prof. ravi sandhu - institute for cyber security … › miscppt › dbsec_170719.pdfno!! never!! is...
TRANSCRIPT
![Page 1: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/1.jpg)
1
Attribute-Based Access Control: Insights and Challenges
Prof. Ravi SandhuExecutive Director and Endowed Chair
DBSecPhiladelphiaJuly 19, 2017
www.ics.utsa.edu
© Ravi Sandhu World-Leading Research with Real-World Impact!
Institute for Cyber Security
![Page 2: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/2.jpg)
© Ravi Sandhu 2World-Leading Research with Real-World Impact!
Access Control Evolution
Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970
Role Based Access Control (RBAC), 1995
Attribute Based Access Control (ABAC), ????
![Page 3: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/3.jpg)
© Ravi Sandhu 3World-Leading Research with Real-World Impact!
Access Control Evolution
Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970
Role Based Access Control (RBAC), 1995
Attribute Based Access Control (ABAC), ????
Born 1990s
![Page 4: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/4.jpg)
© Ravi Sandhu 4World-Leading Research with Real-World Impact!
Access Control Evolution
Discretionary Access Control (DAC), 1970
Mandatory Access Control (MAC), 1970
Role Based Access Control (RBAC), 1995
Attribute Based Access Control (ABAC), ????
Relationship Based Access Control (ReBAC)
????
Provenance BasedAccess Control (PBAC)
????
Born 1990s
Born mid 2000s
Born late2000s
![Page 5: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/5.jpg)
NO!! Never!!
Is ABAC the right word for the moment? Certainly a strong candidate Already too late?
ReBAC (relationship-based access control) not ABAC Big Data, Analytics and AI will take care of everything
What is lacking in ABAC?Usage Control (UCON) concepts of attribute mutability,
enforcement and obligation continuity, and post-obligationsTask-Based Access ControlRisk-Based Access ControlPolicy-Based Access Control…………….
© Ravi Sandhu 5World-Leading Research with Real-World Impact!
ABAC = Final Word?
![Page 6: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/6.jpg)
ABAC is orders of magnitude more complex than anything that has been an Access Control winner so far (DAC, MAC, RBAC)
We need the complexity, but need to manage it
If Google can index the web, we can do ABAC!!
Cloud-enabled IoT may be the killer app
© Ravi Sandhu 6World-Leading Research with Real-World Impact!
The ABAC Challenge
![Page 7: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/7.jpg)
7World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
Based on RBAC experience
![Page 8: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/8.jpg)
8World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 9: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/9.jpg)
© Ravi Sandhu 9World-Leading Research with Real-World Impact!
2. Core ABAC Models: UCON
Usage Control Models, early 2000sPark, Sandhu, Pretschner
Rights(R)
Authorizations
(A)
Subjects(S)
Objects(O)
Subject Attributes (SA) Object Attributes (OA)
Obligations(B)
Conditions(C)
UsageDecisions
before-usage ongoing-Usage after-usage
Continuity ofDecisions
pre-decision ongoing-decision
pre-update ongoing-update post-update
Mutability ofAttributes
• unified model integrating• authorization• obligation• conditions
• and incorporating• continuity of decisions• mutability of attributes
![Page 10: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/10.jpg)
© Ravi Sandhu 10World-Leading Research with Real-World Impact!
2. Core ABAC Models: ABACα
Policy Configuration Points
Can be configured to do simple forms of DAC, MAC, RBAC
Jin, Krishnan, Sandhu 2012
![Page 11: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/11.jpg)
© Ravi Sandhu 11World-Leading Research with Real-World Impact!
2. Core ABAC Models: ABACβ
Can further be configured to do many RBAC extensions
Jin, Krishnan, Sandhu 2014
![Page 12: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/12.jpg)
2. Core ABAC Models: HGABAC
© Ravi Sandhu World-Leading Research with Real-World Impact! 12
U: UserUG: User-GroupS: SubjectUA: User AttributesO: ObjectOG: Object-GroupOA: Object AttributesOP: Operations
Hierarchical Group and Attribute Based Access Control (HGABAC) Introduces the notion of User and Object Groups Core advantage is simplified administration of attributes User and Objects are assigned set of attributes in one go as compared to
single assignment at a time.
Servos and Osborn, 2015
![Page 13: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/13.jpg)
13World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 14: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/14.jpg)
© Ravi Sandhu 14World-Leading Research with Real-World Impact!
3. Administrative ABAC Models: GURA and GURAG
Jin, Krishnan, Sandhu, 2012Gupta, Sandhu, 2016
![Page 15: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/15.jpg)
15World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 16: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/16.jpg)
© Ravi Sandhu 16World-Leading Research with Real-World Impact!
4. Extended ABAC Models: ReBAC versus ABAC
ReBAC Framework
Ahmed and Sandhu, 2017
![Page 17: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/17.jpg)
© Ravi Sandhu 17World-Leading Research with Real-World Impact!
4. Extended ABAC Models: ReBAC versus ABAC
ABAC Framework
![Page 18: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/18.jpg)
© Ravi Sandhu 18World-Leading Research with Real-World Impact!
4. Extended ABAC Models: ReBAC versus ABAC
Equivalence of ReBAC and ABAC Structural Variants
![Page 19: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/19.jpg)
© Ravi Sandhu 19World-Leading Research with Real-World Impact!
4. Extended ABAC Models: ReBAC versus ABAC
Non-Equivalence of ReBAC and ABAC Variants
![Page 20: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/20.jpg)
20World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 21: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/21.jpg)
A single infinite attribute with no creation leads to undecidable safety. Rajkumar 2012
Pre_UCON with finite attributes and unbounded creation has decidable safety. Rajkumar, Sandhu 2016
ABACα has decidable safety. Ahmed, Sandhu 2017 GURA has decidable safety/reachability. Jin, Krishnan,
Sandhu 2017
© Ravi Sandhu 21World-Leading Research with Real-World Impact!
1. Foundations: Safety
![Page 22: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/22.jpg)
22World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 23: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/23.jpg)
© Ravi Sandhu 23World-Leading Research with Real-World Impact!
5. Policy Architecture: Centralized ABACα style
Policy Configuration Points
![Page 24: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/24.jpg)
© Ravi Sandhu 24World-Leading Research with Real-World Impact!
5. Policy Architecture: Diffused AWS style
![Page 25: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/25.jpg)
25World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 26: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/26.jpg)
© Ravi Sandhu 26World-Leading Research with Real-World Impact!
6. ABAC Enforcement Architecture: Federated ABAC
Fisher 2015NCCOE, NIST, Building Block
![Page 27: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/27.jpg)
27World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications
![Page 28: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/28.jpg)
Cloud Computing IaaSSingle tenantMulti tenantMulti cloud
© Ravi Sandhu 28World-Leading Research with Real-World Impact!
7. ABAC Applications: Cloud IaaS
Jin, Tang, Dang, Bijon, Pustchi, Zhang, Biswas, Ahmed, Cheng,Patwa, Krishnan, Sandhu
2012 onwards
![Page 29: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/29.jpg)
© Ravi Sandhu 29World-Leading Research with Real-World Impact!
7. ABAC Applications: Cloud Enabled IoT
Alsheri, Bhatt,Patwa, Benson,
Sandhu2016 onwards
![Page 30: Prof. Ravi Sandhu - Institute for Cyber Security … › miscppt › dbsec_170719.pdfNO!! Never!! Is ABAC the right word for the moment? Certainly a strong candidate Already too late?](https://reader030.vdocuments.us/reader030/viewer/2022040617/5f1c78736cfab853506e3eff/html5/thumbnails/30.jpg)
30World-Leading Research with Real-World Impact!
ABAC Research Agenda
© Ravi Sandhu
1. Foundational Principles and Theory
2. Core ABAC Models
3. AdministrativeABAC Models
4. ExtendedABAC Models5. ABAC Policy
Architectures and Languages
6. ABAC Enforcement Architectures
7. ABAC Design, Engineering and Applications