Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.

Slides:



Advertisements
Similar presentations
SACMAT 03© Mohammad Al-Kahtani1 Induced Role Hierarchies with Attribute-Based RBAC Mohammad A. Al-Kahtani Ravi Sandhu George Mason University NSD Security,
Advertisements

Institute for Cyber Security
How to do Discretionary Access Control Using Roles Ravi Sandhu Qamar Munawer.
Institute for Cyber Security
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Institute for Cyber Security Extending OpenStack Access Control with Domain Trust World-Leading Research with Real-World Impact! 1 Bo Tang and Ravi Sandhu.
Attribute-Based Access Control Models and Beyond
11 World-Leading Research with Real-World Impact! Constraints Specification for Virtual Resource Orchestration in Cloud IaaS Constraints Specification.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
Monitoring Architecture for Lawful Interception in VoIP Networks Second International Conference on Internet Monitoring and Protection (ICIMP 2007), IEEE.
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
Institute for Cyber Security Cross-Tenant Trust Models in Cloud Computing Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA © ICS at UTSA World-Leading.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT June 21, 2012
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security.
Next-generation databases Active databases: when a particular event occurs and given conditions are satisfied then some actions are executed. An active.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
G53SEC 1 Access Control principals, objects and their operations.
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
1 Attribute-Aware Relationship-Based Access Control for Online Social Networks World-Leading Research with Real-World Impact! Yuan Cheng, Jaehong Park.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
Templated Search over Relational Databases Date: 2015/01/15 Author: Anastasios Zouzias, Michail Vlachos, Vagelis Hristidis Source: ACM CIKM’14 Advisor:
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
ROLE BASED ACCESS CONTROL 1 Group 4 : Lê Qu ố c Thanh Tr ầ n Vi ệ t Tu ấ n Anh.
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Computer Security: Principles and Practice
1 XACML for RBAC and CADABRA Constrained Delegation and Attribute-Based Role Assignment Brian Garback © Brian Garback 2005.
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
ReBAC in ABAC Tahmina Ahmed Department of Computer Science University of Texas at San Antonio 4/29/ Institute for Cyber Security World-Leading Research.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
Institute for Cyber Security
Chapter 14: System Protection
Institute for Cyber Security
9/22/2018.
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control: Insights and Challenges
Bo Wang1, Yingfei Xiong2, Zhenjiang Hu3, Haiyan Zhao1,
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security
Data Model.
Attribute-Based Access Control: Insights and Challenges
Service Oriented Architectures (SOA): What Users Need to Know.
Chapter 14: Protection.
Institute for Cyber Security
Access Control Evolution and Prospects
Presentation transcript:

Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for Cyber Security, UTSA 1 MosaixSoft, Inc. 2 World-Leading Research with Real-World Impact! 21st ACM Symposium on Access Control Models and Technologies June 6-8, 2016, Shanghai, China

“… a new paradigm of access control needs to be developed that is based on interpersonal relationships …” -- [Gates 2007] Relationship-based Access Control (ReBAC) determines access in terms of the relationships among users and resources Inspired by the rapid emergence of online social networks Exemplary work includes:  [Carminati 2009a, 2009b]  [Fong 2009]  [Fong 2011a, 2011b, Bruns 2012]  [Cheng 2012a, 2012b, 2014]  [Crampton 2014, Stoller 2015, Rizvi 2015, Crampton 2016] ReBAC World-Leading Research with Real-World Impact!

Demand for an appropriate administrative model  Dynamic and decentralized nature of OSNs  Multiple owners and administrators  Proper control on adding and removing of entities, relationships, and policies Use ReBAC itself to manage ReBAC  Economy of mechanism  Prior success of using Role-based Access Control (RBAC) to manage RBAC Administrative ReBAC World-Leading Research with Real-World Impact!

J. Crampton and J. Sellwood, Path Conditions and Principal Matching: A New Approach to Access Control, SACMAT RPPM: relationships, paths, and principal- matching Combines UNIX access control model, ReBAC, and RBAC Path Condition  Bind requests to principals Principal Matching  Replace a path between entities with a single edge labelled by a principal RPPM [Crampton 2014] World-Leading Research with Real-World Impact!

S. Stoller, An Administrative Model for Relationship-Based Access Control, DBSec RPPM 2 : RPPM Modified Administrative Model  Add and Delete Edges/Entities/Authorization Rules The administration of authorization rules is considered the most challenging  Economy of mechanism RPPM 2 [Stoller 2015] World-Leading Research with Real-World Impact!

S. Rizvi, P. Fong, J. Crampton and J. Sellwood, Relationship-Based Access Control for OpenMRS, SACMAT Enforce ReBAC in a production-scale system Administrative Model  Add and remove access control relationships  Enabling precondition and applicability precondition ReBAC for OpenMRS [Rizvi 2015] World-Leading Research with Real-World Impact!

Extend Administrative ReBAC Use Case: Configure MT-RBAC  RBAC extension with multi-tenancy authorization Three motivating problems:  Enforce Global Integrity Policy Checks  Address Cascading Revocation  Resolve Multiple-ownership Issue Motivation World-Leading Research with Real-World Impact!

MT-RBAC Multi-tenant RBAC Model Structure World-Leading Research with Real-World Impact!

Introduction and Motivation AReBAC Models 1, 2 and 3 Experiments Conclusion Outline World-Leading Research with Real-World Impact!

Supports two operations: Add or Remove Edges (a.k.a. Relationships) Consistency Policies:  The system graph G = (V; E) is always well-formed after allowing admin operation. Global Integrity Constraints:  Constraints based on certain conditions for participants. AReBAC 1 World-Leading Research with Real-World Impact!

Operations Policy Examples AReBAC 1 (cont.) World-Leading Research with Real-World Impact!

The operation will trigger a series of recursive removal of edges on the graph in addition to the direct consequence of the operation. Cascading Revocation World-Leading Research with Real-World Impact!

Policy: C revoke (e 1, e 2, r) returns a set of edges that needs to be removed (possibly empty) when the policy p is used to authorize the edge removal operation. AReBAC 2 World-Leading Research with Real-World Impact!

Identification of dependent edges is non-trivial  Maintaining dependency relations could be costly Dependent-edge Discovery Algorithm  Depth-first search (O(V+E))  Dependency mapping function (O(1)) Maps the dependency edge (e 1, e 2, label) to an ordered set of relationship labels Path, and a set of dependent relationship labels R d  Overall complexity is O(V+E) Dependent-Edge Discovery World-Leading Research with Real-World Impact!

The provenance of a piece of data is the process that led to that piece of data Causality dependencies record the flow of transactions in the system The Open Provenance Model (OPM) captures such causality dependencies and expresses them in the provenance graph We can use provenance to address the multi- ownership issue Provenance World-Leading Research with Real-World Impact!

Edges with Multiple Ownership World-Leading Research with Real-World Impact!

Use provenance information to capture and express causality dependencies for assisting authorization.  Independent from ReBAC formalization  Extensible to enable Provenance-based Access Control (PBAC)  Potentially facilitate multi-level cascading revocation  Provenance vs typed parameters More complicated and costly More expressive power and richer information AReBAC 3 World-Leading Research with Real-World Impact!

OPM Graph for Adding UA Edge World-Leading Research with Real-World Impact!

OPM Graph for Removing UA Edge World-Leading Research with Real-World Impact!

Experiment 1: Varied size of Path, fixed size of rSet Experiments World-Leading Research with Real-World Impact!

Experiment 2: Fixed size of Path, varied size of rSet Experiments (cont.) World-Leading Research with Real-World Impact!

Proposed a family of three administrative ReBAC models based on RPPM 2 policy language Identified and addressed three problems  Integrity constraints  Cascading revocation  Multi-ownership of edges Provided a dependent-edge discovery algorithm Used the proposed models to capture MT-RBAC Next:  Investigate new problems about ReBAC administration Policy administration Synthesize ReBAC and PBAC, etc. Conclusion World-Leading Research with Real-World Impact!

Questions? Comments? World-Leading Research with Real-World Impact!