1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.

Slides:



Advertisements
Similar presentations
Provenance-Aware Storage Systems Margo Seltzer April 29, 2005.
Advertisements

Efficient Kerberized Multicast Olga Kornievskaia University of Michigan Giovanni Di Crescenzo Telcordia Technologies.
Decentralized User Authentication in a Global File System Max Meisterhans - Seminar in Distributed Computing WS 05/06.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
Lakshmi Narayana Gupta Kollepara 10/26/2009 CSC-8320.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
1 WebdamExchange and WebdamLog: some models for web data management Emilien Antoine, Meghyn Bienvenu, Alban Galland Webdam WS, 04/03/2011.
CSE331: Introduction to Networks and Security Lecture 28 Fall 2002.
MS DB Proposal Scott Canaan B. Thomas Golisano College of Computing & Information Sciences.
Cryptography In Censorship Resistant Web Publishing Systems By Hema Hariharan Swati B Shah.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Privacy and Integrity Preserving in Distributed Systems Presented for Ph.D. Qualifying Examination Fei Chen Michigan State University August 25 th, 2009.
More on AuthenticationCS-4513 D-term More on Authentication CS-4513 Distributed Computing Systems (Slides include materials from Operating System.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
PRIAM: PRivate Information Access Management on Outsourced Storage Service Providers Mark Shaneck Karthikeyan Mahadevan Jeff Yongdae Kim.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Understanding Active Directory
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
ADVANCED MICROSOFT ACTIVE DIRECTORY CONCEPTS
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Construction of efficient PDP scheme for Distributed Cloud Storage. By Manognya Reddy Kondam.
Selective and Authentic Third-Party distribution of XML Documents - Yashaswini Harsha Kumar - Netaji Mandava (Oct 16 th 2006)
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
Module Title? DBMS Introduction to Database Management System.
1 Distributed Monitoring of Peer-to-Peer Systems By Serge Abiteboul, Bogdan Marinoiu Docflow meeting, Bordeaux.
1 Introduction An organization's survival relies on decisions made by management An organization's survival relies on decisions made by management To make.
Dr. Bhavani Thuraisingham October 2006 Trustworthy Semantic Webs Lecture #16: Web Services and Security.
RELATIONAL FAULT TOLERANT INTERFACE TO HETEROGENEOUS DISTRIBUTED DATABASES Prof. Osama Abulnaja Afraa Khalifah
The Data Ring: Community Content Sharing Serge Abiteboul (INRIA) Alkis Polyzotis (UC Santa Cruz)
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Cryptography and Network Security (CS435) Part One (Introduction)
Database Systems DBMS Environment Data Abstraction.
Lightweight Consistency Enforcement Schemes for Distributed Proofs with Hidden Subtrees Adam J. Lee, Kazuhiro Minami, and Marianne Winslett University.
Presented by: Sanketh Beerabbi University of Central Florida.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
Enhancing Security and Privacy in Online Social Networks Sonia Jahid University of Illinois at Urbana-Champaign PhD Forum.
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
Trust calculus for PKI Roman Novotný, Milan Vereščák.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Assoc. Prof. Dr. Ahmet Turan ÖZCERİT.  The concept of Data, Information and Knowledge  The fundamental terms:  Database and database system  Database.
Introduction to Active Directory
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
1 Authorization Sec PAL: A Decentralized Authorization Language.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
A formal study of collaborative access control in distributed datalog Serge Abiteboul – Inria & ENS Cachan Pierre Bourhis CNRS & Lille Univ. & Inria Victor.
OceanStore : An Architecture for Global-Scale Persistent Storage Jaewoo Kim, Youngho Yi, Minsik Cho.
Database and Cloud Security
CS4222 Principles of Database System
An Introduction to database system
Building Trustworthy Semantic Webs
pVault Sharing Architecture
Chapter 8 Working with Databases and MySQL
Database Systems Instructor Name: Lecture-3.
Building Trustworthy Semantic Webs
An Architecture for Secure Wide-Area Service Discovery
Presentation transcript:

1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland and a bunch of different people Webdam, INRIA Saclay-Ile-de-France

2 Alban Galland, Security on Social Networks, 01/12/2009 Summary Introduction General definitions Goal Related works Distributed Knowledge Base with Privacy Basic notions and model Systems properties Extensions Declarative Expression of Privacy Demonstration Conclusion

3 Alban Galland, Security on Social Networks, 01/12/2009 Our definition of Social Network Social Network: a (web) application where users store and consult data and interact with data of other users following explicit relationships Some important notions Users : people Data : graph of XML documents, AXML Data-management : storage, replication, query Relationship

4 Alban Galland, Security on Social Networks, 01/12/2009 Our definition of Privacy Privacy: the fact that a user keeps control over her data and activity Some important notions Read and write permissions Delegation of permissions No focus on anonymity Anonymity of requests Anonymity of aggregated data

5 Alban Galland, Security on Social Networks, 01/12/2009 Goal Define and implement the basis for a distributed social network that guarantees access control More precisely Distributed knowledge base with access control Declarative high level access control specification

6 Alban Galland, Security on Social Networks, 01/12/2009 Related works Social network Some typically centralized SN systems with limited access control management Some SN-specific applications [2,4] Some works on knowledge mining in SN Distribution Distributed Hash Table and indexing (KadoP) Friend based P2P Privacy Access control and logic [1,5] Cryptography [3]

7 Alban Galland, Security on Social Networks, 01/12/2009 Distributed Knowledge Base with Privacy Basic notions and model Systems properties Extensions

8 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model Principal User, group, machine: something which could be authenticated may make statement about her data and meta-data may be a peer, having computational resources, storage, availability Documents Identified by their owner id and a local id Basically, (xml) trees with references to others documents Alice states

9 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model Access rights Rights: read, write, own Access control list Alice states Bob  Keys Cryptographic secrets Alice states

10 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model External knowledge Generated by communication Alice says Alice states to Bob Well-formed communication trace: C says (B says (A says (A states …) to B) to C) to D Keep trace of provenance Encryption Alice says (Alice states (T encrypted for Bob as owner) to Cedric

11 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model Instructions CreatePrinc, CreateDoc Write Grant, Revoke Say Get Bob -> write(news, rockclimbing, T)

12 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model Factification: Transformation of an instruction in a statement Bob says Bob -> write(news,rockclimbing,T) to Alice Alice states requested by Bob Authentication and time Alice owner’s key Rockclimbing writer’s key Alice keeps proof of the request Local time of Alice

13 Alban Galland, Security on Social Networks, 01/12/2009 Basic notions and model Collections Flat document of references to other documents New statements, rights and instructions : append, remove Alice states += Same get instruction as any other document Interesting example: index, mailbox, local files directory…

14 Alban Galland, Security on Social Networks, 01/12/2009 Systems properties System Peers and protocol applied by peers. Well-formed All the data is on the form of statements or well-formed communication chains References to documents always correspond to a document (eventually empty) References to principal always correspond to a principal

15 Alban Galland, Security on Social Networks, 01/12/2009 Systems properties Soundness Access to document, access rights and keys (read and write) is correct according to access control defined by access rights Safety-Property A system is safe if a (correct) peer send data in clear to people it has verified proof of access right or send data encrypted with the correct key else. Meta-theorem A system which verify safety-property is sound

16 Alban Galland, Security on Social Networks, 01/12/2009 Systems properties Completeness A principal is aware of any document she could access A principal is always sure that she get the last version of a data A principal is always sure to get all the append and remove statements of a collection Could be relaxed to probabilistic notions

17 Alban Galland, Security on Social Networks, 01/12/2009 Systems description One can consider different systems We focus on 4 of them, as proof of data on trusted owner data on untrusted data on untrusted

18 Alban Galland, Security on Social Networks, Bob -> say (Bob -> to Alice Alice -> say (Alice states to Bob Signed Instructions Results Ownership Interesting particular case: facebook

19 Alban Galland, Security on Social Networks, Signed Instructions Encrypted Results Alice -> say (Alice states encrypted for rockclimbing as reader)) to host Bob -> say (Bob -> to host host -> say (Alice says (Alice states encrypted for rockclimbing as reader))) to Bob Signed Statements

20 Alban Galland, Security on Social Networks, Signed Instructions Encrypted Results Encrypted statements Use time-stamp and redundancy to avoid update denial of documents Use co-signatures of hosts to avoid update denial of collections

21 Alban Galland, Security on Social Networks, Signed Instructions Results Statements

22 Alban Galland, Security on Social Networks, 01/12/2009 Extensions Structured queries Full-text search Problem of awareness is even stronger there Index Balance between leak of information and efficiency of queries May need more meta-data, like an encryption schema Could be managed as regular update thanks to collections

23 Alban Galland, Security on Social Networks, 01/12/2009 Extensions Services AXML service calls Need specials access rights for executing and mounting services Services may have special access rights to data, depending of the context (cf. applications in Facebook) Services could be used to support global knowledge, or complex higher level policies.

24 Alban Galland, Security on Social Networks, 01/12/2009 Declarative Expression of Privacy Example People who are tagged on one of my photos can see this photo People who are friends of two of my friends can read my Wall People who are best friends of mine can write on my Wall Problems Uncontrolled deduction Fix-point semantic

25 Alban Galland, Security on Social Networks, 01/12/2009 Demonstration Some functionalities already implemented during Marilena Oita internship A user interface and global logic Some part of Distributed Knowledge Base with Privacy Declarative Privacy is missing

26 Alban Galland, Security on Social Networks, 01/12/2009 Demonstration

27 Alban Galland, Security on Social Networks, 01/12/2009 Conclusion This is work in progress We are currently focusing on distributed knowledge base with access control, but there is links with other domains: data integration, reasoning about knowledge, social data- mining… Hidden behind trendy Social Networks, we believe there are real topics of research, in particular in distributed systems

28 Alban Galland, Security on Social Networks, 01/12/2009 References [1] Abadi et al, Logic in Access Control, FOSAD 2009 [2] Buchegger et al, PeerSon, P2P social networking – early experiences and insights, SNS 2009 [3] Canetti et al, Multicast security: A taxonomy and some efficient constructions, INFOCOM 1999 [4] Jawad et al, Protecting Data Privacy in structured P2P Networks, DMGP2PS 2009 [5] Mazieres et al, Separating key management from file system security, SIGOPS 1999