CladICT & the Different Types of Information - Tutorial

Similar documents
Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set

CS346: Advanced Databases

Recap: Tracking Anonymous Peer-to- Peer VoIP Calls on the Internet. Scott E. Coull and Amos Wetherbee April 7, 2006

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

Overview of Information Security. Murat Kantarcioglu

MACs Message authentication and integrity. Table of contents

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Policy-based Pre-Processing in Hadoop

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Obfuscation of sensitive data in network flows 1

An Introduction to Information Theory

CPSC 467b: Cryptography and Computer Security

Chapter 23. Database Security. Security Issues. Database Security

Security/Privacy Models for "Internet of things": What should be studied from RFID schemes? Daisuke Moriyama and Shin ichiro Matsuo NICT, Japan

On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments

National Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

DATA MINING - 1DL360

Datasäkerhet och integritet

Secure information flow: opportunities and challenges for security & forensics

Mobile & Security? Brice Mees Security Services Operations Manager

Database and Data Mining Security

Introduction to Learning & Decision Trees

Large-Scale IP Traceback in High-Speed Internet

Catch Me If You Can: A Practical Framework to Evade Censorship in Information-Centric Networks

Capacity Limits of MIMO Channels

Using Adversary Structures to Analyze Network Models,

IoT Security Platform

What is a secret? Ruth Nelson

Computer Security (EDA263 / DIT 641)

Course Title: Penetration Testing: Network Threat Testing, 1st Edition

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

How To Research Security And Privacy Using Data Science

Privacy and Security in the Internet of Things: Theory and Practice. Bob Baxley; HitB; 28 May 2015

Privacy Issues and Data Protection in Technology Enhanced Learning. Seda Gürses COSIC, K.U. Leuven datatel 2011 Alpines Rendez-vous

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

SSARES: Secure Searchable Automated Remote

CPSC 467: Cryptography and Computer Security

Towards Privacy aware Big Data analytics

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Protecting Regulated Information in Cloud Storage with DLP

Hang Seng HSBCnet Security. May 2016

Chapter 23. Database Security. Security Issues. Database Security

Aircloak Analytics: Anonymized User Data without Data Loss

CHASE Survey on 6 Most Important Topics in Hardware Security

SENSE Security overview 2014

Defining and Enforcing Privacy in Data Sharing

Network Security Technology Network Management

SQuAD: Application Security Testing

Vulnerability Assessment for Middleware

Research Data Administration in CITIES Project

The Data Quality Continuum*

Project 2: Firewall Design (Phase I)

Privacy Policy. Effective Date: November 20, 2014

Big Data and Privacy. Fritz Henglein Dept. of Computer Science, University of Copenhagen. Finance IT Day Riga,

Security Issues for the Semantic Web

Big Data Security Challenges and Recommendations

Signature Schemes. CSG 252 Fall Riccardo Pucella

FREQUENCY RESPONSE ANALYZERS

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

A Novel Frame Work to Detect Malicious Attacks in Web Applications

A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Key Agreement from Close Secrets over Unsecured Channels Winter 2010

Traffic Analysis. Scott E. Coull RedJack, LLC. Silver Spring, MD USA. Side-channel attack, information theory, cryptanalysis, covert channel analysis

Mutual Anonymous Communications: A New Covert Channel Based on Splitting Tree MAC

Audit Logging. Overall Goals

ICTN Enterprise Database Security Issues and Solutions

Analyzing HTTP/HTTPS Traffic Logs

Ex. 2.1 (Davide Basilio Bartolini)

Trusted Platforms for Homeland Security

Report cover page. Report title: Description: Generated on: Generated by: Date filter: Event logs: Other filters: Signature: Reviewed by:

Information Security in Big Data using Encryption and Decryption

A Framework for Secure and Verifiable Logging in Public Communication Networks

ARX A Comprehensive Tool for Anonymizing Biomedical Data

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

Ph.D.-FSTC The Faculty of Sciences, Technology and Communication DISSERTATION. Defense held on 09/06/2009 in Luxembourg

Information, Entropy, and Coding

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

Revolutionized DB2 Test Data Management

An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels

Big Data, Big Risk, Big Rewards. Hussein Syed

NetApp FAS Hybrid Array Flash Efficiency. Silverton Consulting, Inc. StorInt Briefing

Computer Security (EDA263 / DIT 641)

Entropy and Mutual Information

Mobile Healthcare Security Whitepaper

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Towards a Tight Finite Key Analysis for BB84

Risk Assessment Guide

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Survey of Research on Information Security in Big Data

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Design. Syntactic Issues

3 day Workshop on Cyber Security & Ethical Hacking

QUIRE: : Lightweight Provenance for Smart Phone Operating Systems

Separating Agreement from Execution for Byzantine Fault-Tolerant Services

24 th IEEE Annual Computer Communications Workshop (CCW)

Security and privacy for multimedia database management systems

Transcription:

Michael Clarkson and Fred B. Schneider Cornell University RADICAL May 10, 2010

Goal Information-theoretic Quantification of programs impact on Integrity of Information [Denning 1982] (relationship to database privacy) Clarkson: Quantification of Integrity 2

What is Integrity? Databases: Constraints that relations must satisfy Provenance of data Utility of anonymized data Common Criteria: Protection of assets from unauthorized modification Biba (1977): Guarantee that a subsystem will perform as it was intended; Isolation necessary for protection from subversion; Dual to confidentiality no universal definition Clarkson: Quantification of Integrity 3

Our Notions of Integrity Corruption: damage to integrity Starting Point Taint analysis Program correctness Corruption Measure Contamination Suppression Contamination: bad information present in output Suppression: good information lost from output distinct, but interact Clarkson: Quantification of Integrity 4

Contamination Goal: model taint analysis untrusted trusted Attacker User Program Attacker User Untrusted input contaminates trusted output Clarkson: Quantification of Integrity 5

Contamination o:=(t,u) u contaminates o (Can t u be filtered from o?) Clarkson: Quantification of Integrity 6

Quantification of Contamination Use information theory: information is surprise X, Y, Z: distributions I(X,Y): mutual information between X and Y (in bits) I(X,Y Z): conditional mutual information Clarkson: Quantification of Integrity 7

Quantification of Contamination U in untrusted trusted Attacker User Program Attacker User T in T out Contamination = I(U in,t out T in ) [Newsome et al. 2009] Dual of [Clark et al. 2005, 2007] Clarkson: Quantification of Integrity 8

Example of Contamination o:=(t,u) Contamination = I(U, O T) = k bits if U is uniform on [0,2 k -1] Clarkson: Quantification of Integrity 9

Our Notions of Integrity Corruption: damage to integrity Starting Point Taint analysis Program correctness Corruption Measure Contamination Suppression Contamination: bad information present in output Suppression: good information lost from output Clarkson: Quantification of Integrity 10

Program Suppression Goal: model program (in)correctness Sender Specification correct Receiver untrusted Attacker Attacker Implementation trusted Sender real Receiver Information about correct output is suppressed from real output Clarkson: Quantification of Integrity 11

Example of Program Suppression Spec. for (i=0; i<m; i++) { s := s + a[i]; } a[0..m-1]: trusted Impl. 1 Impl. 2 for (i=1; i<m; i++) { s := s + a[i]; } for (i=0; i<=m; i++) { s := s + a[i]; } Suppression a[0] missing No contamination Suppression a[m] added Contamination Clarkson: Quantification of Integrity 12

Suppression vs. Contamination output := input Contamination Attacker Attacker * * Suppression Clarkson: Quantification of Integrity 13

Quantification of Program Suppression In Spec Sender Specification Receiver untrusted trusted Attacker Sender U in T in Implementation Impl Attacker Receiver Program transmission = I(Spec, Impl) Clarkson: Quantification of Integrity 14

Quantification of Program Suppression H(X): entropy (uncertainty) of X H(X Y): conditional entropy of X given Y Program Transmission = I(Spec, Impl) Info actually learned about Spec by observing Impl = H(Spec) H(Spec Impl) Total info to learn about Spec Info NOT learned about Spec by observing Impl Clarkson: Quantification of Integrity 15

Quantification of Program Suppression H(X): entropy (uncertainty) of X H(X Y): conditional entropy of X given Y Program Transmission = I(Spec, Impl) = H(Spec) H(Spec Impl) Program Suppression = H(Spec Impl) Clarkson: Quantification of Integrity 16

Example of Program Suppression Spec. for (i=0; i<m; i++) { s := s + a[i]; } Impl. 1 Impl. 2 for (i=1; i<m; i++) { s := s + a[i]; } for (i=0; i<=m; i++) { s := s + a[i]; } Suppression = H(A) Suppression H(A) A = distribution of individual array elements Clarkson: Quantification of Integrity 17

Suppression and Confidentiality Declassifier: program that reveals (leaks) some information; suppresses rest Leakage: [Denning 1982, Millen 1987, Gray 1991, Lowe 2002, Clark et al. 2005, 2007, Clarkson et al. 2005, McCamant & Ernst 2008, Backes et al. 2009] m. Leakage + Suppression is a constant What isn t leaked is suppressed Clarkson: Quantification of Integrity 18

Database Privacy Statistical database anonymizes query results: Database response Anonymizer User query User anonymized response sacrifices utility for privacy s sake suppresses to avoid leakage sacrifices integrity for confidentiality s sake Clarkson: Quantification of Integrity 19

k-anonymity DB: Every individual must be anonymous within set of size k. [Sweeney 2002] Programs: Every output corresponds to k inputs. But what about background knowledge? no bound on leakage no bound on suppression Clarkson: Quantification of Integrity 20

L-diversity DB: Every individual s sensitive information should appear to have L (roughly) equally likely values. [Machanavajjhala et al. 2007] Entropy L-diversity: H(anon. block) log L [Øhrn and Ohno-Machado 1999, Machanavajjhala et al. 2007] Program: H(T in t out ) log L implies suppression log L (if T in uniform) Clarkson: Quantification of Integrity 21

Summary Measures of information corruption: Contamination (generalizes taint analysis) Suppression (generalizes program correctness) Application: database privacy (model anonymizers; relate utility and privacy) Clarkson: Quantification of Integrity 22

More Integrity Measures Channel suppression same as channel model from information theory, but with attacker Attacker- and program-controlled suppression Belief-based measures [Clarkson et al. 2005] generalize information-theoretic measures Granularity: Average over all executions Single executions Sequences of executions Clarkson: Quantification of Integrity 23