INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,

Slides:



Advertisements
Similar presentations
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Advertisements

Stale-Safe Security Properties for Secure Information Sharing Ram Krishnan (GMU) Jianwei Niu (UT San Antonio) Ravi Sandhu (UT San Antonio) William Winsborough.
Institute for Cyber Security
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
Ram Krishnan PhD Candidate Dissertation Directors: Dr. Ravi Sandhu and Dr. Daniel Menascé Group-Centric Secure Information Sharing Models Dissertation.
1 Access Control Models Prof. Ravi Sandhu Executive Director and Endowed Chair January 25, 2013 & February 1, 2013
11 World-Leading Research with Real-World Impact! Integrated Provenance Data for Access Control in Group-centric Collaboration Dang Nguyen, Jaehong Park.
1 The Challenge of Data and Application Security and Privacy (DASPY): Are We Up to It? Ravi Sandhu Executive Director and Endowed Professor February 21,
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11
1 The Future of Access Control: Attributes, Automation and Adaptation Prof. Ravi Sandhu Executive Director and Endowed Chair S&P Symposium IIT Kanpur March.
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
1 Security and Trust Convergence: Attributes, Relations and Provenance Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown.
Attribute-Based Access Control Models and Beyond
1 Plenary Panel on Cloud Security and Privacy: What is new and What needs to be done? Ravi Sandhu Executive Director and Endowed Professor December 2010.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Privacy and Access Control: How are These Two Concepts Related? Prof. Ravi Sandhu Executive Director and Endowed Chair SACMAT Panel June 3, 2015
Dynasis Secure Group Information Sharing System ADVISOR: DR. AWAIS SHIBLI CO-ADVISOR: DR. ABDUL GHAFOOR GROUP MEMBERS: MANSOOR AHMED SAIF ULLAH YASIR.
11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
1 The Challenge of Data and Application Security and Privacy (DASPY) Ravi Sandhu Executive Director and Endowed Professor March 23, 2011
11 World-Leading Research with Real-World Impact! A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems Khalid Zaman Bijon,
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
1 Institute for Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair February 4, 2015
INSTITUTE FOR CYBER SECURITY © Ravi Sandhu11 Group-Centric Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber.
1 Big Data Applications in Cloud and Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Professor UTSA COB Symposium on Big Data, Big Challenges.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
1 The Future of Cyber Security Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
INSTITUTE FOR CYBER SECURITY 1 The PEI Framework for Application-Centric Security Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
1 Cloud Computing and Security Prof. Ravi Sandhu Executive Director and Endowed Chair April 19, © Ravi Sandhu.
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor April 2010
INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
Application-Centric Security Models
Preserving User Privacy from Third-party Applications in Online Social Networks Yuan Cheng, Jaehong Park and Ravi Sandhu Institute for Cyber Security University.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
A Conceptual Framework for Group-Centric Secure Information Sharing Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough.
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing Ram Krishnan and Ravi Sandhu University of Texas at San.
1 Panel on Data Usage Management: Technology or Regulation? Prof. Ravi Sandhu Executive Director and Endowed Chair DUMA 2013 May 23, 2013
1 Security and Privacy in Human-Centric Computing and Big Data Management Prof. Ravi Sandhu Executive Director and Endowed Chair CODASPY 2013 February.
1 Open Discussion PSOSM 2012 Prof. Ravi Sandhu Executive Director and Endowed Chair © Ravi Sandhu.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
Ram Krishnan (George Mason University) Ravi Sandhu, Jianwei Niu, William Winsborough (University of Texas at San Antonio) Foundations for Group-Centric.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Past, Present and Future
Attribute-Based Access Control: Insights and Challenges
Cyber Security Research: Applied and Basic Combined*
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Cyber Security Research: Applied and Basic Combined*
Security and Privacy in the Age of the Internet of Things:
Intersection of Data, Policy and Privacy
Attribute-Based Access Control: Insights and Challenges
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Access Control Evolution and Prospects
Access Control Evolution and Prospects
Presentation transcript:

INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate, George Mason University Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security University of Texas at San Antonio August © Ravi Sandhu1World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Outline Motivation for g-SIS g-SIS Enforcement Architecture Micro vs Super-distribution in g-SIS Hybrid g-SIS Architecture Comparison Conclusion © Ravi Sandhu2 World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Secure Information Sharing (SIS) SIS: Share but protect Traditional models capture important SIS aspects BUT have serious shortcomings  Discretionary Access Control (owner control) Too fine-grained, lacks copy/usage control  Lattice-Based Access Control (information flow) Too rigid, coarse-grained and binary  Role-Based Access Control (effective administration) Attribute-Based Access Control (implicit/automated administration) Usage Control (mutable attributes, continuous enforcement, obligations) Do not directly address information sharing Primary issues  Copy/usage control  Manageability  Purpose © Ravi Sandhu 3 World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Dissemination-Centric Sharing Extensive research in the last two decades  ORCON, DRM, ERM, XrML, ODRL, etc. Copy/usage control: major attention Manageability and purpose: hardly any attention 4 AliceBobCharlieEveFred Attributes + Policy Object Attributes + Policy Object Attributes + Policy Object Attributes + Policy Object Dissemination Chain with Sticky Policies on Objects Attributes + Policy © Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Group-Centric Sharing (g-SIS) Brings users & objects together in a group  Focus on manageability and purpose  Co-exists with dissemination-centric  Two metaphors Secure Meeting Room (E.g. Program committee) Subscription Model (E.g. Secure multicast) Operational aspects  Group characteristics E.g. What core properties are required of all groups?  Group operation semantics E.g. What precisely is authorized by join, add, etc.?  Is there additional structure within the group E.g. Security levels, roles, sub-groups? Administrative aspects  E.g. Who authorizes join, add, etc.? Multiple groups  Inter-group relationship 5 Group Authz (u,o,r)? join leave add remove Users Objects © Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Roles vs Groups in SIS Roles  Users get same set of privileges on role assignment  Temporal aspects of roles have been studied E.g., when can a role can be activated, what pre-requisite roles need to be activated first Groups  Privileges may differ with time of join, leave, etc.  Groups are a unit of purpose-oriented sharing  Inter-group relationship differ from that of roles 6© Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY g-SIS Architecture 7 User Attributes: {id, Join_TS, Leave_TS, ORL, gKey, usageCount} Object Attributes: {id, Add_TS} Policy: Key Features: Trusted Clients Offline Access © Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Super vs Micro-distribution in g-SIS 8 Super-Distribution (SD) Micro-Distribution (MD) Scalability/Performance  SD: Encrypt once, access where authorized  MD: Custom encrypt for each user on initial access Assurance/Recourse  SD: Compromise one client, compromise group key  MD: Compromise of one client contained to objects on that client © Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Hybrid Approach Split-key RSA  Decryption key split into two parts  Different split for each group user  One split held by CC, other split shared with user 9© Ravi Sandhu World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Comparison 10© Ravi Sandhu SD – Super-Distribution MD – Micro-Distribution World-leading research with real-world impact!

INSTITUTE FOR CYBER SECURITY Conclusion Group-Centric vs Dissemination-Centric Sharing g-SIS Enforcement Architecture  Super-Distribution (SD) vs Micro-Distribution (MD)  Hybrid approach using public key cryptography with split private keys Hybrid approach offers a mix of  Usability and performance advantages of Super-Distribution  Better compromise containment of Micro-Distribution 11© Ravi Sandhu World-leading research with real-world impact!