270 likes | 402 Views
A Credential-Based Approach for Facilitating Automatic, Secure Resource Sharing Among Ad-hoc Dynamic Coalitions. Janice Warner and Vijayalakshmi Atluri Rutgers University. Ravi Mukkamala Old Dominion University. August 2005. Coalition Resource Sharing.
E N D
A Credential-Based Approach for Facilitating Automatic, Secure Resource Sharing Among Ad-hoc Dynamic Coalitions Janice Warner and Vijayalakshmi Atluri Rutgers University Ravi Mukkamala Old Dominion University August 2005
Coalition Resource Sharing • Dynamic and Ad-hoc – members may leave and new members may join • Examples: • Natural Disaster: government agencies, non-government organizations and private organizations may share data about victims, supplies and logistics. • Homeland Security: Information collected by various governmental agencies shared for comprehensive data mining • Virtual Enterprises: Collaboration between companies IFIP05-Warner, Atluri and Mukkamala
Current Approaches to Resource Sharing • Form teams (workgroups) comprising of users from all coalition entities Problems: not viable and scalable - may result in delays • User ids given to each external member of the coalition and access control is provisioned on these ids. Problem: administratively burdensome; requires explicit revocation upon coalition or user termination • Single access id provided to each external coalition entity Problem: Fine-grained access control is not possible • Resources are copied to external coalition member Problem: Updates are difficult and may result in uncontrolled sharing IFIP05-Warner, Atluri and Mukkamala
Outline • Motivation • What is needed • CBAC Model • DCBAC Model • Conclusions and Future Work IFIP05-Warner, Atluri and Mukkamala
Resource Sharing among Coalitions • Typically, the policies for sharing are stated at the coalition level • Example – The Red Cross and Doctors without Borders will work together to investigate the spread of infectious diseases in the wake of a natural disaster. • Enforcing coalition-level security policies requires transforming them to implementation level • Example - Dr. Roberts of Doctors without Borders can access reports on the spread of infectious diseases in Turkey. IFIP05-Warner, Atluri and Mukkamala
Our Preliminary Solution (presented at ICDCIT04) • A formal model comprising of three levels (user-object, role, coalition levels) • Enables handshaking of relevant information by appropriate levels of the agencies • Allows distributed access control – control remains in the hands of the resource owner IFIP05-Warner, Atluri and Mukkamala
coalition segment role segment user-object request Layered CBAC Model = 555444555, DB99, RC11,doctor (location: Turkey, specialty: immunology) concept: disease, type: data role segment user-object request Coalition Level Coalition Level role segment user-object request = doctor (location: Turkey, specialty: immunology) concept: disease, type: data = doctor (location: Turkey, specialty: immunology) concept: disease, type: data Role Level Role Level User-Object Level User-Object Level user-object request user-object request =RID799, RID223 =roberts, concept: disease, type: data Entity A Drs-w/o-Borders Entity B Red Cross IFIP05-Warner, Atluri and Mukkamala
Limitations of CBAC Model • Coalitions need to have high level agreements in place before there is a flow of information: • Coalition entities know what is available and how to find it. • Coalition entity ids are pre-assigned. • Credentials requirements are union of all associated with role that has access to requested object. IFIP05-Warner, Atluri and Mukkamala
Dynamic Coalition-Based Access Control Model (DCBAC) • Dynamic because: • Employs a Coalition Service Registry (CSR) where shared resources and coalition level policies are publicized Agreements do not need to established between coalition partners beforehand • Computes credentials needed by external user from local access control policies through Mapper layer. Coalition access control policy determined through transformation of local access control policy IFIP05-Warner, Atluri and Mukkamala
Principals of DCBAC • Existing access control mechanisms within each coalition entity remain intact. • Access rights are granted to subjects only if they belong to an organization recognized by the coalition. • Subjects of a coalition entity must have credentials with attribute values comparable to those of local subjects. IFIP05-Warner, Atluri and Mukkamala
DCBAC Architecture Network (e.g., Internet) Coalition Access Point (CAP) Coalition Level Coalition Service Registry (CSR) Coalition Level Credential Filter Credential Filter Credential to LAC Mapper Credential to LAC Mapper Local Services (shared and private) Local Access Control (LAC) Local Access Control (LAC) Local Services (shared and private) Local User Interface Local User Interface IFIP05-Warner, Atluri and Mukkamala
Example Emergency Management Scenario International Red Cross makes available its Emergency Response IS subject to: Organization Level Policy: Must be member of a non-profit, certified, relief organization. Individual Policy: Access is restricted to information concerning the emergency site in which they are currently working. Policy Based on LAC Mapping: Credentials must be comparable with those of internal users. IFIP05-Warner, Atluri and Mukkamala
Coalition Service Registry Coalition Service Registry (CSR) • Similar to UDDI Web Service Registry • Advertises resources that coalition entities make available • Describes interface to resources • Describes credentials needed to access resources • Verifies organizational-level credentials • Issues a “ticket” which can be submitted by individuals in authenticated organization with request to access a specific resource. IFIP05-Warner, Atluri and Mukkamala
UDDI:name UDDI:discovery URL UDDI:contacts UDDI:description Coalition Service Registry (CSR) CSR is a UDDI-like Registry businessEntity UDDI:name businessService UDDI:description UDDI:category bag UDDI:accessPoint UDDI:description bindingTemplate UDDI:category bag UDDI:tModelInstanceDetails IFIP05-Warner, Atluri and Mukkamala
UDDI:name UDDI:discovery URL UDDI:contacts UDDI:description Coalition Service Registry (CSR) CSR is a UDDI-like Registry Resources listed in the CSR are searchable based on resource identifiers, name, keywords or category. businessEntity UDDI:name businessService UDDI:description UDDI:category bag UDDI:accessPoint UDDI:description bindingTemplate UDDI:category bag UDDI:tModelInstanceDetails IFIP05-Warner, Atluri and Mukkamala
UDDI:name UDDI:discovery URL UDDI:contacts UDDI:description Coalition Service Registry (CSR) CSR is a UDDI-like Registry businessEntity Provides network address of Coalition Access Point from which resource can be requested. UDDI:name businessService UDDI:description UDDI:category bag Provides credential info and other access requirements UDDI:accessPoint UDDI:description bindingTemplate UDDI:category bag UDDI:tModelInstanceDetails IFIP05-Warner, Atluri and Mukkamala
Example – Resource request is made Network (e.g., Internet) Coalition Level Coalition Service Registry (CSR) 〈744, (location:Turkey, specialty: infectious disease), Red_Cross_RID_730〉 Credential Filter 〈744, (degree:MD, gender:M, location:Turkey, specialty: infectious disease), concept: disease type: data 〉 Credential to LAC Mapper Local Access Control (LAC) 〈744, roberts, concept: disease type: data 〉 Local User Interface IFIP05-Warner, Atluri and Mukkamala
Example – Obtain organizational assertion Network (e.g., Internet) • Doctors-Without-Borders CAP consults the CSR: • to find the resource(s) (if it has not been located before) • to obtain a valid organizational assertion (if it does not currently have one) Coalition Level Coalition Service Registry (CSR) Credential Filter Credential to LAC Mapper Local Access Control (LAC) Local User Interface IFIP05-Warner, Atluri and Mukkamala
Tickets are SAML assertions Coalition Service Registry (CSR) • Assertions are declarations of facts: • Issuer ID and issuance timestamp • Assertion ID • Subject • “Conditions” under which assertion is valid (e.g., validity period) • CSR declares that organizational credentials were submitted and validated. • Assertions can be digitally signed (and should be) IFIP05-Warner, Atluri and Mukkamala
Example – Request send to provider’s CAP Network (e.g., Internet) Coalition Level 〈744, Doctors Without Borders, Red Cross, SAML Assertion, Red_Cross_RID_730, (location:Turkey, specialty: infectious disease) 〉 Coalition Level Credential Filter Credential Filter Credential to LAC Mapper Credential to LAC Mapper Local Access Control (LAC) Local Access Control (LAC) Local Services (shared and private) Local User Interface Local User Interface IFIP05-Warner, Atluri and Mukkamala
Example – Provider evaluates request Network (e.g., Internet) Coalition Level Coalition Level Validates organizational credentials Credential Filter Credential Filter 〈744, Red_Cross_RID_730, (location:Turkey, specialty: infectious disease) 〉 Credential to LAC Mapper Credential to LAC Mapper Local Access Control (LAC) 〈744, Red_Cross_RID_730〉 Local Access Control (LAC) Local Services (shared and private) Local User Interface Local User Interface IFIP05-Warner, Atluri and Mukkamala
Conclusions • DCBAC automates translation of coalition level policies into subject-resource level. • Depends upon credentials – both organizational level and user. • Maps roles to credentials commonly held by members of the role. • Uses a Coalition Service Registry so that ad-hoc coalitions can be formed simply by discovering resources that are needed. • Can be built using currently available standard protocols – XACML, UDDI and SAML. IFIP05-Warner, Atluri and Mukkamala
Ongoing Work • Mapper – Details on mapping local policies to credentials submitted to ICISS 2005 • Graph-based approach • Strategies for inclusion of similar credentials • Data mining of logs, local policies, and other security related data to obtain: • Groupings of users with similar data requirements and attributes • Groupings of resources • Resolving semantic heterogeneity between policies and credential attributes. IFIP05-Warner, Atluri and Mukkamala
Coalition Level Credential Filter Credential to LAC Mapper Local Access Control (LAC) Local User Interface DCBAC – Coalition Level • Interacts with the coalition level at other coalition entities through the Coalition Access Point (CAP). • Incoming: Processes requests by validating CSR ticket. • Outgoing: Obtains ticket, appends to user request and forwards it to appropriate CAP. IFIP05-Warner, Atluri and Mukkamala
Coalition Level Credential Filter Credential to LAC Mapper Local Access Control (LAC) Local User Interface DCBAC – Credential Filter • Incoming Requests: • Determines whether user credentials sent with request are adequate. • Optionally, can downgrade or upgrade the credentials of users from specific entities. • Outgoing Requests: • Filters user credentials such that only those necessary to obtain access are sent. IFIP05-Warner, Atluri and Mukkamala
Coalition Level Credential Filter Credential to LAC Mapper Local Access Control (LAC) Local User Interface DCBAC - Mapper • Assumes RBAC local access control although this is not essential. • Incoming – Compares user credentials to internal roles that have rights to requested resource. • Outgoing – Determines role played by requester and retrieves credentials common to users playing that role. IFIP05-Warner, Atluri and Mukkamala
Coalition Level Credential Filter Credential to LAC Mapper Local Access Control (LAC) Local User Interface DCBAC – LAC • Enforces control on local services for both local and non-local requests. • Local requests are received through the local user interface. • External requests are received through the mapper. IFIP05-Warner, Atluri and Mukkamala