Secure Dependable Stream Data Management Vana Kalogeraki (UC Riverside) Dimitrios Gunopulos (UC Riverside) Ravi Sandhu (UT San Antonio) Bhavani Thuraisingham.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
An approach to Intelligent Information Fusion in Sensor Saturated Urban Environments Charalampos Doulaverakis Centre for Research and Technology Hellas.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
Chapter 6: Foundations of Business Intelligence - Databases and Information Management Dr. Andrew P. Ciganek, Ph.D.
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Introduction to Biometrics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #2 Information Security August 24, 2005.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Security for Distributed Data Management.
Lecturer : Assoc. Prof. Dang Tran Khah Presenter: Tran Thach Lam 1.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #17 Data Warehousing, Data.
Data Security and Integrity Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas June 2009.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #12 Secure Object Systems.
VIEWS b.ppt-1 Managing Intelligent Decision Support Networks in Biosurveillance PHIN 2008, Session G1, August 27, 2008 Mohammad Hashemian, MS, Zaruhi.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Dependable Data Management April.
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Information and Security Analytics
Securing Home IoT Environments with Attribute-Based Access Control
Data and Applications Security Developments and Directions
A GUI Based Aid for Generation of Code-Frameworks of TMOs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Access Control in Data Management Systems
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security Developments and Directions
Data and Applications Security
Presentation transcript:

Secure Dependable Stream Data Management Vana Kalogeraki (UC Riverside) Dimitrios Gunopulos (UC Riverside) Ravi Sandhu (UT San Antonio) Bhavani Thuraisingham (UT Dallas) May 2008

Outline l Dependable Information Management - Integrating Real-time and Security Policies l Secure Real-Time TMO - Apply RBAC and UCON models l Stream Data/Information Management - Overview, Data Manager, Security Policy, Directions l QoS-based Stream Execution Model

Dependable Sensor Information Management l Dependable sensor information management includes - secure sensor information management - fault tolerant sensor information - High integrity and high assurance computing - Real-time computing l Conflicts between different features - Security, Integrity, Fault Tolerance, Real-time Processing - E.g., A process may miss real-time deadlines when access control checks are made - Trade-offs between real-time processing and security - Need flexible security policies; real-time processing may be critical during a mission while security may be critical during non-operational times

Secure Dependable Information Management Example: Next Generation AWACS Technology provided by the project Hardware Display Processor & Refresh Channels Consoles (14) Navigation Sensors Data Links Data Analysis Programming Group (DAPG) Future App Future App Future App Multi-Sensor Tracks Sensor Detections MSI App Data Mgmt. Data Xchg. Infrastructure Services Security being considered after the system has been designed and prototypes implemented Challenge: Integrating real-time processing, security and fault tolerance Real-time Operating System

Secure Dependable Information Management: Directions l Challenge: How does a system ensure integrity, security, fault tolerant processing, and still meet timing constraints? l Develop flexible security policies; when is it more important to ensure real-time processing and ensure security? l Secure dependable models and architectures for the policies; Examine real-time algorithms – e.g., query and transaction processing l Research for databases as well as for applications; what assumptions do we need to make about operating systems, networks and middleware? l Developing dependable sensor objects

RBAC (Sandhu et al) and ABAC (Network Centric Enterprise Services) l RBAC - Access to information sources including structured and unstructured data both within the organization and external to the organization - Access based on roles - Hierarchy of roles: handling conflicts - Controlled dissemination and sharing of the data l ABAC (Attribute based access control) - User presents credentials - Depending on the user credentials user is granted access - Suitable for open web environments

UCON (Sandhu et al) l RBAC model is incorporated into UCON and useful for various applications - Authorization component l Obligations - Obligations are actions required to be performed before an access is permitted - Obligations can be used to determine whether an expensive knowledge search is required l Attribute Mutability - Used to control the scope of the knowledge search l Condition - Can be used for resource usage policies to be relaxed or tightened

UCON (Sandhu et al))

TMO (Kane Kim et al) l TMO model A TMO object ODSS 1 ODSS 2 Object Data Store (ODS) SpM1 Deadlines AA C SpM2 AA C SvM1 Concurrency Control SvM2 AAC: Autonomous Activation Condition Service Request Queue Remote TMO Clients Lock/Condition/CREW for Concurrent Access Time-triggered(TT) Spontaneous Methods(SpMs) Message-triggered(MT) Service Methods(SvMs) EAC Capability for accessing other TMOs and network environment including logical multicast channels and I/O devices

l Access Control mechanisms - Role Based Access Control (RBAC) model l Users (TMO objects) are associated with roles l Roles are associated with permissions (Write, Read, Execution, All) l A user has permission only if the user has an authorized role which is associated with that permission - Inadequate for distributed real-time system l Server side centralized model l Need constraints on temporal behaviors of spontaneous methods in TMO RT-RBAC (Jungin Kim and Thuraisingham)

RT-UCON (Jungin Kim and Thuraisingham) l Basic authorization components for access control in TMO Continuity: dynamic and seamless constraints Mutability: control the scope of access Conditions: control the amount of access, access time Obligations: pre-conditions for determining access decisions l Adequate for distributed real-time system Space and Time domain; Server and Client side control; Dynamic and Flexible l Implemented access control through a separated object l Checks access right, maintain access policies in the system ODS: stores static and dynamic access policies SpM: controls access policies in ODS SvM: handles access decision requests

Secure CAMIN (Jungin Kim and Thuraisingham) l Mission: Defend target objects both in the sea and on the land from the hostile objects in the sky l Access control checks policies and security levels l Some malicious objects are added

Secure Sensor/Stream Information Management l Sensor network consists of a collection of autonomous and interconnected sensors that continuously sense and store information about some local phenomena - May be employed in battle fields, seismic zones, pavements l Data streams emanate from sensors; for geospatial applications these data streams could contain continuous data of maps, images, etc. Data has to be fused and aggregated l Continuous queries are posed, responses analyzed possibly in real- time, some streams discarded while rest may be stored l Recent developments in sensor information management include sensor database systems, sensor data mining, distributed data management, layered architectures for sensor nets, storage methods, data fusion and aggregation l Secure sensor data/information management has received very little attention; need a research agenda

Secure Sensor/Stream Information Management: Data Manager

Policy Specification and Enforcement: Elena Ferrari and Barbara Carminati et al l Example: Aurora Stream Model develop by Stonebraker et al l Model Operators - Filter: Select on streams based on predicates; results is a sequence of streams - Map: Project onto attributes by applying certain functions - Aggregate: Aggregate/fuse streams l Secure Model Operators - Secure Filter: Form of secure selection where access to resulting streams are controlled - Secure Map: Access to resulting attributes are controlled - Secure Aggregation: Access to resulting stream is controlled - Access to original streams are controlled but not to the results

Secure Sensor/Stream Information Management: Inference/Aggregation Control

Secure Sensor/Stream Information Management: Security Policy Integration (MURI Project) Export Engine Component Data System for Agency A Federated Data Management Export Engine Component Data System For Agency C Component Data System for Agency B Export Engine Federated Privacy Controller Privacy Controller Privacy Controller Privacy Controller Export Policy Component Policy for Sensor A Integrated Policy for the Sensor Network Export Policy Component Policy for Sensor C Component Policy for Sensor B Export Policy Generic Policy for A Generic Policy for B Generic Policy for C Additional security constraints for Inference Control Export Engine Component Data System for Agency A Federated Data Management Export Engine Component Data System For Agency C Component Data System for Agency B Export Engine Federated Privacy Controller Privacy Controller Privacy Controller Privacy Controller Export Policy Component Policy for Sensor A Integrated Policy for the Sensor Network Export Policy Component Policy for Sensor C Component Policy for Sensor B Export Policy Generic Policy for A Generic Policy for B Generic Policy for C Additional security constraints for Inference Control

Real-time Knowledge Discovery (RT-KDD) l How does a data mining technique meet the timing constraint? - E.g., if an association rule mining algorithm has a 5 minutes constraint, then should it output as many rules as possible within 5 minutes - How does this affect the accuracy of the results? - Will there be an increase in false positives and negatives? l Approximate data mining - Are there techniques analogous to techniques in approximate query processing - Are incomplete results better than no results l What are the applications for RT-KDD - Give the results to the first responder/law enforcement official in 5 minutes so that he can take appropriate actions l Secure RT-KDD?

Secure Sensor/Stream Information Management: Directions l Individual sensors may be compromised and attacked; need techniques for detecting, managing and recovering from such attacks l Aggregated sensor data may be sensitive; need secure storage sites for aggregated data; variation of the inference and aggregation problem? l Security has to be incorporated into sensor database management - Policies, models, architectures, queries, etc. l Evaluate costs for incorporating security especially when the sensor data has to be fused, aggregated and perhaps mined in real-time l Data may be emanating from sensors and other devices at multiple locations - Data may pertain to individuals (e.g. video information, images, surveillance information, etc.); Data may be mined to extract useful information; Need to maintain privacy

Secure Stream based Execution Model: Integrate Kalogeraki stream model with UCON l QoS based Infrastructure support for hosting stream based applications l Component Discovery - Data summarization and dissemination to propagate components and resource information to the appropriate nodes - Bloom filter data structure based techniques l QoS aware composition - For each application request the user specifies the data source, application graph (describing the application components and their invocations) and real-0time requirements l Apply UCON model as the basis for security - Integrate concepts from RT-UCON with stream based policies l Our approach: Specify security policies and prove that the resulting system is secure