February 2009 Framework for Managing the Assured Information Sharing Lifecycle 2008 MURI project with UMBC, Purdue, U. Texas Dallas, U. Illinois, U. Texas.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

1 TIUPAM: A Framework for Trustworthiness-centric Information Sharing Shouhuai Xu Univ. Texas at San Antonio Joint work with Qun Ni and Elisa Bertino (Purdue.
Managing the Assured Information Sharing Lifecycle Tim Finin, UMBC 08 June use acquire discover.
Trustworthy Service Selection and Composition CHUNG-WEI HANG MUNINDAR P. Singh A. Moini.
Operating System Security
Secure Multiparty Computations on Bitcoin
SEARCHING QUESTION AND ANSWER ARCHIVES Dr. Jiwoon Jeon Presented by CHARANYA VENKATESH KUMAR.
1 Regret-based Incremental Partial Revelation Mechanism Design Nathanaël Hyafil, Craig Boutilier AAAI 2006 Department of Computer Science University of.
Argumentation-based negotiation Rahwan, Ramchurn, Jennings, McBurney, Parsons and Sonenberg, 2004 Presented by Jean-Paul Calbimonte.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
A Heuristic Bidding Strategy for Multiple Heterogeneous Auctions Patricia Anthony & Nicholas R. Jennings Dept. of Electronics and Computer Science University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Privacy-Aware Computing Introduction. Outline  Brief introduction Motivating applications Major research issues  Tentative schedule  Reading assignments.
Anonymizing Web Services Through a Club Mechanism With Economic Incentives Mamata Jenamani Leszek Lilien Bharat Bhargava Department of Computer Sciences.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
A Study of Computational and Human Strategies in Revelation Games 1 Noam Peled, 2 Kobi Gal, 1 Sarit Kraus 1 Bar-Ilan university, Israel. 2 Ben-Gurion university,
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Chapter 14: Artificial Intelligence Invitation to Computer Science, C++ Version, Third Edition.
1 Performance Evaluation of Computer Networks: Part II Objectives r Simulation Modeling r Classification of Simulation Modeling r Discrete-Event Simulation.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Incentive compatible Assured Data Sharing & Mining Murat Kantarcioglu.
Aardvark Anatomy of a Large-Scale Social Search Engine.
1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.
Computer Science and Engineering 1 Cloud ComputingSecurity.
A Privacy-Preserving Interdomain Audit Framework Adam J. Lee Parisa Tabriz Nikita Borisov University of Illinois, Urbana-Champaign WPES 2006.
UMBC iConnect Audumbar Chormale, Dr. A. Joshi, Dr. T. Finin, Dr. Z. Segall.
Incentive Compatible Assured Information Sharing Murat Kantarcioglu.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
Managing the Assured Information Sharing Lifecycle Tim Finin UMBC 22 June use acquire discover.
Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University.
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relational Data.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Privacy Framework for RDF Data Mining Master’s Thesis Project Proposal By: Yotam Aron.
Assured Information Sharing Lifecycle A Framework for Managing the Assured Information Sharing Lifecycle Tim Finin Joint MURI Meeting 12 September 2008.
Truth Discovery with Multiple Conflicting Information Providers on the Web KDD 07.
Chapter 4 Decision Support System & Artificial Intelligence.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Software Engineering Jon Walker. What is Software Engineering? Why do we call it Software Engineering? Why not just call it programming or software development?
m-Privacy for Collaborative Data Publishing
Pertemuan 16 Materi : Buku Wajib & Sumber Materi :
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Computer Science and Engineering 1 Mobile Computing and Security.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
Text Information Management ChengXiang Zhai, Tao Tao, Xuehua Shen, Hui Fang, Azadeh Shakery, Jing Jiang.
UMBC AN HONORS UNIVERSITY IN MARYLAND A Framework for Managing the Assured Information Sharing Lifecycle Overview 18 September 2009 use acquir e discove.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
Data and Applications Security
The Beta Reputation System
Data and Applications Security
Announcements Homework 3 due today (grace period through Friday)
PBKM: A Secure Knowledge Management Framework
Data Warehousing Data Mining Privacy
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Data and Applications Security
Presentation transcript:

February 2009 Framework for Managing the Assured Information Sharing Lifecycle 2008 MURI project with UMBC, Purdue, U. Texas Dallas, U. Illinois, U. Texas San Antonio, and U. Michigan Objectives: Create a new framework for assured information sharing recognizing that sharable information has a lifecycle of production, release, advertising, discovery, acquisition and use Develop techniques grounded in this model to promote information sharing while maintaining appropriate security, privacy and accountability Evaluate, adapt and improve the AIS concepts and algor- ithms in relevant demonstration systems and test beds See for papers and more information

February 2009 AIS Lifecycle Approach Design a service oriented architecture to support the assured information sharing lifecycle Create new policy models & languages to express and en- force AIS rules & constraints Develop new data mining techniques and algorithms to track provenance, increase quality and preserve privacy Model underlying organizational social networks to estimate trust and information novelty Design incentive structures to motivate sharing in organizations and coalitions Information value chain information has a lifecycle involving a web of producers and consumers All aspects of the lifecycle are shaped by distributed information sharing policies Integration and mining creates new information that may be shared access may involve negotiating policy defined obligations

February 2009 Selected AISL Recent Results ① Progress on models, architectures, languages and mechanisms for trustworthiness-centric assured information sharing (UTSA, Purdue) ② Techniques for resolving conflicting facts extracted from different resources (UIUC) ③ Study of information sharing motivation and quality in online forums (Michigan) ④ Modeling incentives & trust in info. sharing (UTD) ⑤ Learning statistically sound trust metrics (UTD) ⑥ Inferring access policies from logs (UMBC) ⑦ Policies for privacy in mobile information systems (UMBC, Purdue)

February 2009 Trustworthiness-centric AIS Framework Objective: create a trustworthiness-centric assured information sharing framework Approach: design models, architectures, language and mechanisms to realize it Key challenges: -Trustworthiness and risk management for end-user decision making -Usage management to extends access control -Attack management, including trustworthiness of infrastructure services -Identity management extending current generation -Provenance management for managing trustworthiness of data, software, and requests 1 1

February 2009 trustworthiness-centric assured information sharing framework Trustworthiness management Risk management Usage management (of authorized activities) Identity management (of people, organizations, and devices) Attack management (of unauthorized activities) Provenance management (of data, software, and requests) Note: “trustworthiness  risk” in general 1 1

February 2009 Progress on Trustworthiness-centric AIS Initial framework will be published as: S. Xu, R. Sandhu & E. Bertino, Trustworthiness-centric Assured Information Sharing, (invited paper), 3rd IFIP Int. Conf. on Trust Management, 2009 Design for identity & provenance mgmt underway Group-centric info sharing model extends traditional dissemination one with new intuitive metaphors: secure meeting room and subscription service Developed family of security models for semantics of basic group operations (join, leave, add, remove) and proved security properties about them Results published in recent conference papers 1 1

2 2 Truth Discovery with Multiple Conflicting Information Providers [TKDE’08] Heuristic Rule 2: A web site that provides mostly true facts for many objects will likely provide true facts for other objects Problem: Multiple information provider may provide conflictive facts on the same object E.g., different author names for a book Which is the true fact? Heuristic Rule 1: The false facts on different web sites are less likely to be the same or similar False facts are often introduced by random factors w1w1 f1f1 f2f2 f3f3 w2w2 w3w3 w4w4 f4f4 f5f5 Web sitesFacts o1o1 o2o2 Objects February 2009

Truth-Discovery: Framework Extension Multi-version of truth Democrats vs. republicans may have different views Truth may change with time A player may win first but then lose Truth is a relative, dynamically changing judgment Incremental updates with recent data in data streams Method: Veracity-Stream Dynamic information network mining for veracity analysis in multiple data streams Current Testing Data Sets Google News: A dynamic news feed that provides functions and facilitates to search and browse 4,500 news sources updated continuously 2 2 February 2009

Motivation & quality in information sharing Analyzed online Q&A forums: 2.6M questions, 4.6M answers and interviews with 26 top answerers Motivations to contribute include: altruism, learning, competition (via point system) and as a hobby Users who contribute more often and less intermittently contribute higher quality information Users prefer to answer unanswered questions and to respond to incorrect answers See “Questions in, Knowledge iN? A Study of Naver's Question Answering Community”, Nam, Ackerman, Adamic, CHI 2009 Knowledge iN 3 3

FEARLESS engineering Incentives & Trust in Assured Information Sharing Goal: Create means of encouraging desirable behavior within an environment which lacks or cannot support a central governing agent Approach: Combining intelligence through a loose alliance –Bridges gaps due to sovereign boundaries –Maximizes yield of resources –Discovery of new information through correlation, analysis of the ‘big picture’ –Information exchanged privately between two participants Drawbacks to sharing include misinformation and freeloading 4 4

FEARLESS engineering Our Model Players assumed to be rational The game of information trading –Strategies: be truthful, lie, refuse to participate –One game played for each possible pair of players, all games played simultaneously in a single round; game repeated ‘infinitely’ –Players may verify the information they received with some cost When to verify becomes aspect of game –Always verifying works poorly in light of honest equilibrium behavior but never verifying may yield game to lying opponents Add EigenTrust to game –A distributed trust metric where each player asks others for their opinion of a third –Based on known perfect information 4 4

FEARLESS engineering Behaviors Analyzed in Data Sharing Simulations NameStrategyVerification?Punishment?Comments HonestTruthNo Optimistic, maximizes returns DishonestLieNo Takes advantage of other players, trumps Honest in 1 on 1 RandomTruth, LieNo Chaotic, chooses either with equal probability Tit-for-TatTruth, LieAlwaysSpecial Mirrors other players’ actions, starts by selecting Truth LivingAgentTruthTrust-basedNo trading Verifies activity according to trust ratings, will cease activity for number of rounds with player who is caught lying LiarTruth, LieTrust-basedNo trading Identical to LivingAgent but lies with small probability SubtleLieTruth, LieTrust-basedNo trading Identical to Liar, except lies whenever information value reaches certain threshold 4 4

FEARLESS engineering Game Matrix Play (agent j)Do Not Play TruthLie Play (Agent i) Truth 0000 Lie 0000 Do Not Play Value of information Minimal verification probability Cost of Verification Trust value Agent type 4 4

FEARLESS engineering Simulation Results We set δ min = 3, δ max = 7, C V = 2 Lie threshold is set 6.9 Honest behavior wins %97 percent of the time if all behaviors exist. Experiments show without LivingAgent behavior, honest behavior cannot flourish. “Incentive and Trust Issues in Assured Information Sharing”, Ryan Layfield, Murat Kantarcioglu, and Bhavani Thuraisingham, International Conference on Collaborative Computing,

February 2009 Learning statistically sound trust scores Goal: Build a statistically sound trust-based scoring system for effective access control through the application of the credit scoring system Approach: Find appropriate predictive variables by applying concepts and methodologies used in credit scoring systems Incorporate a utility function into the scoring system to set up score-related access policies 5 5 Phase 1 Access Request Phase 2 Trust Calculator Phase 3 Trust Policies Phase 4 Access Privilege Phase 5 Interaction Follow-Up Trust-Based Access Control Processes

February 2009 Inferring RBAC Policies Problem: A system whose access policy is known is more vulnerable to attacks and insider threat Attackers may infer likely policies from access observations, partial knowledge of subject attributes, and background knowledge Objective: Strengthen policies against discovery Approach: Explore techniques to propose policy theories via machine learning such as ILP Results: promising initial results for simple Role Based Access Control policies 6 6

February 2009 Privacy policies for mobile computing Problem: mobile devices collect and integrate sensitive private data about their users which they would like to selectively share with others Objective: Develop a policy-based system for information sharing with an interface enabling end users to write & adapt privacy policies Approach: prototype component for iConnect on an iPhone and evaluate in a University environment Example policy rules: share my exact location with my family; share current activity with my close friends, … 7 7