Collaborative End-to-end Enforcement of Fine-grained Information Sharing Policies in Distributed Systems

نویسنده

  • Nikhil Swamy
چکیده

Executive Summary Reliable and timely sharing of information across a community of collaborating principals is an integral part of Microsoft's vision of the " new world of work " [30]. Examples of Microsoft's investment in this vision abound. For one, Sharepoint specifically aims to share information assets across teams, departments, and organizations while maintaining IT control. Tools like One Note allow information from disparate software applications to be conveniently aggregated in a form that can be shared across a community of users. Longer-range initiatives like HealthVault target the sharing of patient medical records across a wide array of organizations, ranging from hospitals and insurance provides to employers and the patients themselves. Microsoft's partnership with consortiums like the Trans-global Secure Collaboration Program aim to build a platform for multinational secure information sharing between government and industry. Despite its prevalence, widespread information sharing is, clearly, a two-edged sword. While ready access to relevant information can make a collaboration more effective, uncontrolled sharing of digital assets raises many security concerns, e.g., the unintended dissemination of HealthVault records can compromise a patient's privacy. This paper describes work currently underway that has as its goal the formal verification of security properties for distributed information-sharing applications. Our work applies to the setting where principals have incentives (such as legal contracts) to abide by the security policies placed by data custodians. In this setting, we wish to make it possible for principals to collaborate with each other (e.g., by sharing security-critical software) and enforce a system-wide security policy with a high-degree of assurance. We aim to address a number of concerns. As a first measure, we control information sharing by protecting resources by a formally specified claims-based access-control policy. Going further, we also address the specification and enforcement of usage-control policies so that a custodian of a resource can retain some control over how a resource is used after access has been granted, e.g., to prevent further dissemination of data. In order to promote as much information sharing as possible without compromising security, policies are applicable at a fine granularity, e.g., it will be possible to apply security controls to small fragments of documents rather than only to entire documents. As the number of data sources grows, keeping track of data dependences becomes important—both for enforcing security policies as well as assisting users with making sense of complex data sets. We aim to provide principled ways of …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

On Predictable Operating System Protocol Processing

Distributed continuous media applications that incorporate digital audio and video require predictable response from the operating system and the network. Much recent research in communication networks focuses on providing predictable service at the network level, but current operating systems do not typically provide end-to-end predictability. Our aim is to offer operating system support for p...

متن کامل

Secure Information Sharing in a Virtual Multi-Agency Team Environment

This paper proposes a two tier RBAC approach for secure and selective information sharing among virtual multi-agency response team (VMART) and allows expansion of the VMART by admitting new collaborators (government agencies or NGOs) as need arise. A coordinator Web Service for each member agency is proposed.The coordinator Web Service is responsible for authentication, information disseminatio...

متن کامل

Improving Data Security in Crypto-based Data Sharing with Third Party Auditing

The encryption standard provides key assumption to the analytical with the recent adoption and diffusion of the data sharing paradigm in distributed systems such as online social escrow problem. The key generation center could decrypt any messages addressed to specific users networks or cloud computing, there have been increasing demands and concerns for distributed data security. One of the mo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009