INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 Trust Evidence in Heterogeneous Environments: Towards a Research Agenda Ravi Sandhu Executive Director and Endowed Professor May 2010
INSTITUTE FOR CYBER SECURITY 1 The PEI + UCON Framework for Application Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
Institute for Cyber Security
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
Ram Krishnan PhD Candidate Dissertation Directors: Dr. Ravi Sandhu and Dr. Daniel Menascé Group-Centric Secure Information Sharing Models Dissertation.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 Grand Challenges in Data Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair
Attribute-Based Access Control Models and Beyond
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing Ram Krishnan and Ravi Sandhu University of Texas at San.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
1 Usage Control (UCON) or ABAC on Steroids Prof. Ravi Sandhu Executive Director and Endowed Chair February 26, 2016
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Introduction and Basic Concepts
Identity and Access Control in the
Executive Director and Endowed Chair
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Application-Centric Security
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Cyber Security R&D: A Personal Perspective
Access Control Evolution and Prospects
Presentation transcript:

INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio May © Ravi Sandhu PEI = Policy, Enforcement, Implementation

INSTITUTE FOR CYBER SECURITY Application Context Our Basic Premise There can be no security without application context Orange Book and Rainbow Series era ( ) Opposite Premise Application context makes high assurance security impossible to achieve  May need to settle for “reasonable” assurance or “good- enough” security  Its about “mission assurance” not “information assurance” © Ravi Sandhu2

INSTITUTE FOR CYBER SECURITY Rainbow Series 34 titles listed in Wikipedia as the “most significant Rainbow series books” Only 1 addresses applications  Trusted Database Interpretation (TDI)  Scope: “Trusted Applications in general and database management system in particular” © Ravi Sandhu3

INSTITUTE FOR CYBER SECURITY Application Context Software- ArchitectProject% TimeLabel AliceVista25%U AliceSecureVista75%S BobXP100%U What precisely is Secret?  There exists a SecureVista project  Alice works on SecureVista  Alice’s effort on SecureVista is 75%  All or some of the above How do we maintain integrity of the database?  Depends © Ravi Sandhu4 Much work and $$$ by researchers and vendors, late 80’s-early 90’s

INSTITUTE FOR CYBER SECURITY Orange/Rainbow Fatal Flaws Enforcement of 1-way information flow in a lattice is not the dominant concern for most applications Avoiding covert channels is not the highest priority for most applications Exclusion of cryptography is not a smart decision for securing distributed systems © Ravi Sandhu5 The Common Criteria, an ISO standard, and successor to the Orange Book has its own problems

INSTITUTE FOR CYBER SECURITY Post-Orange Era Firewalls, patch cycle, vulnerability scanners, intrusion detection, intrusion prevention, Identity Management, Federation, SSL, VPNs, PKI, etc Emergence and dominance of RBAC over MAC and DAC Emergence of highly motivated, sophisticated and innovative attackers © Ravi Sandhu6

INSTITUTE FOR CYBER SECURITY Emerging Application-Centric Era (ACE) © Ravi Sandhu7 ECE Enterprise-Centric Era (Orange/Rainbow Era Post-Orange Era) ACE Application-Centric Era Applications are cyber analogs of previously existing enterprise-centric applications on-line banking brokerage e-retail auctions search engines Future applications will be fundamentally different ?

INSTITUTE FOR CYBER SECURITY ACE Characteristics Multi-party interests Fuzzy security objectives Attack/threat models © Ravi Sandhu8

INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers © Ravi Sandhu9

INSTITUTE FOR CYBER SECURITY Secure Information Sharing (SIS) A fundamental problem in cyber security – Share but protect Current approaches not satisfactory Classic models (DAC/MAC/RBAC) do not work Recent approaches Proprietary systems for Enterprise Rights Management Many solutions: IBM, CA, Oracle, Sun, Authentica, etc. Interoperability is a major issue Many languages have been standardized XrML, ODRL, XACML, etc. Primarily, dissemination or object centric © Ravi Sandhu10

INSTITUTE FOR CYBER SECURITY Dissemination Centric Sharing Attach attributes and policies to objects  Objects are associated with sticky policies  XrML, ODRL, XACML, etc. provide sticky policies AliceBobCharlieRaviShashi Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Attribute + Policy Cloud Object Dissemination Chain with Sticky Policies on Objects Attribute Cloud © Ravi Sandhu11

INSTITUTE FOR CYBER SECURITY Group Centric Sharing (g-SIS) Advocates bringing users & objects together in a group  In practice, co-exists with dissemination centric sharing Never Group Subject Leave Current Group Subject Past Group Subject Join Never Group Object Remove Current Group Object Past Group Object Add Two useful metaphors – Secure Meeting/Document Room Users’ access may depend on their participation period E.g. Program committee meeting, Collaborative Product Development, Merger and Acquisition, etc. – Subscription Model Access to content may depend on when the subscription began E.g. Magazine Subscription, Secure Multicast, etc. © Ravi Sandhu12

INSTITUTE FOR CYBER SECURITY Core g-SIS Properties JoinAdd Authz AddJoin Authz 1. Provenance: Authorization can only originate during a simultaneous period of membership 2. Bounded Authorization: Authorization cannot grow during non- membership periods 3. Persistence: Authorization cannot change if no group event occurs

INSTITUTE FOR CYBER SECURITY g-SIS Operation Semantics 14 GROUP Authz (S,O,R)? Join Leave Add Remove Subjects Objects GROUP Authz (S,O,R)? Strict Join Strict Leave Liberal Add Liberal Remove Liberal Join Liberal Leave Strict Add Strict Remove Subjects Objects © Ravi Sandhu14

INSTITUTE FOR CYBER SECURITY Operation Semantics (Continued) Strict Join (SJ): Only access objects added after Join time Liberal Join (LJ): Also access objects added before Join time Strict Leave (SL): Lose access to all objects Liberal Leave (LL): Retain authorizations held at Leave time © Ravi Sandhu15

INSTITUTE FOR CYBER SECURITY Operation Semantics (Continued) 16 Strict Add (SA): Only accessible by existing subjects Liberal Add (LA): No such restrictions Strict Remove (SR): All subjects lose access Liberal Remove (LR): Subjects who had authorization at Remove time can retain access

INSTITUTE FOR CYBER SECURITY Family of g-SIS Models 17 Most Restrictive g-SIS Specification: Traditional Groups: Secure Multicast:

INSTITUTE FOR CYBER SECURITY PEI Models: 3 Layers/5 Layers © Ravi Sandhu18

INSTITUTE FOR CYBER SECURITY Concept of Stale-Safety AIP ADP AEP AIP: Authorization Information Point Update ADP: Authorization Decision Point AEP: Authorization Enforcement Point © Ravi Sandhu19

INSTITUTE FOR CYBER SECURITY g-SIS Enforcement Architecture/Models Allows offline access Assumes a Trusted Reference Monitor (TRM)  Resides on group subject’s access machine  Enforces group policy  Synchronizes attributes periodically with server Objects available via Super-Distribution  Encrypt once, read wherever authorized © Ravi Sandhu20

INSTITUTE FOR CYBER SECURITY g-SIS Never Group Subject Current Group Subject Past Group Subject Join Add Join Never Group Object Current Group Object Past Group Object Add Remove Leave Time of Join NULL Join-TS Leave-TS Time of Join Time of Leave Time of Add NULL Add-TS Remove-TS Time of Add Time of Remove Authz (s,o,r) Add-TS(o) > Join-TS(s) & Leave-TS(s) = NULL & Remove-TS(o) = NULL Subject Attributes Object Attributes © Ravi Sandhu21

INSTITUTE FOR CYBER SECURITY g-SIS Architecture CC GA Group Subjects TR M … 1. Read Objects 5.1 Request Refresh 5.2 Update Attributes 3.1 Subject Leave (s) 4.1 Object Remove (o) 3.2 Set Leave-TS (s) 4.2 Add o to ORL CC: Control Center GA: Group Administrator Subject Attributes: {id, Join-TS, Leave- TS, ORL, gKey} ORL: Object Revocation List gKey: Group Key Object Attributes: {id, Add- TS} Refresh Time (RT): TRM contacts CC to update attributes © Ravi Sandhu22

INSTITUTE FOR CYBER SECURITY Staleness in g-SIS RT 0 RT 1 RT 2 RT 3 Join (s) Add (o1) Add (o2) Leave (s) Request (s, o1, r) Request (s, o2, r) Authz (s,o,r) Add-TS(o) > Join-TS(s) & Leave-TS(s) = NULL & o NotIn ORL Was authorized at recent RT Was never authorized RT: Refresh Time RT 4 © Ravi Sandhu23

INSTITUTE FOR CYBER SECURITY Stale-Safe Security Properties Weak Stale-Safety  Allows (safe) authorization decision to made without contacting the CC  Achieved by requiring that authorization was TRUE at the most recent refresh time Strong Stale-Safety  Need to obtain up to date authorization information from CC after a request is received  If CC is not available decision cannot be made 24

INSTITUTE FOR CYBER SECURITY Properties RTPerform Stale-unsafe Decision RequestPerform Request Perform Weak Stale-Safety: Strong Stale-Safety: 25 Formula JoinAdd Authz

INSTITUTE FOR CYBER SECURITY Conclusion Security tools for a brave new world ACE PEI UCON © Ravi Sandhu26