+ All Categories
Home > Documents > Cyber-Identity, Authority and Trust in an Uncertain World

Cyber-Identity, Authority and Trust in an Uncertain World

Date post: 19-Mar-2016
Category:
Upload: druce
View: 25 times
Download: 2 times
Share this document with a friend
Description:
Cyber-Identity, Authority and Trust in an Uncertain World. Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]. Outline. Perspective on security Role Based Access Control (RBAC) - PowerPoint PPT Presentation
42
Cyber-Identity, Authority and Trust in an Uncertain World Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected]
Transcript
Page 1: Cyber-Identity, Authority and Trust in an Uncertain World

Cyber-Identity, Authority and Trust in an Uncertain World

Prof. Ravi SandhuLaboratory for Information Security

TechnologyGeorge Mason University

[email protected]

Page 2: Cyber-Identity, Authority and Trust in an Uncertain World

2

Outline Perspective on security Role Based Access Control (RBAC) Objective Model-Architecture

Mechanism (OM-AM) Framework Usage Control (UCON) Discussion

Page 3: Cyber-Identity, Authority and Trust in an Uncertain World

PERSPECTIVE

Page 4: Cyber-Identity, Authority and Trust in an Uncertain World

4

Security Conundrum Nobody knows WHAT security is Some of us do know HOW to

implement pieces of it

Result: hammers in search of nails

Page 5: Cyber-Identity, Authority and Trust in an Uncertain World

5

Security Confusion

INTEGRITYmodification

AVAILABILITYaccess

CONFIDENTIALITYdisclosure

USAGEpurpose

• electronic commerce, electronic business• DRM, client-side controls

Page 6: Cyber-Identity, Authority and Trust in an Uncertain World

6

Security Successes On-line banking On-line trading Automatic teller machines (ATMs) GSM phones Set-top boxes

Success is largely unrecognizedby the security community

Page 7: Cyber-Identity, Authority and Trust in an Uncertain World

7

Good enough security Exceeding good enough is not

good You will pay a price in user

convenience, ease of operation, cost, performance, availability, …

There is no such thing as free security Determining good enough is hard

Necessarily a moving target

Page 8: Cyber-Identity, Authority and Trust in an Uncertain World

8

Good enough security

EASY SECURE

COST

Security geeksReal-world users

System owner

• whose security• perception or reality of security

• end users• operations staff• help desk

• system solution• operational cost• opportunity cost• cost of fraud

Page 9: Cyber-Identity, Authority and Trust in an Uncertain World

9

Good enough security In many cases good enough is

achievable at a pretty low threshold The “entrepreneurial” mindset

In extreme cases good enough will require a painfully high threshold The “academic” mindset

Page 10: Cyber-Identity, Authority and Trust in an Uncertain World

ROLE-BASED ACCESS CONTROL (RBAC)

Page 11: Cyber-Identity, Authority and Trust in an Uncertain World

11

MAC and DAC For 25 years access control has

been divided into Mandatory Access Control (MAC) Discretionary Access Control (DAC)

In the past 10 years RBAC has become a dominant force RBAC subsumes MAC and DAC

Page 12: Cyber-Identity, Authority and Trust in an Uncertain World

12

Mandatory Access Control (MAC)

TS

S

C

U

InformationFlow

Dominance

Lattice ofsecuritylabels

Page 13: Cyber-Identity, Authority and Trust in an Uncertain World

13

Mandatory Access Control (MAC)

InformationFlow

DominanceLattice ofsecuritylabels

S,{A,B}

S,{A] S,{B}

S,{}

Page 14: Cyber-Identity, Authority and Trust in an Uncertain World

14

Discretionary Access Control (DAC) The owner of a resource

determines access to that resource The owner is often the creator of the

resource Fails to distinguish read from copy

Page 15: Cyber-Identity, Authority and Trust in an Uncertain World

15

RBAC96 model(Currently foundation of an NIST/ANSI/ISO standard)

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 16: Cyber-Identity, Authority and Trust in an Uncertain World

16

RBAC SECURITY PRINCIPLES least privilege separation of duties separation of administration and

access abstract operations

Page 17: Cyber-Identity, Authority and Trust in an Uncertain World

17

HIERARCHICAL ROLES

Health-Care Provider

Physician

Primary-CarePhysician

SpecialistPhysician

Page 18: Cyber-Identity, Authority and Trust in an Uncertain World

18

Fundamental Theorem of RBAC RBAC can be configured to do MAC RBAC can be configured to do DAC

RBAC is policy neutral

Page 19: Cyber-Identity, Authority and Trust in an Uncertain World

OM-AM(Objective/Model-Architecture/Mechanism)Framework

Page 20: Cyber-Identity, Authority and Trust in an Uncertain World

20

THE OM-AM WAY

ObjectivesModelArchitectureMechanism

What?

How?

Assurance

Page 21: Cyber-Identity, Authority and Trust in an Uncertain World

21

LAYERS AND LAYERS Multics rings Layered abstractions Waterfall model Network protocol stacks Napolean layers RoFi layers OM-AM etcetera

Page 22: Cyber-Identity, Authority and Trust in an Uncertain World

22

OM-AM AND MANDATORY ACCESS CONTROL (MAC)

What?

How?

No information leakageLattices (Bell-LaPadula)

Security kernelSecurity labels

Assurance

Page 23: Cyber-Identity, Authority and Trust in an Uncertain World

23

OM-AM AND DISCRETIONARY ACCESS CONTROL (DAC)

What?

How?

Owner-based discretionnumerousnumerous

ACLs, Capabilities, etc

Assurance

Page 24: Cyber-Identity, Authority and Trust in an Uncertain World

24

OM-AM AND ROLE-BASED ACCESS CONTROL (RBAC)

What?

How?

Objective neutralRBAC96, ARBAC97, etc.

user-pull, server-pull, etc.certificates, tickets, PACs, etc.

Assurance

Page 25: Cyber-Identity, Authority and Trust in an Uncertain World

25

RBAC96 Model

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 26: Cyber-Identity, Authority and Trust in an Uncertain World

26

Server-Pull Architecture

Client Server

User-roleAuthorizationServer

Page 27: Cyber-Identity, Authority and Trust in an Uncertain World

27

User-Pull Architecture

Client Server

User-roleAuthorizationServer

Page 28: Cyber-Identity, Authority and Trust in an Uncertain World

28

Proxy-Based Architecture

Client ServerProxyServer

User-roleAuthorizationServer

Page 29: Cyber-Identity, Authority and Trust in an Uncertain World

USAGE CONTROL (UCON)

Page 30: Cyber-Identity, Authority and Trust in an Uncertain World

30

The UCON Vision:A unified model

Traditional access control models are not adequate for today’s distributed, network-connected digital environment. Authorization only – No obligation or condition

based control Decision is made before access – No ongoing

control No consumable rights - No mutable attributes Rights are pre-defined and granted to subjects

Page 31: Cyber-Identity, Authority and Trust in an Uncertain World

31

OM-AM layered Approach

ABC core models for UCON

What ?

How ?

Assurance

Objective

Mechanism

Architecture

Model

Policy Neutral

ABC model

CRM/SRM, CDID architectures

DRM technologies, certificates, etc.

OM-AM Framework Usage Control System

Page 32: Cyber-Identity, Authority and Trust in an Uncertain World

32

Prior Work Problem-specific enhancement to

traditional access control Digital Rights Management (DRM)

mainly focus on intellectual property rights protection. Architecture and Mechanism level studies, Functional

specification languages – Lack of access control model Trust Management

Authorization for strangers’ access based on credentials

Page 33: Cyber-Identity, Authority and Trust in an Uncertain World

33

Prior Work Incrementally enhanced models

Provisional authorization [Kudo & Hada, 2000]

EACL [Ryutov & Neuman, 2001] Task-based Access Control [Thomas &

Sandhu, 1997] Ponder [Damianou et al., 2001]

Page 34: Cyber-Identity, Authority and Trust in an Uncertain World

34

Usage Control (UCON) Coverage

Protection Objectives

Sensitive information protection

IPR protection Privacy protection

Protection Architectures

Server-side reference monitor

Client-side reference monitor

SRM & CRMServer-sideReference Monitor

(SRM)

Client-sideReference Monitor

(CRM)

TraditionalAccessControl

TrustManagement

Usage ControlSensitive

InformationProtection

IntellectualProperty Rights

Protection

PrivacyProtection

DRM

SRM & CRM

Page 35: Cyber-Identity, Authority and Trust in an Uncertain World

35

Building ABC Models

Rights(R)

UsageDecision

Authoriza-tions (A)

Subjects(S)

Objects(O)

Subject Attributes(ATT(S))

Object Attributes(ATT(O))

Obligations(B)

Conditions(C)

Continuity Decision can be made during usage for continuous enforcement

MutabilityAttributes can be updated as side-effects of subjects’ actions

Usage

Continuity ofDecisions

pre

Before After

ongoing N/A

pre ongoing postMutability of

Attributes

Page 36: Cyber-Identity, Authority and Trust in an Uncertain World

36

Examples Long-distance phone (pre-authorization

with post-update) Pre-paid phone card (ongoing-

authorization with ongoing-update) Pay-per-view (pre-authorization with pre-

updates) Click Ad within every 30 minutes

(ongoing-obligation with ongoing-updates) Business Hour (pre-/ongoing-condition)

Page 37: Cyber-Identity, Authority and Trust in an Uncertain World

37

Beyond the ABC Core Models

Objects(O)

ConsumerSubjects

(CS)

ProviderSubjects

(PS) SerialUsage Controls

Usage Control

IdentifieeSubjects

(IS)

ParallelUsage Controls

Page 38: Cyber-Identity, Authority and Trust in an Uncertain World

38

UCON Architectures We narrow down our

focus so we can discuss in detail how UCON can be realized in architecture level

Sensitive information protection X CRM

First systematic study for generalized security architectures for digital information dissemination

Architectures can be extended to include payment function

Server-sideReference Monitor

(SRM)

Client-sideReference Monitor

(CRM)

SensitiveInformationProtection

IntellectualProperty Rights

Protection

PrivacyProtection

SRM & CRM

UCONArchitectures

DRM

TrustManagement

TraditionalAccessControl

Page 39: Cyber-Identity, Authority and Trust in an Uncertain World

39

Three Factors of Security Architectures

Virtual Machine (VM) runs on top of vulnerable computing

environment and has control functions Control Set (CS)

A list of access rights and usage rules Fixed, embedded, and external control set

Distribution Style Message Push (MP), External Repository (ER)

style

Page 40: Cyber-Identity, Authority and Trust in an Uncertain World

40

Architecture TaxonomyVM: Virtual MachineCS: Control SetMP: Message PushER: External Repository NC1: No control architecture w/ MP NC2: No control architecture w/ ERFC1: Fixed control architecture w/ MP FC2: Fixed control architecture w/ ER EC1: Embedded control architecture w/

MPEC2: Embedded control architecture w/

ERXC1: External control architecture w/ MP XC2: External control architecture w/ ER

w/o VM w/ VM

MP ER

MPMPMP ERERER

Fixed CS Embedded CS External CS

NC1 NC2

FC1 FC2 EC1 EC2 XC1 XC2

Page 41: Cyber-Identity, Authority and Trust in an Uncertain World

41

Conclusion Perspective on security Role Based Access Control (RBAC) Objective Model-Architecture

Mechanism (OM-AM) Framework Usage Control (UCON) Discussion

Page 42: Cyber-Identity, Authority and Trust in an Uncertain World

42

Radical Shifts: get realFocus on what needs to be done rather than how it is to be

done real-word business requirements rather than hypothetical

academic scenarios the 80% problem rather than the 120% problem

soft and informal rather than hard and formal constructing the policy rather than auditing the policy constructive safety via policy articulation and evolution rather

than post-facto algorithmic safety ordinary consumers as end-users and administrators

rather than techno-geeks or math-geeks


Recommended