210 likes | 220 Views
This presentation outlines a model for managing privacy and identity information, discussing enforcement tools, policy compliance, and accountability in enterprise interactions. It covers user-centric privacy policies, encryption mechanisms, and realisation issues in enforcing data protection. The concept of sticky privacy policies and enterprise accountability are explored within a multiparty transaction scenario.
E N D
Towards Accountable Management of Privacy and Identity Information Marco Casassa Mont Siani Pearson Pete Bramhall Trusted Systems Laboratory Hewlett-Packard Labs, Bristol, UK ESORICS 2003, 13-15 October 2003 Gjovik, Norway
Presentation Outline • Problem Outline • Related Work • Privacy Management Model • Realisation • Discussion • Conclusions ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Privacy and Identity Information E-Commerce Government Person Profiles Business Personal ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Services Services Finance Government Services Scenario: Multiparty Interactions Multiparty Transaction / Interaction User Negotiation of Privacy Policy Services Policies Provision of Identity & Profile Data Data Identity/ Profile Disclosure Enterprise Accountability Enterprise Enforcement User Specification ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
P Related Work EPAL Enterprise EnforcementTools Legal Proof, Evidence,Prosecution? Who Controls? EU vs US Personal Data User Understanding IdentityServices P3P Point to point Eg: MS Passport Privacy Seal Predefined Policies Enforcement? Club ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Presentation Outline • Problem Outline • Related Work • Privacy Management Model • Realisation • Discussion • Conclusions ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Privacy Management Model User Enterprise User DB P Transaction User Involvement Enforcement Tracing and Audit Authority Accountable?Transparency Evidence Policy Compliance ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Multiparty Transaction / Interaction Enterprise User Enterprise Services Negotiation of Privacy Policy 1 Services 6 Policies Sticky Policies Enterprise 8 Data Obfuscated Data + Sticky Privacy Policies 2 Services 6 Checking for Integrity and Trustworthiness of Remote Environment Obfuscated Data + Sticky Privacy Policies 3 Request for Disclosure of Data + Sticky Privacy Policies + Credentials ? 4 Decryption Key (if Authorised) 5 Tracing and Auditing Authorities (TAAs) Request for Authorization or Notification Multi-Party Scenario ? 7 ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Privacy Model -- Summary • User Centric • Specifies Policies • Binds with their profile • TAA – aids user • Manages and records release of data • Transparency aids accountability • Validates and records enforcement mechanism • Enterprise • Makes audited promises concerning personal data • Allows validation and assessment of enforcement mechanism • Can Still Abuse Privacy ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Presentation Outline • Problem Outline • Related Work • Privacy Management Model • Realisation • Discussion • Conclusions ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
User Enterprise User DB P Transaction UserInvolvement Enforcement Tracing and Audit Authority Evidence Policy Compliance Realisation Issues Strong Binding of Policy and Data IBE EnforcementVerifiability TCGTagged OS ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
What is Identifier-based Encryption (IBE)? User Enterprise Get decrypt Key,e Choose e Encrypt Encrypted Msg Decrypt Msg Msg Profile Enterprise mustSatisfy Policy PrivacyPolicy Public details TAA – Enforces Policy Compute public details Audit Generate Decryption Key Secrets s ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Trusted Platforms -- TCG Server Root of Trust Apps OS Bios User ID Issuer Query Status Measures Boot, OSand APP loading ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Tagged Operating Systems Tagged OS Data Tagged Datafollowed throughmemory Tagged Kernel Function PEP Policy – internal allow – external encrypt with policy PolicyTagOperation(Destination) ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Control Flow Enterprise TAA Server Request for IBE decryption Key Keys IBE Encrypt Key = PPolicy Apps Tagged OS Bios Context, Id, Purpose Dataflow Policies Check Policy ID User Check Machine Status Record Request ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Sticky Privacy Policies Example of high-level Sticky Policy (XML format): Reference to TA(s) Constraints/ Obligations Platform/OS Constraint Actions (User Involvement) IBE encryption keys can define any kind of privacy constraints or terms and conditions to be deployed and enforced at different levels of abstractions (application/service, OS, platform) ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
High-level System Architecture • Based on the IBE Model • Privacy Policies are • represented as • “IBE Encryption Keys” • Confidential data is • encrypted with IBE • encryption keys • IBE encryption keys • “stick” with the encrypted • data (at least till the first • de-obfuscation of the data …) • The “Tracing and Auditing • Authority” is an (IBE based) • Trust Authority. • Leveraging Trusted Platforms and • Tagged OS for enforcing aspects • of Privacy Policies • (Work in Progress…) ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Presentation Outline • Problem Outline • Related Work • Privacy Management Model • Realisation • Discussion • Conclusions ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Tagged OS Tagged OS Tagged OS TCG TCG TCG TCG TCG TCG Discussion Enterprise 1 Personal Data Policy Engine Sticky Privacy Policies Enterprise 2 + Enforcement via Trust Authority + + Policy Engine Enforcement By Trusted Platforms and Tagged OS (Work in Progress) Trusted Audit Policy Engine Tracing, Audit Authority (TAA) ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK
Conclusion • Presented a model for accountable management of private identity data • User gains more control • Aided by (their) third party • Audit of legitimate requests • Shared with the user • Checks on enforcement mechanisms • Linked to TAA • Enterprise is accountable for use and enforcement • Links to policy based enforcement ﴀTrusted Systems Laboratory – Hewlett-Packard Labs, Bristol - UK