assured information sharing. prof. bhavani thuraisingham and prof. latifur khan the university of...

25
Assured Information Sharing

Upload: scarlett-webster

Post on 02-Jan-2016

217 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Assured Information Sharing

Page 2: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Prof. Bhavani Thuraisingham and Prof. Latifur Khan

The University of Texas at Dallas

Prof. Ravi Sandhu

George Mason University

August 2006

Information Operation Across Infospheres:

Assured Information Sharing

Page 3: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Acknowledgements• Students

–UTDallas• Dilsad Cavus (MS, Data mining and data sharing)

• Srinivasan Iyer (MS, Trust management)• Ryan Layfield (PhD, Game theory)• Mehdi (PhD, Worm detection)

–GMU• Min (PhD, Extended RBAC)

• Faculty and Staff–UTDallas

• Prof. Murat (Game theory)• Dr. Mamoun Awad (Data mining and Data sharing)

• Project supplemented by Texas Enterprise Funds

Page 4: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Architecture

ExportData/Policy

ComponentData/Policy for Agency A

Data/Policy for Federation

ExportData/Policy

ComponentData/Policy for Agency C

ComponentData/Policy for Agency B

ExportData/Policy

Page 5: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Our Approach• Integrate the Medicaid claims data and mine the

data; next enforce policies and determine how much information has been lost by enforcing policies

• Examine RBAC and UCON in a coalition environment

• Apply game theory and probing techniques to extract information from non cooperative partners; conduct information operations and determine the actions of an untrustworthy partner.

• Defensive and offensive operations

Page 6: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Coalition for Assured Information Sharing

• A coalition is formed by related entities like Medical care facilities

and Health insurance companies to share information within

themselves and to selected outsiders in a secure manner.

• Each of these entities can specify policies for access control through

the coalition.

• The coalition provides controlled access to information in the

database after enforcing policies generated by the entity owning the

database.

Page 7: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Example

• Consider a set of hospitals: {H1, H2, … Hn} and a set of Health

Insurance agencies {I1, I2, … In}. Each of these hospitals and

insurance companies can be an entity in a Coalition.

• The Coalition server provides a single point of access for databases

owned by each of the member entities.

• Each of these entities provides a policy file to the

company/individual hosting the Coalition server.

Page 8: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Example … continued

Situation – 1

• When registering a client, an insurance agency I5 might want to ensure that the applicant does

not have an active insurance coverage from any other insurance agency.

• A web service agent from the insurance company I5 issues a request to the Coalition server to

verify this.

- Using the applicant’s SSN, the web service agent can query each of the other insurance agency

databases to retrieve records of active insurance coverage for the client with the specified SSN.

Page 9: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Coalition

Architecture

Page 10: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Architectural Elements – 1

Web Service Agent:

Formulates a request and sends the request to the Response Engine

Receives response from the Response Engine and uses it to provide the appropriate service.

The aim of the web service agent is to obtain as much information as possible.

Page 11: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Architectural Elements – 2

Response Engine:

Policy Enforcement Point (PEP):

Enforces policies on requests sent by the Web Service.

Translates this request into an XACML request; sends it to the PDP.

Policy Decision Point (PDP):

Makes decisions regarding the request made by the web service.

Conveys the XACML request to the PEP.

Page 12: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Architectural Elements – 3

Coalition ( Policy files + Database)

Policy Files:

Policy Files are written in XACML policy language.

Policy Files specify rules for “Targets”. Each target is composed of 3 components: Subject,

Resource and Action; each target is identified uniquely by its components taken together. The

XACML request generated by the PEP contains the target. The PDP’s decision making capability lies

in matching the target in the request file with the target in the policy file.

These policy files are supplied by the owner of the databases (Entities in the coalition).

Databases:

The entities participating in the coalition provide access to their databases.

Page 13: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Screenshots - 1

Page 14: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Screenshots - 2

Page 15: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Screenshots - 3

Page 16: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Enforcing Honesty

• Everyone has a choice:– Tell the truth– Lie

• Distributed Behavior Enforcement– Non-trivial to implement– Difficult to guarantee– Examples: BitTorrent, P2P Networks, etc.

• Unless we can afford to have a neutral 3rd party that everyone can agree on, we need some way of enforcing ‘good’ behavior

Page 17: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Punishment

• However, there is a third option: refuse to participate– Usually not researched– Drastic measure that only makes sense if we

can influence behavior

• Our modeling suggests that, with proper use of refusal, we can ultimately enforce helpful behavior without a managing agent

Page 18: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Evolutionary Strategy

• Every 200 rounds, we create a new generation of agents, using the most successful strategies available

• The fitness f() of a given agent is a function of how well they have performed during interaction with other agents– More successful agents have a higher probability of

being a part of the next generation

n

ii

ii

select

af

afap

0

)(

)()(

Page 19: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Our Work

• Our mathematical models suggest that, assuming we punish by cutting off communication, the equilibrium is to always tell the truth

• Therefore, using an evolutionary environment, we have placed our particular rationality amongst a heterogeneous pool of competing ideologies– Tit-For-Tat: A famous algorithm that simply mirrors the last

move an opponent made– Random: An agent that selects it’s strategy with a 50/50 chance– Casual Liar: Like our agent, but lies with a 10% probability– Subtle Liar: Like our agent, but chooses to lie when it perceives

the piece being traded is of significant value• With equal parts given to each agent, which one will

emerge victorious?

Page 20: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Results

Page 21: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Centralized Reputations in Decentralized P2P Networks

Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham

Page 22: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Motivation

• P2P Systems offer few security guarantees

• Shared data has low confidentiality

• Shared data has low integrity

• Easy for malicious peers to propagate malicious code

Page 23: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Introducing Penny

• A P2P Network that addresses the following types of attacks:– Spread of corrupt or incorrect data– Attaching incorrect labels to data– Discovering which peers own particular data– Generating a list of all peers who own

particular data

Page 24: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Penny

• P2P Network that supports shared data labeling of:– Confidentiality – Integrity

• Peers can share data without revealing which data object they own

• Security labels are global but do not require a centralized server

Page 25: Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University

Penny (Cont’d)

• P2P Network uses reputation-based trust management system – Store/retrieve labels – Despite malicious peer existence

• Maintain efficiency of network operations

• O(log N)