Data exchange between organizations is becoming an increasingly significant issue due to the great opportunities it presents. However, there is great reluctance to share if data sovereignty is not provided. Providing ...
详细信息
Data exchange between organizations is becoming an increasingly significant issue due to the great opportunities it presents. However, there is great reluctance to share if data sovereignty is not provided. Providing it calls for not only access control but also usagecontrol implemented in distributed systems. Access control is a research field where there has been a great deal of work, but usagecontrol, especially implemented in distributed systems as distributed usage control (DUC), is a very new field of research that presents great challenges. Moreover, little is known about what challenges must really be faced and how they must be addressed. This is evidenced by the fact that existing research has focused non-specifically on different features of DUC, which are not formalized. Therefore, the path for the development of DUC solutions is unclear and it is difficult to analyze the scope of data sovereignty attained by the wide range of DUC solutions. In this context, this article is based on an initial in-depth analysis of DUC related work. In it, the challenges posed by DUC in terms of data sovereignty and the features that must be provided to address them are identified and analyzed for the first time. Based on these features, an initial DUC framework is proposed to assess in a practical and unified way the extent to which DUC solutions provide data sovereignty. Finally, the assessment framework is applied to compare the scopes of the most widespread DUC solutions and identify their limitations.
To boost data spaces and benefit from the great opportunities that they present, data sovereignty must be provided by distributed usage control (DUC). Assuming that DUC will be managed by implementing and enforcing po...
详细信息
To boost data spaces and benefit from the great opportunities that they present, data sovereignty must be provided by distributed usage control (DUC). Assuming that DUC will be managed by implementing and enforcing policies, notable efforts have already been undertaken in the context of Access control (AC) regarding policy analysis due to the impact of low-quality policies on security. In this regard, this paper proposes that policy analysis in the DUC context should be understood as an extension of the AC, which is further affected by other challenging features, chief among which are context-aware control and extended control through action requirements. This paper presents a novel Context-Aware Policy Analysis (CAPA) algorithm for detecting inconsistencies and redundancies for DUC policies by supporting a large set of heterogeneous conditions. In this regard, the dependent relationship of conditions is formulated which will lead to more efficient conflict detection. By implementing this concept, a novel tree structure that combines a resource and a policy structure is presented to search for and compare relevant rules from policies. Built on the tree structure and through the formalization of rule conflicts, CAPA is developed and the security and performance it provides is tested in a wind energy use case.
Decentralized systems play an important role in many modern data processing applications. Due to the distributed nature of these applications, participating system components are often operated by different stakeholde...
详细信息
ISBN:
(纸本)9781450392297
Decentralized systems play an important role in many modern data processing applications. Due to the distributed nature of these applications, participating system components are often operated by different stakeholders with potentially conflicting interests. To prevent malicious participants from manipulating critical system components, trusted computing technologies such as Trusted Platform Modules (TPMs) or Intel's Software Guard Extensions (SGX) can be employed. These technologies provide hardware-based access control to sensitive data and allow users to remotely verify the integrity of critical software stacks. However, not all trusted computing technologies are equally suitable for all use cases. As different technologies offer different benefits and drawbacks, it becomes quite challenging to determine if the decentralized system can be fully trusted in its current state. In this work we present a methodology for estimating the trustworthiness of decentralized systems that are being protected by trusted computing hardware. Our approach is based on a formal model describing the operational dependencies between distributed system components, as well as the required protection goals for a secure component operation. Based on this model we then show how stakeholders can calculate the trustworthiness of a specific system operation as a subjective probability (degree-of-belief). We then generalize this approach to obtain trust estimations for the entire decentralized system. Finally we demonstrate the application of our proposal using the real-world scenario of distributed usage control as an example.
distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an applica...
详细信息
ISBN:
(纸本)9781450312950
distributed usage control is concerned with how data may or may not be used after initial access to it has been granted and is therefore particularly important in distributed system environments. We present an application- and application-protocol-independent infrastructure that allows for the enforcement of usagecontrol policies in a distributed environment. We instantiate the infrastructure for transferring files using FTP and for a scenario where smart meters are connected to a Facebook application. Copyright 2012 ACM.
Interactive environments are more and more entering our daily life. Our homes are becoming increasingly smart and so do our working environments. Aiming to provide assistance that is not only suitable to the current s...
详细信息
ISBN:
(纸本)9781450363907
Interactive environments are more and more entering our daily life. Our homes are becoming increasingly smart and so do our working environments. Aiming to provide assistance that is not only suitable to the current situation, but as well for the involved individuals usually comes along with an increased scale of personal data being collected/requested and processed. While this may not be exceptionally critical as long as data does not leave one's smart home, circumstances change dramatically once smart home data is processed by cloud services, and, all the more, as soon as an interactive assistance system is operated by our employer who may have interest in exploiting the data beyond its original purpose, e. g. for secretly evaluating the work performance of his personnel. In this paper we discuss how a federated identity management could be augmented with distributed usage control and trusted computing technology so as to reliably arrange and enforce privacy-related requirements in externally operated interactive environments.
暂无评论