1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 Cyber Security Grand Challenges and Prognosis Prof. Ravi Sandhu Executive Director and Endowed Chair
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
1 The Science, Engineering, and Business of Cyber Security Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair.
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 © Ravi Sandhu OM-AM and PEI Prof. Ravi Sandhu. 2 © Ravi Sandhu THE OM-AM WAY Objectives Model Architecture Mechanism What? How? AssuranceAssurance.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing Ram Krishnan and Ravi Sandhu University of Texas at San.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Past, Present and Future
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control: Insights and Challenges
Role-Based Access Control (RBAC)
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Intersection of Data, Policy and Privacy
Attribute-Based Access Control: Insights and Challenges
Assured Information Sharing
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security Joint work with ICS colleagues: Ram Krishnan, Jianwei Niu and Will Winsborough

2 Goal: 4 th Element  3 succesful access control models in 40+ years  Discretionary Access Control (DAC)  Mandatory Access Control (MAC)  Role-base Access Control (RBAC)  Crucial ingredients for success  Strong mathematical foundations  Strong intuitive foundations  Significant real-world deployment © Ravi Sandhu World-Leading Research with Real-World Impact!

3 What is the 4 th Element?  DAC – owner control  MAC – information flow in a lattice  RBAC – organizational/social alignment  Dynamics/agility  DAC: too loose, too fine-grained  MAC: too rigid, static lattice  RBAC: too enterprise centric  Group-centric conceived to fill this gap © Ravi Sandhu World-Leading Research with Real-World Impact!

4 Historical Aside on Dynamics/Agility  Harrison, Russo and Ullman 1976: HRU  dynamics leads to undecidable safety  Jones, Lipton, Snyder 1978: Take-Grant  simple models can be efficiently decidable  Sandhu, 1988, 1992: SPM, TAM  sophisticated models can be efficiently decidable © Ravi Sandhu World-Leading Research with Real-World Impact!

5 Secure Information Sharing (SIS) Goal: Share but protect  Containment challenge  Client containment  Ultimate assurance infeasible (e.g., the analog hole)  Appropriate assurance achievable  Server containment  Will typically have higher assurance than client containment  Policy challenge  How to construct meaningful, usable, agile SIS policy  How to develop an intertwined information and security model © Ravi Sandhu World-Leading Research with Real-World Impact!

6 SIS Policy Construction  Dissemination Centric (d-SIS)  Sticky policies that follow an object along a dissemination chain (possibly modified at each step)  Group Centric (g-SIS)  Bring users and information together to share existing information and create new information  Metaphors: Secure meeting room, Subscription service  Benefits: analogous to RBAC over DAC © Ravi Sandhu World-Leading Research with Real-World Impact!

7 Community Cyber Security © Ravi Sandhu World-Leading Research with Real-World Impact! Core Group Incident Group Open Group Conditional Membership Automatic Membership Administered Membership Filtered RW Administered Membership Filtered RW Administered Membership Domain Experts

8 Community Cyber Security © Ravi Sandhu World-Leading Research with Real-World Impact! Core Group Incident Groups Open Group g1 g2 g3 Automatic Membership Conditional Membership Read Subordination Write Subordination Domain Experts Administered Membership

9 A Family of g-SIS Models © Ravi Sandhu World-Leading Research with Real-World Impact!

10 Isolated, Undifferentiated g-SIS Models © Ravi Sandhu World-Leading Research with Real-World Impact! GROUP Authz(U,O,R)? Join Leave Add Remove Users Objects GROUP Authz(U,O,R)?

11 Isolated, Undifferentiated g-SIS Models © Ravi Sandhu World-Leading Research with Real-World Impact! GROUP Authz(U,O,R)? Users Objects Strict Join Strict Leave Liberal Add Liberal Remove Liberal Join Liberal Leave Strict Add Strict Remove GROUP Authz(U,O,R)?

12 Group Operation Semantics © Ravi Sandhu World-Leading Research with Real-World Impact! Strict Vs Liberal operations  User operations (SJ, LJ, SL, LL)  Object operations (SA, LA, SR, LR) SJ (u) u not authorized to access objects added prior to join time SA (o) Users joining after add time not authorized to access o LL (u) u retains access to objects authorized at leave time LR (o) Users authorized to access o at remove time retain access

13 The π-System g-SIS Specification © Ravi Sandhu World-Leading Research with Real-World Impact! π -system g-SIS Specification: Add after Join Add before Join Well-formedness constraints rule out invalid traces Examples: 1. user joining and leaving in the same state 2. leaving before joining

14 Stateful Specification © Ravi Sandhu World-Leading Research with Real-World Impact! Consists of three modules state 0 state 1 phase 1 phase Capture action+authz requests (Module 1) Process action requests (Module 2) Process authz requests (Module 3) interval 0 Module 2 maintains and manages data structures  Keeps track of historical joins and leaves and adds and removes for users and objects Module 3 consults with that data structure

15 Stateless and Stateful Equivalence © Ravi Sandhu World-Leading Research with Real-World Impact! state 0 state 1 SJ(u,g) SA(o,g) Authz(u,o,g) SL(u,g) ¬ Authz(u,o,g) A sample stateless trace state 0 state 1 phase 1 phase 2 phase 1 phase 2 SJReq(u,g) SAReq(o,g) isAuthz(u,o,g) 1. Process user & object events & update data structure 2. Check for authz SLReq(u,g) isAuthz(u,o,g) 1. Process user & object events & update data structure 2. Check for authz Corresponding stateful trace below α-mapping β-mapping

16 Formal Models Development © Ravi Sandhu World-Leading Research with Real-World Impact! Formal stateless behavioral model Formal stateful enforceable model Formal stateful enforceable model with latencies, disconnected operations etc Provable security properties Proof of equivalence Proof of safe equivalence

17 Why not ABAC (Attribute-Based Access Control)? Security and system goals (objectives/policy) Policy models Enforcement models Implementation models Necessarily informal Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting. Security analysis (objectives, properties, etc.). Approximated policy realized using system architecture with trusted servers, protocols, etc. Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.). Technologies such as Cloud Computing, Trusted Computing, etc. Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.) Software and Hardware Concrete System © Ravi Sandhu World-Leading Research with Real-World Impact! PEIMODELSPEIMODELS gSIS ABAC