Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #27 Secure Geospatial data.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
Operating System Security
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Web Mapping Using XML and SVG SHEA Yu-kai Geoffrey Senior Lecturer Department of Land Surveying & Geo-Informatics The Hong Kong Polytechnic University.
ICS (072)Database Systems Background Review 1 Database Systems Background Review Dr. Muhammad Shafique.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Building Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Semantic web technologies for secure interoperability and.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Implemented Systems Presenter: Manos Karpathiotakis Extended Semantic Web Conference 2012.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
GIS 1110 Designing Geodatabases. Representation Q. How will we model our real world data? A. Typically: Features Continuous Surfaces and Imagery Map Graphics.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
8. Geographic Data Modeling. Outline Definitions Data models / modeling GIS data models – Topology.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August.
A Flexible Access Control Model for Web Services Elisa Bertino CERIAS and CS Department, Purdue University Joint work with Anna C. Squicciarini – University.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Semantic Access Control Ashraful Alam Dr. Bhavani Thuraisingham.
Geographic Information Systems Temporal GIS Lecture 8 Eng. Osama Dawoud.
Interoperability & Knowledge Sharing Advisor: Dr. Sudha Ram Dr. Jinsoo Park Kangsuk Kim (former MS Student) Yousub Hwang (Ph.D. Student)
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
Dr. Bhavani Thuraisingham The University of Texas at Dallas Trustworthy Semantic Webs March 25, 2011 Data and Applications Security Developments and Directions.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Vision for Semantic Web.
Dr. Bhavani Thuraisingham September 2006 Building Trustworthy Semantic Webs Lecture #5 ] XML and XML Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #15 Secure Multimedia Data.
Dr. Bhavani Thuraisingham September 24, 2008 Building Trustworthy Semantic Webs Lecture #9: RDF and RDF Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #20 Secure Multimedia Data.
Department of Computer Science PCL: A Policy Combining Language EXAM: Environment for Xacml policy Analysis & Management Access Control Policy Combining.
Privacy rules over JPEG images Jaime Delgado DMAG UPC BarcelonaTECH October 2015.
Dr. Bhavani Thuraisingham September 18, 2006 Building Trustworthy Semantic Webs Lecture #9: Logic and Inference Rules.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture Secure Multimedia and Geospatial.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Secure Geospatial and Sensor Semantic Webs for Crime Analysis and Border Security Prof. Bhavani Thuraisingham, PhD Prof. Latifur Khan, PhD Mr. Alam Ashraful.
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #25 Dependable Data Management.
Spatial Data Models Geography is concerned with many aspects of our environment. From a GIS perspective, we can identify two aspects which are of particular.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Trustworthy Semantic Webs Building Geospatial Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas October 2006 Presented at OGC Meeting,
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Dependable Data Management April.
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
An Architecture for Complex Objects and their Relationships
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Dr. Bhavani Thuraisingham The University of Texas at Dallas
Lecture #6: RDF and RDF Security Dr. Bhavani Thuraisingham
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Webs
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Presentation transcript:

Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #27 Secure Geospatial data management April

Outline l Secure Geospatial data management l References: - Vijayalakshmi Atluri, Soon Ae Chun: An Authorization Model for Geospatial Data. IEEE Trans. Dependable Sec. Comput. 1(4): (2004)Soon Ae ChunIEEE Trans. Dependable Sec. Comput. 1 - Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008:6- 19 Elisa BertinoBhavani M. ThuraisinghamMichael Gertz Maria Luisa DamianiSPRINGL 2008:6- 19

Securing Geospatial Data l Geospatial images could be Digital Raster Images that store images as pixels or Digital Vector Images that store images as points, lines and polygons l GSAM: Geospatial Authorization Model specifies subjects, credentials, objects (e.g, points, lines, pixels etc.) and the access that subjects have to objects l Reference: Authorization Model for Geospatial Data; Atluri and Chun, IEEE Transactions on Dependable and Secure Computing, Volume 1, #4, October – December 2004.

Framework for Geospatial Data Security (Joint with UCDavis and Purdue U.)

Example of several GIS repositories and GIS themes/layers for Northern California (Gertz, Bertino, Thuraisingham) Assume a single GIS data repository that manages information about parcels (being the basic units of geography for local government) and cadastre, including land use and zoning, environmental areas, and municipal utility services. Such type of repository is typically used by public sector staff to assist property owners and to support emergency, fire, and police operations. The latter type of usage includes identifying property structures and owners. Parcel maps in particular can be useful to do damage assessment after a disaster.

Example (Continued) They are also an important access point during emergencies for linking data from different GIS repositories. While such types of geospatial are used to serve the public, e.g., through Web-based interfaces, not all data layers are made publicly available. For example, property owner information is not publicly accessible A similar separation of public and private GIS data can be made for other types of themes. For example, environmental theme layers do not make information about locations of endangered species or nesting sites public. Based on this type of separation of GIS data, the following question arises: “What security mechanisms are used to specify and enforce different types of access to data in a single GIS repository?” In particular, “What provisions do GSI data managers have to (1) give public sector staff only access to GIS data relevant to their function, and (2) ensure that no sensitive geospatial data (e.g., parcel owner information) is made publicly available?” Ideally, GIS repositories should provide access control models and techniques similar to those developed for traditional (relational) databases. However, the diversity of geospatial data (feature- based versus field-based) and the complexity of feature-based geospatial data complicate a coherent and uniform access control model.

Policy Example (Bertino, Gertz, Thuraisingham) Deny/allow policies with flexible granularity, grouping mechanisms for protected objects, and space-related access restrictions. Deny/allow policies will be supported through the use of positive/negative authorizations; negative authorizations are crucial in order to support exceptions, by which, for example, an authorization is assigned to all objects in a set but one. In our context this paradigm is complicated by the larger options that we provide for denoting protected objects and by the presence of different object representations and dimensions. The main mechanism that we provide to support flexible grouping is based on the notions of object-locator and spatial window. An object-locator is a query expression that may include predicates against properties of feature types, metadata and provenance data. Predicates may also refer to topological relationships holding among the data objects, such as Within and Touches. An example of a policy using Touches is the one allowing a subject, which has access to information on a particular land parcel, to access information about all adjacent land parcels. The query expression may also include a projection component to specify an object representation and components. A spatial window is simply a spatial region in the reference space and denotes the set of object that are inside the boundary of the region. By combining such two mechanisms, one can specify sets of objects such as “all shelters occupying an area greater than 3000sf in Montgomery County”; in such case Montgomery County represents the authorization window. The use of spatial windows is particularly important to

Policy Example (Continued) Active policies. These are policies that when applied to a protected object perform certain transformations on the object, before returning it to the requester. Two relevant classes are the filtering policies and the obfuscating policies. Filtering policies refer to policies that filter out some portions of the objects before returning them to the users. These policies are directly supported by our object locator mechanisms. Obfuscating policies These policies act like filter policies except that they do not simply select objects but perform possibly complex computations on the feature(s) to be returned. Typical examples include computing a lower resolution image, and distorting some vector data (but preserving topological relationships). One can even specify policies that return incorrect data (e.g., as a honey pot in the context of misuse detection). In our model these policies are supported by the projection component, suitably extended with the possibility of invoking functions, of the object locator. We will provide a library including a variety of functions to support obfuscating policies.

Policy Example (Concluded) Context-dependent access control policies. Under such policies, information from the environment is taken into account by the access control module when taking decisions about access requests. Typical contextual information includes time and subject location. Subject location information is used to specify policies allowing a subject to access a resource only if the current location of the subject verifies certain spatial constraints. Context-dependent access policies will be supported by the introduction of a context component, as part of authorization rules, and by attribute-based specification of subjects in authorization rules. Event-based access control policies. Event-based access control policies are novel and are based on the idea that policies can be enabled/disabled depending on the occurrence of specified events. Events can include data modifications, very much like in database triggers, or application-dependent events, such as an emergency. We notice that current sensor networks and intelligent appliances make it very easy for a computer system to detect events arising in the environments. Our model will take advantage of such capabilities.

Policy Language l Take existing geospatial language/model and extend for security - E.g., GML l Take a security model/language and extend for geospatial - E.g, XACML has been extended to Geo-XACML l Develop from scratch - GRDF, Secure GRDF (developed at UTDallas by Alam Ashraful for PhD research)

The strength of RDF lies in the ease of composition with which RDF based formalisms can be integrated with other similar languages. On the Semantic Web, the goal is to minimize human intervention and to make way for machines to perform rule based automated reasoning. We are developing GRDF for geospatial data representation Why not use GML? - same reasons for using RDF and not XML – semantics Secure GRDF – security extensions for GRDF Geospatial Semantic Web: GRDF