1 / 14

“A Service-enabled Access Control Model for Distributed Data”

“A Service-enabled Access Control Model for Distributed Data”. Mark Turner, Philip Woodall Pennine Forum - 16 th September 2004. Overview. The IBHIS Project Data as a Service Access Control Introduction Domain/Technical Challenges Service-enabled Data Access Control Model

Télécharger la présentation

“A Service-enabled Access Control Model for Distributed Data”

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. “A Service-enabled Access Control Model for Distributed Data” Mark Turner, Philip Woodall Pennine Forum - 16th September 2004

  2. Overview • The IBHIS Project • Data as a Service • Access Control • Introduction • Domain/Technical Challenges • Service-enabled Data Access Control Model • Reference/Architectural Models • Implementation • Future Work • Inference • Conclusions IBHIS - 2 -

  3. IBHIS – Data as a Service • Use SaaS concepts but expose Data as a Service (DaaS) • Modified ‘Web services’ known as Data Access Services (DAS) Data Access Service DB Description • Allow service-based access to complex heterogeneous data sources • DAS/data source are autonomous and owned by the data provider • May be dynamically discovered at run-time, with little prior knowledge • Located on the basis of the data rather than their functionality IBHIS - 3 -

  4. Research Area – Access Control • How to control access to distributed data within a dynamic broker environment? • Dynamic access to distributed autonomous data • Data sensitivity and ethical requirements of the domain • Role-Based Access Control (RBAC) model frequently used in Health & Social Care domain Users Roles Permissions Sessions • Models hierarchy within domain, easy administration IBHIS - 4 -

  5. Domain Challenges • RBAC has limitations for the healthcare domain • Access to data in emergency situations • Fine-grained, content-based rules • Access depends upon individual identities and teams • Contextual and environmental constraints • Transfer of authority by mandate • A number of these issues havebeen solved • But not in any one access control model • Solution: Create new model by integrating features from existing models IBHIS - 5 -

  6. Service-enabled Data Access Control • A new access control model to meet our requirements : • S-DAC (Service-enabled Data Access Control) • Integrates important features from existing models: • Role-based Access Control [Ferraiolo et al., 2001] • NIST Standard – Activation, Dynamic Separation of Duties • Team-based access control[Georgiadis et al., 2001] • Teams of users • Tees Confidentiality Model[Longstaff et al., 2003] • Emergency overrides • OASIS [Bacon & Moody, 2002] • Appointment paradigm IBHIS - 6 -

  7. S-DAC Reference Model IBHIS - 7 -

  8. Technical Challenges • Autonomy • Each data source will have individual access control concepts, and subjects (Roles, Teams) • Requires aMapping between global and local concepts • Dynamic,run-time enforcement • Data access policies are unknown at design time • Data Access Services • Service Descriptions must allow for discovery of DAS policies • Existing technologies are lacking • Service Description – WSDL • Partial authorisations of queries, Attribute/content level IBHIS - 8 -

  9. S-DAC Architectural Model IBHIS - 9 -

  10. Future Work • Investigation into general applicability of model • Criminology • Administrative interface • Evaluation • Review against Domain and Technical requirements • Evaluation by experts in Health domain • Complexity of administration • Evaluate prototype implementation [Kitchenham et al., 2003] • Inference… IBHIS - 10 -

  11. What is Inference ? • Take a database where determining someone's salary is restricted. • Now consider the following queries (which are unrestricted) : IBHIS - 11 -

  12. Research • Papers considered the inference problem in single multilevel databases. • Web-based inference has received little attention. • Integration of data from heterogeneous sources • Dynamic integration - unknown schemas • Autonomous data sources • Possible to use IBHIS as a platform for developing an inference detection system? • Links with access control models IBHIS - 12 -

  13. Conclusion • IBHISAccess Control Model – S-DAC • Roles, Teams, Identities, Contexts, Emergency overrides • Transfer of Authority • Successfully implemented as part of IBHIS prototype • Web Services technologies • Dynamic authorisation of content of SOAP documents • Policies built using existing XML languages, with extensions • Inference • Dynamic broker environment, heterogeneous distributed sources IBHIS - 13 -

  14. References • Bacon, J. and Moody, K., “Toward open, secure, widely distributed services”, CACM,45(6), June 2002, pp. 59-64 • Georgiadis C., Mavridis I., Pangalos G. and Thomas, R., “Flexible Team-based Access Control Using Contexts”, in Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), ACM SIGSAC, Chantilly, VA, U.S.A, May 2001 • D F Ferraiolo, R Sandhu, S Gavrila, D R Kuhn, R Chandramouli (2001) “Proposed NIST Standard for Role-Based Access Control”, ACM TISSEC, Vol. 4, No 3. • Kitchenham, B., Linkman, S., and Linkman, S., ‘Evaluating Novel Software Engineering Tools’, In Proceedings of EASE 2003, Keele University, 8th-10th April 2003 • Kudo, M., and Hada, S., "Access Control Model with Provisional Actions", IEICE Trans. Fundamentals, Vol. E84-A, 2001 • Longstaff, J.J, Lockyer, M.A., and Nicholas, J., “The Tees Confidentiality Model: an authorisation model for identities and roles”, ACM SACMAT 2003, Como, Italy • Turner et al., “Using Web Services to create an Information Broker”, to appear in Proceedings of ICSE 2004, IEEE Computer Society Press • UK NHS Patient Confidentiality process; Details: http://www.nhsia.nhs.uk/confidentiality/pages/consultation/ • XACML Profile for Role-based Access Control (RBAC); Details: http://docs.oasis-open.org/xacml/cd-xacml-rbac-profile-01.pdf IBHIS - 14 -

More Related