Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.

Slides:



Advertisements
Similar presentations
QUN NI 1, SHOUHUAI XU 2, ELISA BERTINO 1, RAVI SANDHU 2, AND WEILI HAN 3 1 PURDUE UNIVERSITY USA 2 UT SAN ANTONIO USA 3 FUDAN UNIVERSITY CHINA PRESENTED.
Advertisements

Towards A Times-based Usage Control Model Baoxian Zhao 1, Ravi Sandhu 2, Xinwen Zhang 3, and Xiaolin Qin 4 1 George Mason University, Fairfax, VA, USA.
Access Control for Online Social Networks using Relationship Type Patterns Yuan Cheng Department of Computer Science University of Texas at San Antonio.
Access Control & Privacy Preservation in Online Social Networks
A Provenance-based Access Control Model for Dynamic Separation of Duties July 10, 2013 PST 2013 Dang Nguyen, Jaehong Park, and Ravi Sandhu Institute for.
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
UnFriendly: Multi-Party Privacy Risks in Social Networks Kurt Thomas, Chris Grier, David M. Nicol.
CMSC 414 Computer (and Network) Security Lecture 13 Jonathan Katz.
A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Chapter 6 Advanced Data Modelling
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Attribute-Based Access Control Models and Beyond
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
11 World-Leading Research with Real-World Impact! Constraints Specification for Virtual Resource Orchestration in Cloud IaaS Constraints Specification.
Yusuf Simonson Title Suggesting Friends Using the Implicit Social Graph.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Firewall Policy Queries Author: Alex X. Liu, Mohamed G. Gouda Publisher: IEEE Transaction on Parallel and Distributed Systems 2009 Presenter: Chen-Yu Chang.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 The Orphan Problem in ZigBee- based Wireless Sensor Networks IEEE Trans. on Mobile Computing (also in MSWiM 2007) Meng-Shiuan Pan and Yu-Chee Tseng Department.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Security and Privacy in Social Networks Raymond Heatherly Data Security.
Network Measures Social Media Mining. 2 Measures and Metrics 2 Social Media Mining Network Measures Klout.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Recommender Systems. >1,000,000,000 Finding Trusted Information How many cows in Texas?
1 Speaker : 童耀民 MA1G Authors: Ze Li Dept. of Electr. & Comput. Eng., Clemson Univ., Clemson, SC, USA Haiying Shen ; Hailang Wang ; Guoxin.
Mechanism to support establishment of charging policies Group Name: WG2-ARC Source: InterDigital Meeting Date: TP8 Agenda Item:
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider Prateek Basavaraj April 9 th 2014.
Professor OKAMURA Laboratory. Othman Othman M.M. 1.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security.
Topic: P2P Trading in Social Networks: The Value of Staying Connected The purpose of this paper is to propose a P2P incentive paradigm named Networked.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Othman Othman M.M., Koji Okamura Kyushu University 1.
G53SEC 1 Access Control principals, objects and their operations.
1 Attribute-Aware Relationship-Based Access Control for Online Social Networks World-Leading Research with Real-World Impact! Yuan Cheng, Jaehong Park.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
Interpersonal Privacy Nudge for Promoting Privacy Protective Behaviors on Social Network Sites Haiyan Jia & Heng Xu College of Information Sciences and.
Protecting People Location Information September 29, 2002 Urs Hengartner & Peter Steenkiste.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
Computer Science Conformance Checking of Access Control Policies Specified in XACML Vincent C. Hu (National Institute of Standards and Technology) Evan.
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu.
Towards Social User Profiling: Unified and Discriminative Influence Model for Inferring Home Locations Rui Li, Shengjie Wang, Hongbo Deng, Rui Wang, Kevin.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
This multimedia product and its contents are protected under copyright law. The following are prohibited by law: any public performance or display, including.
doc.: IEEE /0611r2 Submission July 2005 Alexander Cheng, C-cation, Inc.Slide 1 Self-organizing and Auto-configuring Mesh Networks Notice: This.
ReBAC in ABAC Tahmina Ahmed Department of Computer Science University of Texas at San Antonio 4/29/ Institute for Cyber Security World-Leading Research.
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
Security and Privacy in Social Networks
Institute for Cyber Security
XACML and the Cloud.
Full Exam Name: Microsoft Dynamics CRM 2016 Online Deployment
Location Recommendation — for Out-of-Town Users in Location-Based Social Network Yina Meng.
DDoS Attack Detection under SDN Context
Self-organizing and Auto-configuring Mesh Networks
Security and Privacy in Social Networks
AAA: A Survey and a Policy- Based Architecture and Framework
Security and Privacy in Social Networks
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio 1 Institute for Cyber Security World-Leading Research with Real-World Impact!

Outline Motivation Model Components Model Use Cases Conclusions 2 World-Leading Research with Real-World Impact!

Relationship-based Access Control Users in Online Social Networks (OSNs) are connected with social relationships (user-to- user relationships) Owner of the resource can control its release based on such relationships between the access requester and the owner 3 World-Leading Research with Real-World Impact!

Sharings in Online Social Networks Online Social Networks provide services to promote information sharing by utilizing user activity information and shared contents Users share information with other users – A user creates information to share with other users. – A user sends information to other users. (e.g., poke, invite) – A user receives information from/about other users. – Information about a user’s sharing activity is shared. Both resource and user as a target of sharing activity – Alice pokes bob 4

Controls in Online Social Networks A user wants to control other users’ access to her own shared information – Only friends can read my post A user wants to control other users’ activities who are related to the user – My children cannot be a friend of my co-workers – My activities should not be notified to my coworkers A user wants to control her outgoing/incoming activities – No accidental access to violent contents – Do not poke me – A user’s activity influences access control decisions – Once Alice sends a friend request to Bob, Bob can see Alice’s profile 5

U2U Relationship-based Access Control (UURAC) Model 6 U A : Accessing User U T : Target User U C : Controlling User R T : Target Resource AUP: Accessing User Policy TUP: Target User Policy TRP: Target Resource Policy SP: System Policy Policy Individualization User and Resource as a Target Separation of user policies for incoming and outgoing actions Regular Expression based path pattern w/ max hopcounts (e.g., ) Policy Individualization User and Resource as a Target Separation of user policies for incoming and outgoing actions Regular Expression based path pattern w/ max hopcounts (e.g., )

Limitation of U2U Relationships We rely on the controlling user and ownership to regulate access to resources in UURAC (U2U Relationship-based AC) Needs more flexible control – Parental control, related user’s control (e.g., tagged user) – User relationships to resources (e.g., U-U-R) – User relationships via resources (e.g., U-R-U) 7 World-Leading Research with Real-World Impact!

Beyond U2U Relationships There are various types of relationships between users and resources in addition to U2U relationships and ownership – e.g., share, like, comment, tag, etc U2U, U2R and R2R U2R further enables relationship and policy administration 8 World-Leading Research with Real-World Impact!

Access Scenarios 9 World-Leading Research with Real-World Impact!

Related Works Access Control Models for OSNs 10 The advantages of URRAC: – Path pattern of different relationship types and hopcount skipping make policy specification more expressive – System-level conflict resolution policy World-Leading Research with Real-World Impact!

Outline Motivation Model Components Model Use Cases Conclusions 11 World-Leading Research with Real-World Impact!

URRAC Model Components 12 AU: Accessing User AS: Accessing Session TU: Target User TS: Target Session O: Object P: Policy P AU : Accessing User Policy P AS : Accessing Session Policy P TU : Target User Policy P TS : Target Session Policy P O : Object Policy P P : Policy for Policy P Sys : System Policy World-Leading Research with Real-World Impact!

Outline Motivation Model Components Model Use Cases Conclusions 13 World-Leading Research with Real-World Impact!

Characteristics of URRAC in OSNs Policy Individualization – Users define their own privacy and activity preferences – Related users can configure policies too – Collectively used by the system for control decision Policy Administration – Policy and Relationship Management – Users specify policies for other users and resources User-session Distinction – A user can have multiple sessions with different sets of privileges – Especially useful in mobile and location-based applications Relationship-based Access Control 14 World-Leading Research with Real-World Impact!

Social Networks Social graph is modeled as a directed labeled simple graph G= – V = U U R, where U is users and R is resources – Edges E as relationships – Σ={σ 1, σ 2, …,σ n, σ 1 -1, σ 2 -1,…, σ n -1 } as relationship types supported 15 World-Leading Research with Real-World Impact!

URRAC Social Graph 16

Action and Access Request ACT = {act 1, act 2,...,act n } is the set of OSN supported actions Access Request – s tries to perform act on T – Target T ⊆ (2 TU ∪ R - Ø) is a non-empty set of users and resources T may contain multiple targets 17 World-Leading Research with Real-World Impact!

Authorization Policy action -1 in TUP, TSP, OP and PP is the passive form since it applies to the recipient of action SP does not differentiate the active and passive forms SP for resource needs o.type to refine the scope of the resource 18 World-Leading Research with Real-World Impact!

Graph Rule Grammar 19 World-Leading Research with Real-World Impact!

Hopcount Skipping Six degrees of separation – Any pair of persons are distanced by about 6 people on average. (4.74 shown by recent study) – Hopcount for U2U relationships is practically small U2R and R2R relationships may form a long sequence – Omit the distance created by resources – Local hopcount stated inside “[[]]” will not be counted in global hopcount. – E.g., “([f*,3][[c*, 2]],3)”, the local hopcount 2 for c* does not apply to the global hopcount 3, thus allowing f* to have up to 3 hops. 20 World-Leading Research with Real-World Impact!

Policy Conflict Resolution System-defined conflict resolution for potential conflicts among user-specified policies Disjunctive, conjunctive and prioritized order between relationship types – ∧, ∨, > represent disjunction, conjunction and precedence is a special relationship “null’’ that denotes “self” 21 World-Leading Research with Real-World Impact!

Policy Conflict Resolution (cont.) 22 World-Leading Research with Real-World Impact!

Access Evaluation Procedure Policy Collecting – To authorize, we need the following policies: s’s session policy about act a collection of act -1 policies from each target in T system policies over act and object type, if target is an object 23 World-Leading Research with Real-World Impact!

Policy Extraction Policy: Graph Rule: start, path rule Path Rule: path spec ∧ | ∨ path spec Path Spec: path, hopcount 24 It determines the starting node, where the evaluation starts If s is start, then every t in T (and u c ) becomes the evaluating node; otherwise, s is the evaluating node. Path-check each path spec using Algorithm 2 in Cheng et al [11] World-Leading Research with Real-World Impact!

Policy Evaluation Evaluate a combined result based on conjunctive or disjunctive connectives between path specs Make a collective result for multiple policies in each policy set. – Policy conflicts may arise. We apply CRP Sys to resolve conflicts. Compose the final result from the result of each policy set (P AS, P TU /P TS /P O /P P, P Sys ) 25 World-Leading Research with Real-World Impact!

Outline Motivation Model Components Model Use Cases Conclusions 26 World-Leading Research with Real-World Impact!

Example View a photo where a friend is tagged. Bob and Ed are friends of Alice, but not friends of each other. Alice posted a photo and tagged Ed on it. Later, Bob sees the activity from his news feed and decides to view the photo: (Bob, read, Photo2) – Bob’s P AS (read): – Photo2’s P O (read -1 ) by Alice: – Photo2’s P O (read -1 ) by Ed: – AP Sys (read): – CRP Sys (read): 27 World-Leading Research with Real-World Impact! In conflicts

Example (cont.) Parental control of policies. The system features parental control such as allowing parents to configure their children’s policies. The policies are used to control the incoming or outgoing activities of children, but are subject to the parents’ will. For instance, Bob’s mother Carol requests to set some policy, say Policy1 for Bob: (Carol, specify policy, Policy1) – Carol’s P AS (specify_policy): – Policy1’s P P (specify_policy -1 ) by Bob: – P Sys (specify_policy): – CRP Sys (specify_policy): 28 World-Leading Research with Real-World Impact!

Outline Motivation Model Components Model Use Cases Conclusions 29 World-Leading Research with Real-World Impact!

Summary Proposed a U2U, U2R and R2R relationship- based access control model for users’ usage and administrative access in OSNs – Access control policies are based on regular expression based path patterns – Hopcount skipping for more expressiveness Provided a system-level conflict resolution policies based on relationship precedence 30 World-Leading Research with Real-World Impact!

Future Work Incorporate attribute-based controls Extend DFS-based path checking algorithm to cover U2R and R2R relationships Undertake performance and scalability tests 31 World-Leading Research with Real-World Impact!

Questions? 32 World-Leading Research with Real-World Impact!