Privacy rules over JPEG images Jaime Delgado DMAG UPC BarcelonaTECH October 2015.

Slides:



Advertisements
Similar presentations
Can I Use It, and If so, How? Christian Lieske SAP AG – MultiLingual Technology Discussion of Consortium Proposal for OLIF2 File Header.
Advertisements

Access control for geospatial information objects using/extending the eXtensible Access Control Markup Language Andreas Matheus, Technische Universität.
® IBM Software Group © IBM Corporation WS-Policy Attachment- spec overview Maryann Hondo IBM.
NRL Security Architecture: A Web Services-Based Solution
METS: An Introduction Structuring Digital Content.
Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Dr Gordon Russell, Napier University Unit Data Dictionary 1 Data Dictionary Unit 5.3.
Content Types: Markup and Multimedia. Introduction Markup languages use extra textual syntax to encode: –Formatting / display information –Structure information.
16/3/2015 META ACCESS MANAGEMENT SYSTEM Implementing Authorised Access Dr. Erik Vullings MAMS Programme Manager
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
3. Technical and administrative metadata standards Metadata Standards and Applications.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Securing Web Services Using Semantic Web Technologies Brian Shields PhD Candidate, Department of Information Technology, National University of Ireland,
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Image Metadata Summary of 4/18/99 NISO/DLF Image Metadata Meeting ( Howard Besser UCLA School of Education & Information.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Universe Design Concepts Business Intelligence Copyright © SUPINFO. All rights reserved.
Chapter 1: The Database Environment
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Audumbar. Access control and privacy Who can access what, under what conditions, and for what purpose.
XACML 2.0 in the Enterprise: Use- Cases and Deployment Challenges Prateek Mishra, Frank Villavicencio, Rich Levinson Oracle Identity Management Group 02/07/2006.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
The Data Attribution Abdul Saboor PhD Research Student Model Base Development and Software Quality Assurance Research Group Freie.
Karolina Muszyńska. Reverse engineering - looking at the solution to figure out how it works Reverse engineering - breaking something down in order to.
LexEVS 6.0 Overview Scott Bauer Mayo Clinic Rochester, Minnesota February 2011.
Access Control for OGC Web Services with (Geo)XACML
Implementing an Integrated Digital Asset Management System: FEDORA and OAIS in Context Paul Bevan DAMS Implementation Manager
MPEG-21 : Overview MUMT 611 Doug Van Nort. Introduction Rather than audiovisual content, purpose is set of standards to deliver multimedia in secure environment.
WS-Security: SOAP Message Security Web-enhanced Information Management (WHIM) Justin R. Wang Professor Kaiser.
What is MOF? The Meta Object Facility (MOF) specification provides a set of CORBA interfaces that can be used to define and manipulate a set of interoperable.
SWIM-SUIT Information Models & Services
PREMIS Rathachai Chawuthai Information Management CSIM / AIT.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
Photo Album by User
11 Usage policies for end point access control  XACML is Oasis standard to express enterprise security policies with a common XML based policy language.
Secure Systems Research Group - FAU Patterns for Web Services Security Standards Presented by Keiko Hashizume.
Access Control and Markup Languages Pages 183 – 187 in the CISSP 1.
Conceptual Data Modelling for Digital Preservation Planets and PREMIS Angela Dappert.
Extensible Access Control Framework for Cloud Applications KTH-SEECS Applied Information Security Lab SEECS NUST Implementation Perspective.
Database Environment Chapter 2. Data Independence Sometimes the way data are physically organized depends on the requirements of the application. Result:
Proposal for RBAC Features for SDD James Falkner Sun Microsystems October 11, 2006.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS Instructor Ms. Arwa Binsaleh.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Secure Systems Research Group - FAU 1 A Trust Model for Web Services Ph.D Dissertation Progess Report Candidate: Nelly A. Delessy, Advisor: Dr E.B. Fernandez.
WIGOS Data model – standards introduction.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
Approaching Fine-grain Access Control for Distributed Biomedical Databases within Virtual Environments Onur Kalyoncu, Yi Pan, Matthias Assel High Performance.
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
Introducing WI Proposal about Authorization Architecture and Policy Group Name: WG4 Source: Wei Zhou, Datang, Meeting Date: Agenda Item:
UI's for inputting and presenting the metadata of hypermedia documents Kai Kuikkaniemi HUT T
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
Concepts and Realization of a Diagram Editor Generator Based on Hypergraph Transformation Author: Mark Minas Presenter: Song Gu.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
Yu, et al.’s “A Model-Driven Development Framework for Enterprise Web Services” In proceedings of the 10 th IEEE Intl Enterprise Distributed Object Computing.
Web Services Security Standards Dr. Phillip M. Hallam-Baker C.Eng. FBCS VeriSign Inc.
Rinke Hoekstra Use of OWL in the Legal Domain Statement of Interest OWLED 2008 DC, Gaithersburg.
Presented by: Sonali Pagade Nibha Dhagat paper1.pdf.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
CIS-2005 : Xi’an - China 1 A New Conceptual Framework within Information Privacy: Meta Privacy Mr. Geoff Skinner Dr Song Han Prof. Elizabeth Chang Curtin.
SysML 2.0 Model Lifecycle Management (MLM) Working Group
Daniel Amyot and Jun Biao Yan
9/22/2018.
JPEG Privacy & Security Introduction and Scope
Data Model.
This is the title of the project
Integration Environment
Meta-Data: the key to accessing Data and Information
Presentation transcript:

Privacy rules over JPEG images Jaime Delgado DMAG UPC BarcelonaTECH October 2015

Introduction  The objective: To control access to images (partial, complete, metadata).  The “tools”: Privacy policies.  The “mechanism”: Evaluation & enforcement of policies.

Introduction  The objective: To control access to images (partial, complete, metadata).  The “tools”: Privacy policies.  The “mechanism”: Evaluation & enforcement of policies.  The issues (for standardization) : How to express privacy rules. Authorization for access using privacy rules.

Main open issues to discuss  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,...  Authorization for access: Mechanism, formalization, what to standardize,...

Scope  Access control to specific images is defined with rules (privacy policies).  Policies are defined either by the service provider or by the image owner.  Policies/rules follow a standard for its representation and enforcement.

Privacy rules/policies  Rules / Policies could be based on conditions over information on:  User: individual, group, location, role, …  Context: date and time, number of accesses, action (view, download, …), …  Image: quality, geo-location, author, date, semantic information, …  Action: read, update, delete, …

Privacy rules/policies  Rules / Policies could be based on conditions over information on:  User: individual, group, location, role, …  Context: date and time, number of accesses, action (view, download, …), …  Image: quality, geo-location, author, date, semantic information, …  Action: read, update, delete, …

Privacy rules/policies example  A specific example could be: “only my workmates can see the Christmas Dinner photo album and only during this month”  In this case, the conditions are:  User: my workmates  Context: this month  Image: Christmas Dinner photo album  Action: read (“see”).

Additional features  Different parts of the image might have different privacy policies.  Access to specific metadata elements might be limited.  Provision of different levels of image quality based on roles or other conditions or context.  Time restricted (image can become unusable after certain period of time).  Images are physically kept in a specific repository or they are just referenced.

Main open issues to discuss (back)  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,...

Main open issues to discuss (back)  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,...

Main open issues to discuss (back)  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,... XACML XACML (eXtensible Access Control Markup Language)

What to standardize  Where to keep (XML) privacy policies.  RightsDescription element (JPSearch Part 2). Location of the rights description standard. Textual description. Actual rights description. It can be embedded or referenced.

What to standardize SOI APP1 (Exif) EOI Image data APP3 (JPSearch) Privacy metadata JPEG file

Main open issues to discuss (back)  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,...  Authorization for access: Mechanism, formalization, what to standardize,...

Main open issues to discuss (back)  Privacy rules: How to express them, level of detail, relationship to the images, what to standardize,...  Authorization for access: Mechanism, formalization, what to standardize,... - Rules validity. - Who does the enforcement? - Keep information on the encryption / decryption tools used.

What to standardize SOI APP1 (Exif) EOI Image data APP3 (JPSearch) Original JPEG file

What to standardize SOI APP1 (Exif) EOI SOI APP1 (Exif) EOI APP11 (protected Exif & JPSearch metadata) Image data APP11 (protected image data) APP3 (JPSearch) Privacy metadata Original JPEG file Protected JPEG file

Requirements for solutions  Express privacy policies at enough level of detail.  Include the policies (or a link to them) in the image file.  Provide for the evaluation of privacy policies to authorize or not the access to partial or complete metadata and image data.

Possible technologies  Privacy provision using external services:  Privacy policies included in the image, but only a reference to an external system.  External system handles everything:  Creation of the privacy policies  Protection of the images (keys managment)  Access to the privacy policies  Authorization of access to the images  etc.

MIPAMS architecture for a solution

Protection of an image with MIPAMS

Authorization of access to a protected image

Conclusions  Definition of privacy rules to control access to JPEG images.  XACML, a valid, already existing standard.  JPSearch metadata as placeholder for policies.  The highest possible level of granularity for rules.  One example of technology: “External” services.  FUTURE: JPEG Privacy & Security standards.

Privacy rules over JPEG images Jaime Delgado DMAG UPC BarcelonaTECH October 2015