Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
A New Modeling Paradigm for Dynamic Authorization in Multi-Domain Systems MMM-ACNS, September 13, 2007 Manoj Sastry, Ram Krishnan, Ravi Sandhu Intel Corporation,
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Institute for Cyber Security ASCAA Principles for Next- Generation Role-Based Access Control Ravi Sandhu Executive Director & Endowed Professor Institute.
11 World-Leading Research with Real-World Impact! A Framework for Risk-Aware Role Based Access Control Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu.
Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Oct. 9, 2010 Jaehong Park, Yuan Cheng, Ravi Sandhu Institute for Cyber Security.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
Towards A Times-based Usage Control Model Baoxian Zhao 1, Ravi Sandhu 2, Xinwen Zhang 3, and Xiaolin Qin 4 1 George Mason University, Fairfax, VA, USA.
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Brief Introduction to Provenance "As data becomes plentiful, verifiable truth becomes scarce
Archetypes in HL7 2.x Archetypes in HL7 Version 2.x Andrew McIntyre Medical Objects 9 th HL7 Australia Conference, 8.
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Every edge is in a red ellipse (the bags). The bags are connected in a tree. The bags an original vertex is part of are connected.
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
A Provenance-based Access Control Model for Dynamic Separation of Duties July 10, 2013 PST 2013 Dang Nguyen, Jaehong Park, and Ravi Sandhu Institute for.
The RBAC96 Model Prof. Ravi Sandhu. 2 © Ravi Sandhu WHAT IS RBAC?  multidimensional  open ended  ranges from simple to sophisticated.
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Provenance-based Access Control Models July 31, 2014 Dissertation Defense Dang Nguyen Institute for Cyber Security University of Texas at San Antonio 1.
Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
The Data Attribution Abdul Saboor PhD Research Student Model Base Development and Software Quality Assurance Research Group Freie.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security.
1 Attribute-Aware Relationship-Based Access Control for Online Social Networks World-Leading Research with Real-World Impact! Yuan Cheng, Jaehong Park.
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Assignment #1 on Access.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
SPADE on Android
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
ReBAC in ABAC Tahmina Ahmed Department of Computer Science University of Texas at San Antonio 4/29/ Institute for Cyber Security World-Leading Research.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
Institute for Cyber Security
Institute for Cyber Security
World-Leading Research with Real-World Impact!
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Institute for Cyber Security
Institute for Cyber Security
Field Mapper Julian Ramirez February 5, 2015.
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Role-Based Access Control Richard Newman (c) 2012 R. Newman
Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud B95b01023 鍾宇彥.
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Data and Applications Security Developments and Directions
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
World-Leading Research with Real-World Impact!
Presentation transcript:

Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio 1 Institute for Cyber Security

Access control in Provenance-aware Systems Provenance Access Control (PAC) – Controlling access to provenance data which could be more sensitive than the underlying data – Needs access control models/mechanisms (e.g, RBAC) – (Meaningful) control granularity? Provenance-based Access Control (PBAC) – Using provenance data to control access to the underlying data – Provenance-based policy specification 2 Meaningful granularity of provenance data?

PAC & PBAC in Applications Common Foundation – Base provenance data – Dependency list Dependency Name: meaningful, named abstraction matching regular expression-based causality dependency path pattern PAC and PBAC are complementary – In PAC, control decision can be based on provenance data (PB-PAC) – In PBAC, PAC can be used for added trustworthiness on provenance data 3

Provenance Data Directed Acyclic Graph (DAG) Causality dependencies between entities (acting users, action processes and data objects) Dependency graph can be traced for extracting pedigree, usage, versioning information, etc. PBAC can support origin/usage-based control, Dynamic Separation of Duty (DSOD), workflow control, etc. 4

From Open Provenance Model (OPM) 3 Nodes – Artifact (ellipse) – Process (Rectangle) – Agent (Hexagon) 5 Causality dependency edges (not dataflow) 5 Provenance data: a set of 2 entities & 1 dependency E.g., (ag,p1,a1,a2):,,

Direct vs. Indirect Dependencies Direct dependencies – Used (u), wasGeneratedBy (g), wasControlledBy (c) – Captured from transactions as base provenance data Indirect dependencies – System-computable dependencies using pre-defined dependency names and matching dependency path patterns – User-declared dependencies using pre-defined dependency names 6

Object Dependency List (DL O ) A set of pairs of – abstracted dependency names (DNAME) and – regular expression-based object dependency path patterns (DPATH) Examples – 7

PBAC vs. PAC 8

PBAC Models 9

Example: A Homework Grading System 1.Anyone can upload a homework. 2.A user can replace a homework if she uploaded it (origin-based control) and the homework is not submitted yet. 3.A user can submit a homework if she uploaded it and the homework is not submitted already. (workflow control) 4.A user can review a homework if she is not the author of the homework (DSOD), the user did not review the homework earlier, and the homework is submitted already but not graded yet. 5.A user can grade a homework if the homework is reviewed but not graded yet. 10

Sample Transactions & Base Provenance Data (au1, upload1, o 1v1 ):, (au1, replace1, o 1v1, o 1v2 ):,, (au1, submit1, o 1v2, o 1v3 ):,, (au2, review1, o 1v3, o 2v1 ):,, (au3, grade1, o 1v3, o 3v1 ):,, 11

A Sample Base Provenance Data 12

A Sample Base Provenance Data 13 wasReplacedVof DL O : wasReplacedVof DL O : wasSubmittedVof wasReviewedOof wasReviewedOby wasGradedOof

A Sample Base Provenance Data 14 wasAuthtoredBy DL O : wasAuthtoredBy DL O :

A Sample Base Provenance Data 15 wasReviewedBy DL O : wasReviewedBy DL O :

Sample Object Dependency List (DL O )

Sample Policies 1.allow(au, upload, o) ⇒ true 2.allow(au, replace, o) ⇒ au ∈ (o, wasAuthoredBy) ∧ |(o,wasSubmittedVof)| = 0. 3.allow(au, submit, o) ⇒ au ∈ (o, wasAuthoredBy) ∧ |(o,wasSubmittedVof)|= Anyone can upload a homework. 2.A user can replace a homework if she uploaded it (origin- based control) and the homework is not submitted yet. 3.A user can submit a homework if she uploaded it and the homework is not submitted already. (workflow control)

Sample Policies (cont.) 4.allow(au, review, o) ⇒ au ∉ (o, wasAuthoredBy) ∧ au ∉ (o, wasReviewedBy) ∧ |(o, wasSubmittedV of)| ≠ 0 ∧ |(o,wasGradedOof −1 )| = 0. 5.allow(au, grade, o) ⇒ |(o, wasReviewedOof)| ≠ 0 ∧ |(o,wasGradedOof −1 )| = 0) A user can review a homework if she is not the author of the homework (DSOD), the user did not review the homework earlier, and the homework is submitted already but not graded yet. 5.A user can grade a homework if the homework is reviewed but not graded yet.

Summary Regular expression-based dependency path pattern Introduced the notion of named abstractions of causality dependency path patterns as a foundation for PBAC and PAC Supports Simple and effective policy specification and access control management Supports DSOD, workflow control, origin-based control, usage-based control, object versioning, etc. 19

What’s next? Enhancing/extending PBAC model Provenance Access Control Models Provenance data sharing in multiple systems 20

Thank you Questions and Comments? 21