Access Control & Digital Rights Management KAIST KSE Uichin Lee.

Slides:



Advertisements
Similar presentations
Operating System Security
Advertisements

Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
1 cs691 chow C. Edward Chow Confidentiality Policy CS691 – Chapter 5 of Matt Bishop.
Jan. 2014Dr. Yangjun Chen ACS Database security and authorization (Ch. 22, 3 rd ed. – Ch. 23, 4 th ed. – Ch. 24, 6 th )
Access Control Chapter 3 Part 3 Pages 209 to 227.
Access Control Methodologies
Access Control Patterns Fatemeh Imani Mehr Amirkabir university of technology, Department of Computer Engineering & Information Technology.
Database Security - Farkas 1 Database Security and Privacy.
Access Control Intro, DAC and MAC System Security.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Attribute Based Access Control
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Security Fall 2009McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Security Dale-Marie Wilson, Ph.D.. Why Database Security? Data Valuable resource Must be strictly controlled and managed Corporate resource Have strategic.
Security Fall 2006McFadyen ACS How do we protect the database from unauthorized access? Who can see employee salaries, student grades, … ? Who can.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 4: Access Control.
User Domain Policies.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Ciphertext-Policy, Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA.
Li Xiong CS573 Data Privacy and Security Access Control.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Chapter 3 Mohammad Fozlul Haque Bhuiyan Assistant Professor CITI Jahangirnagar University.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Storage Security and Management: Security Framework
ISOM MIS3150 Data and Info Mgmt Database Security Arijit Sengupta.
CS426Fall 2010/Lecture 191 Computer Security CS 426 Lecture 19 Discretionary Access Control.
Access Control & Digital Rights Management
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
General Key Management Guidance. Key Management Policy  Governs the lifecycle for the keying material  Hope to minimize additional required documentation.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Attribute-Based Encryption with Non-Monotonic Access Structures
CSCE 201 Introduction to Information Security Fall 2010 Access Control.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
G53SEC 1 Access Control principals, objects and their operations.
Li Xiong CS573 Data Privacy and Security Access Control.
Access Control. What is Access Control? The ability to allow only authorized users, programs or processes system or resource access The ability to disallow.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
Academic Year 2014 Spring Academic Year 2014 Spring.
Chapter 11 Database Security: An Introduction Copyright © 2004 Pearson Education, Inc.
COEN 350: Network Security Authorization. Fundamental Mechanisms: Access Matrix Subjects Objects (Subjects can be objects, too.) Access Rights Example:
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Trusted Operating Systems
Access Control: Policies and Mechanisms Vinod Ganapathy.
Privilege Management Chapter 22.
Computer Security: Principles and Practice
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Database Security. Introduction to Database Security Issues (1) Threats to databases Loss of integrity Loss of availability Loss of confidentiality To.
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Lecture 2 Page 1 CS 236 Online Security Policies Security policies describe how a secure system should behave Policy says what should happen, not how you.
MLS/MCS on SE Linux Russell Coker. What is SE Linux? A system for Mandatory Access Control (MAC) based on the Linux Security Modules (LSM) framework Uses.
Database System Implementation CSE 507
Key management issues in PGP
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Database Security and Authorization
OS Access Control Mauricio Sifontes.
Computer Security Access Control
Access Control What’s New?
Presentation transcript:

Access Control & Digital Rights Management KAIST KSE Uichin Lee

Objectives Access control: what, how? Digital rights management

Access Control Control user access to system resources May implement specific security policy – Organization policy – Government policy Requirements include – Restrict read access (confidentiality) – Restrict write access (integrity) – Restrict execute access (for applications)

Why Access Control? Limit authorized users access to resources they need, allowed to use Limit damage caused by – unauthorized users – malicious software, viruses Prevent interference between applications

General Model User requests access to resource – read, write or execute – e.g. Alice tries to open example.txt for editing Reference monitor – check validity of a request – grant or deny access accordingly

General Model Authorization Database Authentication Access Control Objects Security Administrator User Reference Monitor Auditing

Reference Monitor System process, module that controls access to system resources Required characteristics – completeness: always invoked, impossible to bypass – isolation: must be tamper proof – verifiability: must be shown to be properly implemented

Access Control Policy vs. Mechanism Policies: high level guidelines that determine how accesses are controlled and access decisions are determined Mechanisms: low-level software and hardware functions that can be configured to implement a policy

Access Matrix Subject, object, activity Authorization is expressed in terms of access rights or access modes (e.g., read, write, execute, own) File 1File 2File 3File 4 Account 1Account 2 John Own R, W Own R, W Inquiry Credit Alice R Own R, WWR Inquiry Debit Inquiry Credit Bob R, WR Own R, W Inquiry Debit

Implementation of Access Matrix Access matrix in reality: very large and sparse Two popular approaches: (1) access control list (ACL) for files and (2) capability lists of users File1 File2 File3 File4 John Alice Bob Capability lists of usersAccess control list for files

Access Control Policies DAC – Restricting access to objects based on the identity and need-to-know of the user, process, and/or groups to which they belong – Discretionary, in the sense that a subject is capable of passing certain access permission on to another subject [NCSC-TG-004] – Widely used in systems (Unix, Windows) MAC – Restricting access to objects based on fixed security attributes or “clearance labels” assigned to users and to files or other objects. – Mandatory, in the sense that controls cannot be modified by users or their programs [Bell & Lapadula] – Depends on system-enforced mechanisms that override the intentions of the resource owner – Widely used in government and DoD systems MAC and DAC are not mutually exclusive, and may be used in conjunction

DAC Policies User’s identity and authorizations (or rules) that specify the access modes (e.g., read, write, execute) on each object Each request of a user is checked against the specified authorizations Flow of information is possible: a user who is able to read data can pass it to other users not authorized to read it without the cognizance of the owner Example: Unix systems

MAC Policies Based on the classification of subjects and objects in the system Each user and each object in the system is assigned a security level – Object’s security level represents sensitivity of the information contained in the object (i.e., potential damage could result from unauthorized disclosure of the information) – User’s security level (or clearance) represents trustworthiness not to disclose sensitive information to users not cleared to see it

MAC Policies Example: military/government arenas: – Top Secret (TS), Secret (S), Confidential (C), and Unclassified (U) – Policy: TS > S > C > U Access to an object by a subject: – Read down: a subject’s clearance must dominate the security level of the object being read – Write up: a subject’s clearance must be dominated by the security level of the object being written

MAC Policies S subject writes a TS object (yet cannot read it)  can overwrite TS data! (still can send to TS subjects) – Many systems do not allow write-up, but limit writing to the same level as the subject S subject cannot write C or U data  S cannot send an to C or U users

Conventional Access Control Models Identity Based Access Control (IBAC) – Access permissions are directly associated with a subject (e.g. ACLs) – Difficult to scale Role Based Access Control (RBAC) [Sandhu 1993, NIST 2004] – Access permissions are based on the role(s) a subject is performing – Better scalability and ease of use, but also has drawbacks (more later) Lattice Based Access Control (LBAC) [Sandhu 1993] – Implemented in the US defense sector to address MAC requirements Subjects Roles Permissions Actions Resources Session Contexts Session Contexts User Assignment Permission Assignment Session Roles User Sessions

Attribute Based Access Control (ABAC) Subject Attributes – Associated with a subject (user, application, process) that defines the identity and characteristics of the subject – E.g. identifier, name, job title, role Resource Attributes – Associated with a resource (web service, system function, or data) – E.g. Dublin Core metadata elements Environment Attributes – Describes the operational, technical, or situational environment or context in which the information access occurs – E.g. current date time, current threat level, network security classification

ABAC Policy Formulation 1.S, R, and E are subjects, resources, and environments, respectively; 2.SA k (1  k  K), RA m (1  m  M), and EA n (1  n  N) are the pre-defined attributes for subjects, resources, and environments, respectively; 3.ATTR(s), ATTR(r), and ATTR(e) are attribute assignment relations for subject s, resource r, and environment e, respectively:

ABAC Policy Formulation (Cont’d) 4.We also use the function notation for the value assignment of individual attributes. For example: 5.In the most general form, a Policy Rule that decides on whether a subject s can access a resource r in a particular environment e, is a Boolean function of s, r, and e’s attributes: Role(s) = “Service Consumer” ServiceOwner(r) = “XYZ, Inc.” CurrentDate(e) = “ ” The access control decision process in essence amounts to the evaluation of applicable policy rules in the policy store.

ABAC Policy Rule Examples Modeling conventional RBAC rules: – “User with role ‘Manager’ may access the ‘ApprovePurchase’ web service” Modeling richer access control semantics – “A resource may only be accessed by its owners” Modeling mandatory access control – “Classified files can be accessed by users with equal or higher clearance”

CP-ABE: Ciphertext-Policy Attribute-Based Encryption Brent Waters SRI International John Bethencourt CMU Amit Sahai UCLA IEEE Symposium on Security and Privacy (SP), 2007

22 What is Ciphertext-Policy Attribute-Based Encryption (CP-ABE)? Type of identity-based encryption – One public key – Master private key used to make more restricted private keys But very expressive rules for which private keys can decrypt which ciphertexts – Private keys have “attributes” or labels – Ciphertexts have decryption policies

23 Remote File Storage: Interesting Challenges Scalability Reliability … But we also want security

24 Good: – Flexible access policies Bad: – Data vulnerable to compromise – Must trust security of server Remote File Storage: Server Mediated Access Control Access control list: Kevin, Dave, and anyone in IT department Sarah: IT department, backup manager ?

25 More secure, but loss of flexibility New key for each file: – Must be online to distribute keys Many files with same key: – Fine grained access control not possible Remote File Storage: Encrypting the Files

26 Remote File Storage: We Want It All Wishlist: – Encrypted files for untrusted storage – Setting up keys is offline – No online, trusted party mediating access to files or keys – Highly expressive, fine grained access policies Ciphertext-policy attribute-based encryption does this! – User private keys given list of “attributes” – Files can encrypted under “policy” over those attributes – Can only decrypt if attributes satisfy policy

27 Remove File Storage: Access Control via CP-ABE Public Key MSK SecretKey Sarah : “manager” “IT dept.” SecretKey Kevin : “manager” “sales” OR IT dept. AND managermarketing    

28 Collusion Attacks: The Key Threat Important potential attack Users should not be able to combine keys Essential, almost defining property of ABE Main technical trick of our scheme: preventing collusion SK Sarah : “A”, “C” SK Kevin : “B”, “D” AND AB ?

$ cpabe-setup $ cpabe-keygen -o sarah_priv_key pub_key master_key \ sysadmin it_dept 'office = 1431' 'hire_date = 2002' $ cpabe-enc pub_key security_report.pdf (sysadmin and (hire_date < 2005 or security_team)) or 2 of (executive_level >= 5, audit_group, strategy_team)) 29 Implementation: The cp-abe Toolkit

Digital Rights Management S.R. Subramanya and Byung K. Yi IEEE Potential 2006

DRM Broadly refers to a set of policies, techniques and tools that guide the proper use of digital content

DRM Facilitate packaging of raw content into an appropriate form for easy distribution – Offline (CD/DVD), online (CDN, P2P) Track and protect the content for temper- proof transmission Protect content from unauthorized use Enable specifications of suitable rights

DRM Architecture Potable, networked devices (sometimes with local DRM agent) Superdistribution: P2P distribution (yet, authorization is needed via a license server) Content Protection: Encryption or Digital watermarking

DRM Operation Example