MULTILATERAL SECURITY. Based on chapter 9 of Security Engineering by Ross Anderson



Similar documents
Database and Data Mining Security

DATA MINING - 1DL360

DATA MINING - 1DL105, 1DL025

Mandatory Access Control

Computer Security (EDA263 / DIT 641)

Database Security. Database Security Requirements

Chapter 23. Database Security. Security Issues. Database Security

Computer Security (EDA263 / DIT 641)

Access Control Matrix

CSC 405 Introduction to Computer Security

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Database Security. Soon M. Chung Department of Computer Science and Engineering Wright State University

INFO/CS 330: Applied Database Systems

Access Control Models Part I. Murat Kantarcioglu UT Dallas

Principles of Computer Security. Dr George Danezis

Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set

Chapter 23. Database Security. Security Issues. Database Security

Advanced Cryptography

DATABASE SECURITY - ATTACKS AND CONTROL METHODS

Security and Authorization. Introduction to DB Security. Access Controls. Chapter 21

Trusted RUBIX TM. Version 6. Multilevel Security in Trusted RUBIX White Paper. Revision 2 RELATIONAL DATABASE MANAGEMENT SYSTEM TEL

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Database Security. Chapter 21

In-house performance review of salaried GPs

Myths and Facts about the Cyber Intelligence Sharing and Protection Act (CISPA)

Role Based Access Control (RBAC) Nicola Zannone

Pretty Good Privacy (PGP)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Online Reputation in a Connected World

Arnab Roy Fujitsu Laboratories of America and CSA Big Data WG

Cloud Security. Let s Open the Box. Abu Shohel Ahmed ahmed.shohel@ericsson.com NomadicLab, Ericsson Research

Top Ten Security and Privacy Challenges for Big Data and Smartgrids. Arnab Roy Fujitsu Laboratories of America

International Journal on Recent and Innovation Trends in Computing and Communication ISSN Volume: 1 Issue: DATABASE SECURITY

Database Security. The Need for Database Security

Covert Channels. Some instances of use: Hotels that block specific ports Countries that block some access

Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0

Computer Security: Principles and Practice

CS346: Advanced Databases

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Federal Bureau of Investigation

CSE543 - Introduction to Computer and Network Security. Module: Access Control

Access Control. Dr George Danezis

CYBER RISK INTERNATIONAL COMPANY PROFILE

SECURITY CHAPTER 24 (6/E) CHAPTER 23 (5/E)

Cyber security Building confidence in your digital future

Security and privacy for multimedia database management systems

Protecting Mobile Networks from SS7 Attacks. Telesoft White Papers

Juniper Networks Secure

Business Intelligence meets Big Data: An Overview on Security and Privacy

Confinement Problem. The confinement problem Isolating entities. Example Problem. Server balances bank accounts for clients Server security issues:

>

Security Model and Enforcement for Data-Centric Pub/Sub with High Information Assurance Requirements

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

PUF Physical Unclonable Functions

Names and Numbers. Computer & Internet Forensic #2 อ.รว ท ต ภ หลำ

(Big) Data Anonymization Claude Castelluccia Inria, Privatics

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Information Security

Tor Anonymity Network & Traffic Analysis. Presented by Peter Likarish

INFORMATION ABOUT FILING A WHISTLEBLOWER DISCLOSURE WITH THE OFFICE OF SPECIAL COUNSEL IMPORTANT

EXECUTIVE ORDER State of Maryland Substance Abuse Policy

Report: An Analysis of US Government Proposed Cyber Incentives. Author: Joe Stuntz, MBA EP 14, McDonough School of Business

Weighted Total Mark. Weighted Exam Mark

AS Sociology. The theoretical, practical and ethical considerations influencing the choice of topic, choice of method(s) and the conduct of research.

DIGITAL REVOLUTION DISRUPTIVE INNOVATION AND SUSTAINABLE BUSINESS

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

PALANTIR & LAW ENFORCEMENT

Security Issues with the Military Use of Cellular Technology Brad Long, Director of Engineering, IFONE, Inc.

Hypothesis testing. c 2014, Jeffrey S. Simonoff 1

Auditing a Web Application. Brad Ruppert. SANS Technology Institute GWAS Presentation 1

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

bigdata Managing Scale in Ontological Systems

Transcription:

MULTILATERAL SECURITY Based on chapter 9 of Security Engineering by Ross Anderson עומר פפרו Paparo Presenter: Omer

Outline Introduction Motivation Data flow models Compartmentation and the lattice model The Chinese wall model The British Medical Association (BMA) model Inference control What is Inference control? Control types Limitations of generic approaches The residual problem Summary

What is multilateral security? In one sentence: controlling information flow across a database or shared data Ideally, anyone will have access to exactly what he needs, and nothing more This is not so easy, as we will See Centralization of systems makes this issue critical Credit: Security Engineering by Ross Anderson Credit: Security Engineering by Ross Anderson

The many faces of our adversary Loss of sensitive information is dangerous Medical, intelligence, individuals private information is sensitive Motivation of attacker can vary Military superiority, commercial use, blackmail and even worse Adversary types An individual inside an organization An individual outside of organization that used a policy exploit Attacks Countless. Comes in all sizes, shapes and colors

Compartmentation and the lattice model Problem: Clearance levels just are not enough Add codewords Basic idea: accessing the information requires both clearance and membership in the suitable group Information flows in a lattice like manner Each two nodes A, B can be in a dominance relation, A > B or B > A, but they do not have to be Credit: physics.bu.edu

Compartmentation and the lattice model continued An individual from compartment A may access information from compartment B if and only if A dominates B Credit: Security Engineering by Ross Anderson

Compartmentation and the lattice model continued Issues: Data derived from two compartments effectively creates a third compartment Information sharing or searching becomes a hard task Needs additional information on how to sanitize subjects with high clearance back to lower compartments Credit: datamining.typepad.com

The Chinese wall model Problem: Some services firms provides services to companies or organizations that are in competition Need to prevent conflict of interests inside the firm Solution: Chinese walls

The Chinese wall model continued Chinese walls: rules to prevent conflicts of interests E.g., a partner who has worked recently for one company in a business sector may not see the papers of any other company in that sector Credit: alpenrosewealth.com

The Chinese wall model continued This can raise interesting questions Is two competing companies A and B are both clients of the same investment bank, is B s data truly inaccessible to A? Maybe they can gather information from side channels? Credit: mangolianbox.com

The British medical association (BMA) model Threat model: Medical information is often quite controversial Needs to be available on one hand (especially on emergencies) Can be very sensitive on the other hand Also, use secondary uses can have privacy and ethical issues Centralization is a double-edge sword more and more public agencies will come up with arguments why they need access to the data Credit: communityhealthpartnership.co.uk

The British medical association (BMA) model continued Security policy first solution attempt: multilevel E.g., AIDS database would be secret, patient records are classified, drug prescriptions are restricted Based on a single Electronic Patient Record (EPR) This had several problems: The levels division is not always a clean cut Single EPR is often not a good idea Credit: wikipedia.org

The British medical association (BMA) model continued Security policy outline: Patient consent to information access is mandatory Prevent too many people from getting access to too many identifiable records Basic principles: Each patient will have several records Each record has an access control list Every change in the access list must be approved by the patient There shall be effective measures to prevent the aggregation of personal health information Credit: wikipedia.org Arstechnica.com

What is inference control? Medical information, for example, is often released for research purposes Information needs to be anonymous Remove names and other identifiers, this should be enough! Nope Inference is the ability to deduce information From the given database alone or combined with another Of course, we do not want to restrict the queries more than needed Credit: pixgood.com

Control types Query set size control E.g., specify a minimum query size Trackers control Solving this issue involves serious restrictions on the queries More sophisticated query controls E.g., n-respondent, k%-dominance rule Person A B C D E Drugs bought 55 32 16 5 4 For n=3 and k=75, the answer for the query Total number of drugs bought (=112) will be rejected

Control types continued Cell suppression: E.g., Credit: Security Engineering by Ross Anderson Credit: Security Engineering by Ross Anderson

Control types continued Maximum order control Limit the number of attributes in a query Reject queries that would partition the sample population into too many sets Query overlap control Randomization Perturbation Random sample queries

Limitations of generic approaches Specific applications will have specific inference attacks E.g., a system used for analyzing trends in drug prescribing The general case is harder Active attacks Credit: Security Engineering by Ross Anderson Where users have the ability to insert or delete records into the database

The residual problem Ok, so we know what data to protect We know good ways to protect it In the immediate context, such as an hospital for medical data In the secondary context, such as for research

The residual problem - continued But we have many real-life problems Determining the sensitivity level of the information Excluding single points of failure Other problems dictated by real needs E.g., processing medical claims for payment by the insurance companies Credit: Dilbert.com

Summary Sensitive information is priceless Multilateral security has many sides and aspects Attacks types are countless and keep evolving, especially when it comes to inference attacks When it comes to designing a multilateral security policy, it is almost impossible to create a watertight solution Still, we must not give up

Questions?