequate controls on derivative objects are required for better privacy treatment. UCON models include both ordinary and reverse UCON Example: MP3 distribution

21 Reverse UCON Example

22 Conclusions and Future works UCON is a a generalized and unified framework that enables controlling usage of digital information for confidential information protection, intellectual property rights protection, and privacy protection in a systematic manner. UCON enables finer-grained controls on usage of digital information even after digital information is disseminated regardless of system (computer or network) environments. The details of the model have to be developed. Delegation and administration issues have to be studied.