spatio temporal access control
play

Spatio-Temporal Access Control Shu Chen Advisor: Wade Trappe - PowerPoint PPT Presentation

Spatio-Temporal Access Control Shu Chen Advisor: Wade Trappe WINLAB, Rutgers University 1 Outline Introduction of STAC STAC Model Seamless Feeding Architecture for STAC Summary 2 Introduction to STAC What is the


  1. Spatio-Temporal Access Control Shu Chen Advisor: Wade Trappe WINLAB, Rutgers University 1

  2. Outline � Introduction of STAC � STAC Model � Seamless Feeding Architecture for STAC � Summary 2

  3. Introduction to STAC � What is the conventional way to authenticate the access to a resource? Identity check � Identity Based Access Control (IBAC) is inconvenient and unnecessary in certain types of scenarios. � Instead, a user’s spatio-temporal context is more desirable for basing access control upon. � E.g. A company may restrict its confidential documents so that they can only be accessed while inside a building during normal business hours. � Spatio-Temporal Access Control (STAC) allows for objects to be accessed only if the accessing entity is in the right place at the right time. 3

  4. STAC Model � Five basic components � Users: USERS � Objects: OBS � Operations: OPS � Permissions: ⊆ × 2 OPS OBS ( ) PRMS � Spatio-temporal regions: ST- regions � Access policies What makes STAC different from conventional AC systems? The definition and representation of Objects, ST-regions and Access Policies. 4

  5. STAC Components-1 � Objects: endowed with temporal character � Static � Streaming: continually evolves with time � E.g. a movie Mv broadcast to the entire network � Break down streaming objects into pieces � Mv = { Mv 1 [0 , 10), Mv 2 [10,20), Mv 3 [20,30) } � Object atom: the smallest constituent piece that a larger object can be decomposed, decided by the temporal resolution of a STAC system. � ST-region: a set of 3-tuple Ω ={(x, y, t): valid areas in space and time} � Visualize as a continuous region instead of a set of discrete points � A ST-region Ω is called the secure ST-region of (ob, op) if the operation op is allowed to be performed on the object ob at Ω . 5

  6. STAC Components-2 Examples of ST-regions � Ω 1 : a spatial region that is constantly specified from time 0 to time t � Ω 2 : a spatial region that varies with time. It requires that a user must move in a specific manner in order to maintain access privileges to an object. 6

  7. STAC Components-3 Decomposing a ST-Region � Granulate the ST-regions into atom ST-regions. � Approximate each atom ST- region as a spatially constant region. � Facilitate the enforcement of some policies by decomposing ST-regions and objects. 7

  8. STAC Components-4 Access policies and their representations � Basic policy: A = {( Ω ; op ;O j )}, Oj 1 Oj 2 Oj m interpreted as within the ST- …… region Ω , the operation op on 1 rw_ 101 Ω 1 0 r__ 000 object O j is approved. Ω 2 Ω 0 r_x 001 � Access Control Matrix is 3 naturally used to represent basic policies. Ω File 1 1 Start � Stateful policy: Historical q 0 q 1 p 1 information is needed. What you Ω Ω 2 3 are allowed to access depends on what you’ve previously q 2 q 3 accessed. Song Mv � Finite Automata is convenient for representing stateful policies. p 2 p 3 8

  9. How to enforce STAC? � Centralized Interacting Architectures Now I know where Problem: Privacy breach you are! I w a n t t o w a t c h t h e m Prove you are in the valid region o v i e I am here (x,y,t) OK, here you go 9

  10. STAC through Seamless Feeding Architecture ( ( ( E Ki (Ob i ) ( ( ( ) ) ) K i Central content ( ( ( ) ) ) K i distributor E kj (file 1 ) ( ( ( ) ) ) K j Objects: Encrypted with keys and broadcasted to the entire network � Wireless nodes: Inject decryption keys to their transmission scope as scheduled � Mobile users: Have to appear at the right place at right time to get the decryption keys. � No localization is needed; Users don’t interact with any other entity! 10

  11. Wireless Nodes Deployment & Key Assignment � Basic scheme: � The region of interest is divided into regular hexagons. � One node is deployed at the center of each hexagon. � Each node’s radio is isotropic and with radius r=a , a = the length of hexagon edge. Caveat: In reality, propagation does not terminate suddenly!!! E.g. : Blank Area Policy--- O 1 can be accessed only within Ω 1 ; O 2 can be accessed only within Ω 2 Scheme--- • Encrypt O 1 and O 2 . k 1 and k 2 are their decryption keys respectively. • Assign k 1 to all the nodes whose radio discs are inside the rectangle Ω 1 and k 2 to the nodes whose radio discs are inside Ω 2 11

  12. Improving the Coverage by Power Allocation Adjustment � Security point of view: � Keys leak outside the desired ST-region is considered as security weakness. � Aims at best cover from inside the region � Algorithm: � For each node, allocate the power that maximally cover the region from inside, according to some propagation model. � Remove the redundant nodes or power assignment 12

  13. Simulation Result Uncovered area � Blank area ratio= Desired ST-region area � In the simulation: � The desired ST-region is a square spatial region with sides of length d. � Change the density of the sensor nodes, distance between nodes r 13

  14. Dynamic Encryption Question: Is static encryption enough to protect an object? 1. Object is streaming 2 . Object’s secure ST-region is temporal related ( ( ( ( ( ( ( ( ( ( E K2 (F1) E K1 (F1) ( ( E K2 (Mv 2 ), E K1 (Mv 2 ), E K1 (Mv 1 ) K 1 K 1 K 1 K 2 K 2 K 1 Ω 1 Ω 2 T 1 T 2 T 2 T 1 14

  15. Dynamic Encryption Solution: � Decompose streaming objects � Decompose ST-regions on temporal axis � Use dynamic encryption : Encrypt objects with different keys at different time points � Wireless nodes transmit the corresponding decryption keys at different time points. � For stronger restrictions, we may need assistance from the OS! (e.g. once you have decrypted the file, you can always decrypt it!) Another Problem : � How do we let the wireless nodes update the keys? � Do we issue updated keys to each node every time the key needs to change? Significant overhead! Future Research! 15

  16. Summary � Examined the new class of location based services--- Spatio-Temporal Access Control (STAC). � STAC model � Proposed the Seamless Feeding Architecture to support STAC � Algorithm for Optimizing the covered region � Dynamic Encryption � Our mechanism: � Reduces the risk of privacy breach, � Resistant to Positioning Spoofing, � Facilitates new classes of applications with little effort. � Spatial-temporal scavenger hunt 16

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend