MULTILATERAL SECURITY. Based on chapter 9 of Security Engineering by Ross Anderson
|
|
|
- Alexander Logan
- 10 years ago
- Views:
Transcription
1 MULTILATERAL SECURITY Based on chapter 9 of Security Engineering by Ross Anderson עומר פפרו Paparo Presenter: Omer
2 Outline Introduction Motivation Data flow models Compartmentation and the lattice model The Chinese wall model The British Medical Association (BMA) model Inference control What is Inference control? Control types Limitations of generic approaches The residual problem Summary
3 What is multilateral security? In one sentence: controlling information flow across a database or shared data Ideally, anyone will have access to exactly what he needs, and nothing more This is not so easy, as we will See Centralization of systems makes this issue critical Credit: Security Engineering by Ross Anderson Credit: Security Engineering by Ross Anderson
4 The many faces of our adversary Loss of sensitive information is dangerous Medical, intelligence, individuals private information is sensitive Motivation of attacker can vary Military superiority, commercial use, blackmail and even worse Adversary types An individual inside an organization An individual outside of organization that used a policy exploit Attacks Countless. Comes in all sizes, shapes and colors
5 Compartmentation and the lattice model Problem: Clearance levels just are not enough Add codewords Basic idea: accessing the information requires both clearance and membership in the suitable group Information flows in a lattice like manner Each two nodes A, B can be in a dominance relation, A > B or B > A, but they do not have to be Credit: physics.bu.edu
6 Compartmentation and the lattice model continued An individual from compartment A may access information from compartment B if and only if A dominates B Credit: Security Engineering by Ross Anderson
7 Compartmentation and the lattice model continued Issues: Data derived from two compartments effectively creates a third compartment Information sharing or searching becomes a hard task Needs additional information on how to sanitize subjects with high clearance back to lower compartments Credit: datamining.typepad.com
8 The Chinese wall model Problem: Some services firms provides services to companies or organizations that are in competition Need to prevent conflict of interests inside the firm Solution: Chinese walls
9 The Chinese wall model continued Chinese walls: rules to prevent conflicts of interests E.g., a partner who has worked recently for one company in a business sector may not see the papers of any other company in that sector Credit: alpenrosewealth.com
10 The Chinese wall model continued This can raise interesting questions Is two competing companies A and B are both clients of the same investment bank, is B s data truly inaccessible to A? Maybe they can gather information from side channels? Credit: mangolianbox.com
11 The British medical association (BMA) model Threat model: Medical information is often quite controversial Needs to be available on one hand (especially on emergencies) Can be very sensitive on the other hand Also, use secondary uses can have privacy and ethical issues Centralization is a double-edge sword more and more public agencies will come up with arguments why they need access to the data Credit: communityhealthpartnership.co.uk
12 The British medical association (BMA) model continued Security policy first solution attempt: multilevel E.g., AIDS database would be secret, patient records are classified, drug prescriptions are restricted Based on a single Electronic Patient Record (EPR) This had several problems: The levels division is not always a clean cut Single EPR is often not a good idea Credit: wikipedia.org
13 The British medical association (BMA) model continued Security policy outline: Patient consent to information access is mandatory Prevent too many people from getting access to too many identifiable records Basic principles: Each patient will have several records Each record has an access control list Every change in the access list must be approved by the patient There shall be effective measures to prevent the aggregation of personal health information Credit: wikipedia.org Arstechnica.com
14 What is inference control? Medical information, for example, is often released for research purposes Information needs to be anonymous Remove names and other identifiers, this should be enough! Nope Inference is the ability to deduce information From the given database alone or combined with another Of course, we do not want to restrict the queries more than needed Credit: pixgood.com
15 Control types Query set size control E.g., specify a minimum query size Trackers control Solving this issue involves serious restrictions on the queries More sophisticated query controls E.g., n-respondent, k%-dominance rule Person A B C D E Drugs bought For n=3 and k=75, the answer for the query Total number of drugs bought (=112) will be rejected
16 Control types continued Cell suppression: E.g., Credit: Security Engineering by Ross Anderson Credit: Security Engineering by Ross Anderson
17 Control types continued Maximum order control Limit the number of attributes in a query Reject queries that would partition the sample population into too many sets Query overlap control Randomization Perturbation Random sample queries
18 Limitations of generic approaches Specific applications will have specific inference attacks E.g., a system used for analyzing trends in drug prescribing The general case is harder Active attacks Credit: Security Engineering by Ross Anderson Where users have the ability to insert or delete records into the database
19 The residual problem Ok, so we know what data to protect We know good ways to protect it In the immediate context, such as an hospital for medical data In the secondary context, such as for research
20 The residual problem - continued But we have many real-life problems Determining the sensitivity level of the information Excluding single points of failure Other problems dictated by real needs E.g., processing medical claims for payment by the insurance companies Credit: Dilbert.com
21 Summary Sensitive information is priceless Multilateral security has many sides and aspects Attacks types are countless and keep evolving, especially when it comes to inference attacks When it comes to designing a multilateral security policy, it is almost impossible to create a watertight solution Still, we must not give up
22 Questions?
Database and Data Mining Security
Database and Data Mining Security 1 Threats/Protections to the System 1. External procedures security clearance of personnel password protection controlling application programs Audit 2. Physical environment
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
DATA MINING - 1DL105, 1DL025
DATA MINING - 1DL105, 1DL025 Fall 2009 An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/ht09 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Mandatory Access Control
CIS/CSE 643: Computer Security (Syracuse University) MAC: 1 1 Why need MAC DAC: Discretionary Access Control Mandatory Access Control Definition: An individual user can set an access control mechanism
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture 12: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to databases
Database Security. Database Security Requirements
Database Security Laurie Williams [email protected] John Slankas [email protected] Physical database integrity Logical database integrity Element integrity Auditability Access Control User Authentication
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Computer Security (EDA263 / DIT 641)
Computer Security (EDA263 / DIT 641) Lecture in EDA263: Database Security Erland Jonsson Department of Computer Science and Engineering Chalmers University of Technology Sweden Outline Introduction to
Access Control Matrix
Access Control Matrix List all proceses and files in a matrix Each row is a process ( subject ) Each column is a file ( object ) Each matrix entry is the access rights that subject has for that object
CSC 405 Introduction to Computer Security
omputer Science S 45 Introduction to omputer Security Topic 6.: Database Inference ontrol Outline Inference attacks Direct attacks (no inference needed) Indirect attacks via aggregations Tracker attacks
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 Security Analytics Crypto and Privacy Technologies Infrastructure Security 60+ members Framework and Taxonomy Chair - Sree Rajan, Fujitsu
Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected].
Database Security Soon M. Chung Department of Computer Science and Engineering Wright State University [email protected] 937-775-5119 Goals of DB Security Integrity: Only authorized users should be
INFO/CS 330: Applied Database Systems
INFO/CS 330: Applied Database Systems Introduction to Database Security Johannes Gehrke [email protected] http://www.cs.cornell.edu/johannes Introduction to DB Security Secrecy:Users should not be
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
Principles of Computer Security. Dr George Danezis ([email protected])
Principles of Computer Security Dr George Danezis ([email protected]) Why SecAppDev? Learning security on the job is necessary. However, Foundations: Principles. (Today) Access control. Advances: Privacy-friendly
Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set
Database security André Zúquete Security 1 Advantages of using databases Shared access Many users use one common, centralized data set Minimal redundancy Individual users do not have to collect and maintain
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
DATABASE SECURITY - ATTACKS AND CONTROL METHODS
DATABASE SECURITY - ATTACKS AND CONTROL METHODS Emil BURTESCU 1 PhD, Associate Professor, Department of Accounting and Management Informatics, University of Pitesti, Pitesti, Romania E-mail: [email protected],
Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21
Security and Authorization Chapter 21 Database Management Systems, 3ed, R. Ramakrishnan and J. Gehrke 1 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed
Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL +1-202-412-0152
Trusted RUBIX TM Version 6 Multilevel Security in Trusted RUBIX White Paper Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM Infosystems Technology, Inc. 4 Professional Dr - Suite 118 Gaithersburg, MD
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Database Security. Chapter 21
Database Security Chapter 21 Introduction to DB Security Secrecy: Users should not be able to see things they are not supposed to. E.g., A student can t see other students grades. Integrity: Users should
In-house performance review of salaried GPs
March 2008 In-house performance review of salaried GPs Guidance for GPs In-house performance review of salaried GPs Introduction An in-house performance review (IHPR) of salaried GPs can be valuable to
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)
Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA) MYTH: The cyber threat is being exaggerated. FACT: Cyber attacks are a huge threat to American lives, national security,
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Online Reputation in a Connected World
Online Reputation in a Connected World Abstract This research examines the expanding role of online reputation in both professional and personal lives. It studies how recruiters and HR professionals use
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG
Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG 1 The Big Data Working Group (BDWG) will be identifying scalable techniques for data-centric security and privacy problems. BDWG s investigation
Cloud Security. Let s Open the Box. Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research
t Cloud Security Let s Open the Box t Abu Shohel Ahmed [email protected] NomadicLab, Ericsson Research Facts about Ericsson Ericsson is a world-leading provider of telecommunication equipment and
Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America
1 Top Ten Security and Privacy Challenges for Big Data and Smartgrids Arnab Roy Fujitsu Laboratories of America 2 User Roles and Security Concerns [SKCP11] Users and Security Concerns [SKCP10] Utilities:
International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 8169. Volume: 1 Issue: 1 23 28 DATABASE SECURITY
DATABASE SECURITY Kamaljeet Kaur Computer Science & Engineering Department Guru Nanak Dev Engg. College, Ludhiana. Punjab-India [email protected] Abstract Ensuring the security of databases is a complex
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access
Covert Channels Covert Channels Tunnels that are used to bypass filters and intrusion detection systems Use traffic that is thought to be something else (i.e. DNS tunnels) Can also provide encryption (i.e.
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0 Guidance Document Prepared by: PCORnet Data Privacy Task Force Submitted to the PMO Approved by the PMO Submitted
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 5 Database Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Database Security 1 Relational Databases constructed
CS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea [email protected] Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
Federal Bureau of Investigation
Federal Bureau of Investigation SSA John Caruthers Cyber Criminal Section SSA Kenneth Schmutz Cyber National Security Section April 11, 2012 FBI Mission Cyber Threats FBI Response 1. Protect the United
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
Access Control. Dr George Danezis ([email protected])
Access Control Dr George Danezis ([email protected]) Resources Key paper: Carl E. Landwehr: Formal Models for Computer Security. ACM Comput. Surv. 13(3): 247-278 (1981) See references to other optional
CYBER RISK INTERNATIONAL COMPANY PROFILE
CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)
SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E) 2 LECTURE OUTLINE Threats and countermeasures Access control mechanisms SQL s grant and revoke Role of views 3 THREATS What are the threats? Loss of integrity
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Security and privacy for multimedia database management systems
Multimed Tools Appl (2007) 33:13 29 DOI 10.1007/s11042-006-0096-1 Security and privacy for multimedia database management systems Bhavani Thuraisingham Published online: 1 March 2007 # Springer Science
Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers
Protecting Mobile Networks from SS7 Attacks Telesoft White Papers Christian Feest 23rd June 2015 SS7 Networks The Challenge The problem with the current SS7 system is that messages can be altered, injected
Juniper Networks Secure
White Paper Juniper Networks Secure Development Lifecycle Six Practices for Improving Product Security Copyright 2013, Juniper Networks, Inc. 1 Table of Contents Executive Summary...3 Introduction...3
Business Intelligence meets Big Data: An Overview on Security and Privacy
Business Intelligence meets Big Data: An Overview on Security and Privacy Claudio A. Ardagna Ernesto Damiani Dipartimento di Informatica - Università degli Studi di Milano NSF Workshop on Big Data Security
Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:
Confinement Problem The confinement problem Isolating entities Virtual machines Sandboxes Covert channels Mitigation 1 Example Problem Server balances bank accounts for clients Server security issues:
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements
Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements Sebastian Staamann, Director Security Products, PrismTech OMG's Eighth Workshop on Distributed Object
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing
Storm Clouds Rising: Security Challenges for IaaS Cloud Computing Brian Hay Kara Nance Matt Bishop Department of Computer Science Department of Computer Science Department of Computer Science University
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
Names and Numbers. Computer & Internet Forensic #2 อ.รว ท ต ภ หลำ
Computer & Internet Forensic #2 Names and Numbers อ.รว ท ต ภ หลำ SIGMA Research Laboratory & Department of Computing Faculty of Science, Silpakorn University [email protected] Contents Computer & Internet
(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
Information Security
Information Security Dr. Vedat Coşkun Malardalen September 15th, 2009 08:00 10:00 [email protected] www.isikun.edu.tr/~vedatcoskun What needs to be secured? With the rapid advances in networked
Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish
Tor Anonymity Network & Traffic Analysis Presented by Peter Likarish This is NOT the presenter s original work. This talk reviews: Tor: The Second Generation Onion Router Dingledine, Mathewson, Syverson
INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL IMPORTANT
U.S. OFFICE OF SPECIAL COUNSEL Form OSC-12 (202) 254-3640 / (800) 572-2249 OMB Control No. 3255-0002 Exp. Date: 2/28/14 INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL
EXECUTIVE ORDER 01.01.1991.16 State of Maryland Substance Abuse Policy
01.01.1991.16 EXECUTIVE ORDER 01.01.1991.16 State of Maryland Substance Abuse Policy A. Definitions. In this Executive Order the following words have the meanings indicated: (1) "Substance" means alcohol
Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business
S 2 ERC Project: Cyber Threat Intelligence Exchange Ecosystem: Economic Analysis Report: An Analysis of US Government Proposed Cyber Incentives Author: Joe Stuntz, MBA EP 14, McDonough School of Business
Weighted Total Mark. Weighted Exam Mark
CMP4103 Computer Systems and Network Security Period per Week Contact Hour per Semester Weighted Total Mark Weighted Exam Mark Weighted Continuous Assessment Mark Credit Units LH PH TH CH WTM WEM WCM CU
AS Sociology. The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research.
AS Sociology Revision Sociological Methods The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research. Chris. Livesey 2006: www.sociology.org.uk
DIGITAL REVOLUTION DISRUPTIVE INNOVATION AND SUSTAINABLE BUSINESS
DIGITAL REVOLUTION DISRUPTIVE INNOVATION AND SUSTAINABLE BUSINESS 1 FOREWORD Ten years ago, in most countries in Europe, most customers opened accounts at the bank with a branch nearest to their home,
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
PALANTIR & LAW ENFORCEMENT
100 Hamilton Avenue Palo Alto, California 94301 PALANTIR & LAW ENFORCEMENT Protecting Privacy and Civil Liberties TABLE OF CONTENTS Introduction Solution Overview Privacy Protective Technology Enforcing
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.
Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc. Executive Summary IFONE provides securable private cellular networks. It presents this paper
Hypothesis testing. c 2014, Jeffrey S. Simonoff 1
Hypothesis testing So far, we ve talked about inference from the point of estimation. We ve tried to answer questions like What is a good estimate for a typical value? or How much variability is there
Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1
Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation 1 Objectives Define why application vulnerabilities exist Address Auditing Approach Discuss Information Interfaces Walk
Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus
Department of Computer & Information Sciences INFO-450: Information Systems Security Syllabus Course Description This course provides a deep and comprehensive study of the security principles and practices
bigdata Managing Scale in Ontological Systems
Managing Scale in Ontological Systems 1 This presentation offers a brief look scale in ontological (semantic) systems, tradeoffs in expressivity and data scale, and both information and systems architectural
