Institute for Cyber Security An Attribute-Based Protection Model - - PowerPoint PPT Presentation

institute for cyber security an attribute based
SMART_READER_LITE
LIVE PREVIEW

Institute for Cyber Security An Attribute-Based Protection Model - - PowerPoint PPT Presentation

Institute for Cyber Security An Attribute-Based Protection Model for JSON Documents Prosunjit Biswas, Ravi Sandhu and Ram Krishnan Department of Computer Science Department of Electrical and Computer Engineering 10th International Conference


slide-1
SLIDE 1

1

World-Leading Research with Real-World Impact!

Prosunjit Biswas, Ravi Sandhu and Ram Krishnan

Department of Computer Science Department of Electrical and Computer Engineering

Institute for Cyber Security

10th International Conference on Network and System Security September 28th, 2016

An Attribute-Based Protection Model for JSON Documents

slide-2
SLIDE 2

2

World-Leading Research with Real-World Impact!

Outline Summary Motivation Background JSON protection model Labeling JSON elements Implementation Q/A

slide-3
SLIDE 3

3

World-Leading Research with Real-World Impact!

Summary

 We have presented an attribute based protection model and

labeling schemes for securing JSON documents.

slide-4
SLIDE 4

4

World-Leading Research with Real-World Impact!

Motivation

 Why JSON documents?

slide-5
SLIDE 5

5

World-Leading Research with Real-World Impact!

Motivation (continuing)

 Why not reuse XML protection models?

Features of underlying data to be protected Hierarchical relationship

(e.g. house-no, street, town)

Semantic association

(e.g. phone-no, email, fax, mobile)

Scatteredness

(due to redundancy/duplicity)

  • Considered in XML protection

models

  • Not considered
slide-6
SLIDE 6

6

Motivation (continuing)

 Existing XML models vs proposed model

Nodes Authorization policies Nodes Authorization policies Attribute values Labeling policies World-Leading Research with Real-World Impact!

Fig 1 (a): Existing XML protection models Fig 1(b): Proposed JSON protection model

slide-7
SLIDE 7

7

World-Leading Research with Real-World Impact!

Background - JSON

 JSON data forms a rooted tree hierarchical structure (like XML)

emp-rec con-info emp-info email work-phone mobile sen-info EID Salary SSN salary name

... ... ... ... ... ... ... ... ... key nodes

{ “emp-rec”:{ “name”: “...”, “con-info”:{ “email”: “...”, “work-phone”: “...” }, “emp-info”:{ “mobile”: “...”, “EID”: “...”, “salary”: “...” } “sen-info”: { “SSN”: “...”, “salary”: “...” } } }

Fig 2 (a): JSON data

Fig 2 (b): Corresponding JSON tree

slide-8
SLIDE 8

8

World-Leading Research with Real-World Impact!

JSON protection model

JSON protection model Specification of authorization policies Specification of labeling policies Content based labeling Path based labeling

Fig 3: Scope of the JSON protection model

slide-9
SLIDE 9

9

World-Leading Research with Real-World Impact!

JSON protection model (continuing)

Fig 4: The Attribute-based Operational Model (AtOM)

Micro- Policy UL U users

JE

JSON

elements

Policy A actions

ULH SLH uLabel sLabel JEH

Adapted from EAP-ABAC model [1]

[1] Biswas, Prosunjit, Ravi Sandhu, and Ram Krishnan. "Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy." Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control. ACM, 2016.

slide-10
SLIDE 10

10 10

World-Leading Research with Real-World Impact!

JSON protection model - examples

Fig 5: (a) User-label values, (b) security-label values and (c) annotated JSON tree

manager HR employee guest sensitive enterprise public employment emp-rec con-info email work-phone

{enterprise}

sen-info SSN salary

{sensitive} {sensitive} {sensitive} {enterprise} {enterprise} {enterprise}

(a) (b) (c)

Example of a policy, Policyread =

{(manager, sensitive), (HR, employment), (employee, enterprise), (guest,public) }

slide-11
SLIDE 11

11 11

World-Leading Research with Real-World Impact!

Labeling JSON documents

Fig 6 (a): Types of labeling policies

Specification of labeling policies Content based labeling Path based labeling

slide-12
SLIDE 12

12 12

World-Leading Research with Real-World Impact!

Labeling JSON documents (continuing)

Fig 6 (b): Purpose of labeling policies

Purpose of labeling policies Restrict arbitrary labeling (Assignment control) Propagation of labels (Propagation control)

slide-13
SLIDE 13

13 13

World-Leading Research with Real-World Impact!

Labeling JSON documents – Assignment control

Assignment controls No-restriction Senior-up Senior-down Junior-up Junior-down

Fig 7 (a): Different types of Assignment controls

Senior nodes Nodei Valuei Junior values

Fig 7 (b): Junior-up assignment control Assignment Senior nodes of Nodei must be assigned junior values of Valuei

slide-14
SLIDE 14

14 14

World-Leading Research with Real-World Impact!

Labeling JSON documents – Propagation control

Propagation controls No-propagation One-level up One-level down Cascading-up Cascading-down

Fig 8: Different types of propagation controls

slide-15
SLIDE 15

15 15

World-Leading Research with Real-World Impact!

Labeling JSON documents – Path-based labeling model

JPath

JSON path

LabelAssignments SL

security- label values

constant set finite set SCOPE AC

assignment control

PC

propagation control

Fig 9: Model for path-based labeling of JSON data Table 1: Example of path-based labeling

slide-16
SLIDE 16

16 16

World-Leading Research with Real-World Impact!

Prototype implementation

Keystone data

Roles as uLabel values Policy table

JSON document sLabel values Labeling policies

JSONAuth plugin 1,2 3,6 4,5 1,2: User's request to keystone & responses with the credentials 3: User Request for JSON document 4,5: Request & response from object server for JSON document 6: User receive only authorized data from JSON document

OpenStack Keystone OpenStack Swift

Required changes

Fig 10: Implementation in OpenStack Cloud

slide-17
SLIDE 17

17 17

World-Leading Research with Real-World Impact!

Implementation - evaluation

Fig 11: Performance evaluation

slide-18
SLIDE 18