A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

A New Modeling Paradigm for Dynamic Authorization in Multi-Domain Systems MMM-ACNS, September 13, 2007 Manoj Sastry, Ram Krishnan, Ravi Sandhu Intel Corporation,
Institute for Cyber Security
Towards A Framework for Cyber Social Status Based Trusted Open Collaboration Oct. 9, 2010 Jaehong Park, Yuan Cheng, Ravi Sandhu Institute for Cyber Security.
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
Q UERY L ANGUAGE C ONSTRUCTS FOR P ROVENANCE Murali Mani, Mohamad Alawa, Arunlal Kalyanasundaram University of Michigan, Flint Presented at IDEAS 2011.
Open Provenance Model Tutorial Session 2: OPM Overview and Semantics Luc Moreau University of Southampton.
PROVENANCE FOR THE CLOUD (USENIX CONFERENCE ON FILE AND STORAGE TECHNOLOGIES(FAST `10)) Kiran-Kumar Muniswamy-Reddy, Peter Macko, and Margo Seltzer Harvard.
A Provenance-based Access Control Model for Dynamic Separation of Duties July 10, 2013 PST 2013 Dang Nguyen, Jaehong Park, and Ravi Sandhu Institute for.
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
Provenance-based Access Control Models July 31, 2014 Dissertation Defense Dang Nguyen Institute for Cyber Security University of Texas at San Antonio 1.
Using Provenance to Support Real-Time Collaborative Design of Workflows Workflow evolution provenance and OPM Tommy Ellkvist and Juliana Freire.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Attribute-Based Access Control Models and Beyond
Chapter 6 Database Design
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
Marakas: Decision Support Systems, 2nd Edition © 2003, Prentice-Hall Chapter Chapter 1: Introduction to Decision Support Systems Decision Support.
Leveraging User Interactions for In-Depth Testing of Web Applications Sean McAllister, Engin Kirda, and Christopher Kruegel RAID ’08 1 Seoyeon Kang November.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Session Management A290/A590, Fall /25/2014.
6 Chapter 6 Database Design Hachim Haddouti. 6 2 Hachim Haddouti and Rob & Coronel, Ch6 In this chapter, you will learn: That successful database design.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
Privacy By Design Sample Use Case Privacy Controls Insurance Application- Vehicle Data.
Evaluating Detection & Treatment Effectiveness of Commercial Anti-Malware Programs Jose Andre Morales, Ravi Sandhu, Shouhuai Xu Institute for Cyber Security.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
The Data Attribution Abdul Saboor PhD Research Student Model Base Development and Software Quality Assurance Research Group Freie.
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th.
Grant Number: IIS Institution of PI: Arizona State University PIs: Zoé Lacroix Title: Collaborative Research: Semantic Map of Biological Data.
IST 210 Database Design Process IST 210 Todd S. Bacastow January 2005.
Week 4 Lecture Part 3 of 3 Database Design Samuel ConnSamuel Conn, Faculty Suggestions for using the Lecture Slides.
11 World-Leading Research with Real-World Impact! Towards Provenance and Risk-Awareness in Social Computing Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram.
Provenance-based Access Control in Cloud IaaS August 23, 2013 Dissertation Proposal Dang Nguyen Institute for Cyber Security University of Texas at San.
On Data Provenance in Group-centric Secure Collaboration Oct. 17, 2011 CollaborateCom Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
A User-to-User Relationship-based Access Control Model for Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security.
MIS 673: Database Analysis and Design u Objectives: u Know how to analyze an environment and draw its semantic data model u Understand data analysis and.
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
1 Attribute-Aware Relationship-Based Access Control for Online Social Networks World-Leading Research with Real-World Impact! Yuan Cheng, Jaehong Park.
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
Windows Role-Based Access Control Longhorn Update
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
Metadata By N.Gopinath AP/CSE Metadata and it’s role in the lifecycle. The collection, maintenance, and deployment of metadata Metadata and tool integration.
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems June 14, 2012 TaPP’12 Dang Nguyen, Jaehong Park and Ravi Sandhu.
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Protection & Security Greg Bilodeau CS 5204 October 13, 2009.
SPADE on Android
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
Tools for Navigating and Analysis of Provenance Information Vikas Deora, Arnaud Contes and Omer Rana.
IST 210 Database Design Process IST 210, Section 1 Todd S. Bacastow January 2004.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
ReBAC in ABAC Tahmina Ahmed Department of Computer Science University of Texas at San Antonio 4/29/ Institute for Cyber Security World-Leading Research.
1 Provenance-Based Access Control (PBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair April 15, 2016
Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support Yuan Cheng 1 , 2, Khalid Bijon 2, and Ravi Sandhu 1 Institute for.
Object-to-Object Relationship Based Access Control: Model and Multi-Cloud Demonstration Tahmina Ahmed, Farhan Patwa and Ravi Sandhu Department of Computer.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
Institute for Cyber Security
Chapter 6 Database Design
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Cloudward Bound: Planning for Beneficial Migration of Enterprise Applications to the Cloud B95b01023 鍾宇彥.
Cyber Security Research: A Personal Perspective
Presentation transcript:

A Provenance-based Access Control Model (PBAC) July 18, 2012 PST’12, Paris, France Jaehong Park, Dang Nguyen and Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio 1 Institute for Cyber Security World-leading research with real-world impact!

Provenance Data Information of operations/transactions performed against data objects and versions – Actions that were performed against data – Agents who performed actions on data – Data used for actions – Data generated from actions World-leading research with real-world impact! 2

Provenance-aware Systems Capturing/expressing provenance data Storing provenance data Querying provenance data Using provenance data Securing provenance data World-leading research with real-world impact! 3 Access Control

Access control in Provenance-aware Systems Provenance Access Control (PAC) – Controlling access to provenance data which could be more sensitive than the underlying data – Needs access control models/mechanisms (e.g, RBAC) – (Meaningful) control granularity? Right level of abstraction? Provenance-based Access Control (PBAC) – Using provenance data to control access to the underlying data – Provenance-based policy specification 4 Meaningful granularity of provenance data? World-leading research with real-world impact!

PBAC Access Controls in Provenance-aware Systems World-leading research with real-world impact! 5 PAC Prov-based PAC Prov-based PAC Role-based PAC Base PBAC Common Foundations: Base Provenance Data, DName (named abstraction) and matching DPath (Dependency Path Pattern) Common Foundations: Base Provenance Data, DName (named abstraction) and matching DPath (Dependency Path Pattern) Extended PBAC ………. Sanitization/Filtering/Redaction/…. Access control Prov Data Trust

PAC & PBAC in Applications Common Foundation – Base provenance data – Dependency list Dependency Name: meaningful, named abstraction matching regular expression-based causality dependency path pattern PAC and PBAC are complementary – In PAC, control decision can be based on provenance data (PB-PAC) – In PBAC, PAC can be used for added trustworthiness on provenance data 6 World-leading research with real-world impact!

Provenance Data Directed Acyclic Graph (DAG) Causality dependencies between entities (acting users, action processes and data objects) Dependency graph can be traced for extracting Origin, usage, versioning information, etc. PBAC can support origin/usage-based control, Dynamic Separation of Duty (DSOD), workflow control, etc. 7 World-leading research with real-world impact!

From Open Provenance Model (OPM) 3 Nodes – Artifact (ellipse) – Process (Rectangle) – Agent (Hexagon) 5 Causality dependency edges (not dataflow) 8 Provenance data: a set of 2 entities & 1 dependency E.g., (ag,p1,a1,a2):,, World-leading research with real-world impact!

Direct vs. Indirect Dependencies Direct dependencies – Used (u), wasGeneratedBy (g), wasControlledBy (c) – Captured from transactions as base provenance data Indirect dependencies – System-computable dependencies using pre-defined dependency names and matching dependency path patterns – User-declared dependencies using pre-defined dependency names 9 World-leading research with real-world impact!

Object Dependency List (DL O ) A set of pairs of – abstracted dependency names (DNAME) and – regular expression-based object dependency path patterns (DPATH) Examples – 10 World-leading research with real-world impact!

PBAC vs. PAC 11 World-leading research with real-world impact!

PBAC Model Components 12 World-leading research with real-world impact!

A Family of PBAC Models 13 World-leading research with real-world impact!

PBAC B : A Base Model System-captured Base Provenance Data only – Using only 3 direct dependencies (u, g, c) – No user-declared provenance data Object dependency only Policy is readily available – No policy retrieval required World-leading research with real-world impact! 14

Example: A Homework Grading System 1.Anyone can upload a homework. 2.A user can replace a homework if she uploaded it (origin-based control) and the homework is not submitted yet. 3.A user can submit a homework if she uploaded it and the homework is not submitted already. (workflow control) 4.A user can review a homework if she is not the author of the homework (DSOD), the user did not review the homework earlier, and the homework is submitted already but not graded yet. 5.A user can grade a homework if the homework is reviewed but not graded yet. 15 World-leading research with real-world impact!

Sample Transactions & Base Provenance Data (au1, upload1, o 1v1 ):, (au1, replace1, o 1v1, o 1v2 ):,, (au1, submit1, o 1v2, o 1v3 ):,, (au2, review1, o 1v3, o 2v1 ):,, (au3, grade1, o 1v3, o 3v1 ):,, 16 World-leading research with real-world impact!

A Sample Base Provenance Data 17

A Sample Base Provenance Data 18 wasReplacedVof DL O : wasReplacedVof DL O : wasSubmittedVof wasReviewedOof wasReviewedOby wasGradedOof

A Sample Base Provenance Data 19 wasAuthtoredBy DL O : wasAuthtoredBy DL O :

A Sample Base Provenance Data 20 wasReviewedBy DL O : wasReviewedBy DL O :

Sample Object Dependency List (DL O ) World-leading research with real-world impact!

Sample Policies 1.allow(au, upload, o) ⇒ true 2.allow(au, replace, o) ⇒ au ∈ (o, wasAuthoredBy) ∧ |(o,wasSubmittedVof)| = 0. 3.allow(au, submit, o) ⇒ au ∈ (o, wasAuthoredBy) ∧ |(o,wasSubmittedVof)|= Anyone can upload a homework. 2.A user can replace a homework if she uploaded it (origin- based control) and the homework is not submitted yet. 3.A user can submit a homework if she uploaded it and the homework is not submitted already. (workflow control) World-leading research with real-world impact!

Sample Policies (cont.) 4.allow(au, review, o) ⇒ au ∉ (o, wasAuthoredBy) ∧ au ∉ (o, wasReviewedBy) ∧ |(o, wasSubmittedV of)| ≠ 0 ∧ |(o,wasGradedOof −1 )| = 0. 5.allow(au, grade, o) ⇒ |(o, wasReviewedOof)| ≠ 0 ∧ |(o,wasGradedOof −1 )| = 0) A user can review a homework if she is not the author of the homework (DSOD), the user did not review the homework earlier, and the homework is submitted already but not graded yet. 5.A user can grade a homework if the homework is reviewed but not graded yet. World-leading research with real-world impact!

Access Evaluation Procedure Rule collecting phase User authorization (UAuth) phase Action validation (AVal) phase conjunctive decision of UAuth and AVal World-leading research with real-world impact! 24

Access Evaluation Example Policy: user can submit a homework if she uploaded it (origin-based control) and the homework is not submitted already. (workflow control) 25 World-leading research with real-world impact! (au1, submit2, o 1v3 ) au1

Rule Collecting Phase Request: (au1, submit2, o 1v3 ) Action type: submit Policy for submit – allow(au, submit, o) ⇒ au ∈ (o, wasAuthoredBy) ∧ |(o,wasSubmittedVof)| = 0. User authorization rule – au ∈ (o, wasAuthoredBy) Action Validation rule – |(o,wasSubmittedVof)| = 0 World-leading research with real-world impact! 26

User Authorization Phase User Authorization Rule: au ∈ (o, wasAuthoredBy) Dependency List (DL) –, – au1 ∈ (o1v3, [g submit.u input ]?.[g replace.u input ]*.g upload.c ) = {au1} World-leading research with real-world impact! 27 World-leading research with real-world impact! (au1, submit2, o 1v3 ) au1

Action Validation Phase Action Validation Rule: |(o,wasSubmittedVof)| = 0 Dependency List (DL): |(o1v3, g submit.u input )| ≠ 0 World-leading research with real-world impact! 28 World-leading research with real-world impact! (au1, submit2, o 1v3 ) au1

Summary Proposed a foundation for PBAC and PAC – the notion of named abstractions of causality dependency path patterns – Regular expression-based dependency path pattern Identified a Family of PBAC models Developed a Base model for PBAC – Supports Simple and effective policy specification and access control management – Supports DSOD, workflow control, origin-based control, usage-based control, object versioning, etc. 29 World-leading research with real-world impact!

What’s next? Enhancing/extending PBAC model Provenance Access Control Models Provenance data sharing in multiple systems 30 World-leading research with real-world impact!

Thank you! Questions and Comments? 31 World-leading research with real-world impact!