24
1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 [email protected] www.profsandhu.com www.ics.utsa.edu © Ravi Sandhu World-Leading Research with Real-World Impact! Institute for Cyber Security

1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 [email protected]

Embed Size (px)

Citation preview

Page 1: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

1

The Data and Application Security and Privacy (DASPY) Challenge

Prof. Ravi SandhuExecutive Director and Endowed Chair

11/11/11

[email protected]

www.ics.utsa.edu

© Ravi Sandhu World-Leading Research with Real-World Impact!

Institute for Cyber Security

Page 2: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

The ATM (Automatic Teller Machine) network is secure enough (but insecure) global in scope and rapidly growing

But not securable by academically taught cyber security not studied as a success story missing technologies highly regarded by academia

Similar “paradoxes” apply to on-line banking e-commerce etc

© Ravi Sandhu 2World-Leading Research with Real-World Impact!

The ATM “Paradox”

Page 3: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Cyber technologies and systems have evolved

Cyber attacks and attackers have evolved Side note: all attackers are not evil

Cyber security (defensive) goals have evolved Computer security Information security = Computer security +

Communications security Information assurance Mission assurance

© Ravi Sandhu 3World-Leading Research with Real-World Impact!

Cyber Security Status

Page 4: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Cyber security research (and practice) are

rapidly loosing ground evolving glacially in spite of increase in funding and many innovative

research advances in spite of numerous calls for “game changing”

research

Grand challenge: how to become relevant to the real world

© Ravi Sandhu 4World-Leading Research with Real-World Impact!

Cyber Security Research Status

Page 5: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

We need to do something different

Rough analogies software engineering vis a vis programming data models (e.g., entity-relationship) vis a vis data

structures (e,g., B trees)

© Ravi Sandhu 5World-Leading Research with Real-World Impact!

Cyber Security Research Status

Page 6: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Cyber Security Characteristics

Cyber Security is all about tradeoffs

© Ravi Sandhu 6World-Leading Research with Real-World Impact!

Productivity Security

Let’s build itCash out the benefitsNext generation can secure it

Let’s not build itLet’s bake in super-security tomake it unusable/unaffordableLet’s mandate unproven solutions

There is a sweet spotWe don’t know how to predictably find it

Page 7: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

7World-Leading Research with Real-World Impact!

Cyber Security Characteristics

Tech-Light

Tech-Heavy

Tech-Medium

High-tech +

High-touch

© Ravi Sandhu

Page 8: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Microsec versus MacrosecMost cyber security thinking is microsecMost big (e.g., national level) cyber security

threats are macrosec

Rational microsec behavior can result in highly vulnerable macrosec

© Ravi Sandhu 8World-Leading Research with Real-World Impact!

Cyber Security Characteristics

Page 9: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Cyber Security Characteristics

© Ravi Sandhu 9World-Leading Research with Real-World Impact!

reality

perception

LOW HIGH

HIGH

Page 10: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

How to justify investing in security in presence of persistent insecurity?

And, where to invest?

mitigate known attacks in the wild? mitigate anticipated attacks? mitigate ultimate attacks? some combination?

© Ravi Sandhu 10World-Leading Research with Real-World Impact!

Cyber Security Characteristics

Page 11: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Develop a scientific discipline

to cover (at least) the previous characteristicsthat can be meaningfully taught in Universities at all

levels: BS, MS, PhD

Prognosiswe shall succeed (we have no choice)

© Ravi Sandhu 11World-Leading Research with Real-World Impact!

Academic Challenge

Page 12: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Insecurity is inevitableDeath is inevitable

Security investment is nevertheless justifiedMortals nevertheless seek medical care

Too much security can be counter productiveSo can too much medical care

© Ravi Sandhu 12World-Leading Research with Real-World Impact!

Driving Principles

Page 13: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

How can we be “secure” while being

“insecure”?

versus

How can we be “secure”?

© Ravi Sandhu 13World-Leading Research with Real-World Impact!

Central Question

Page 14: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Sometimes aiming high is very

appropriate The President’s nuclear football Secret formula for Coca Cola

Sometimes not ATM network On-line banking E-commerce (B2C)

© Ravi Sandhu 14World-Leading Research with Real-World Impact!

How Secure? How Insecure?

Page 15: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Monetary loss is easy to quantify and compensate

Security principles stop loss mechanisms audit trail (including physical video) retail loss tolerance with recourse wholesale loss avoidance

Technical surprises no asymmetric cryptography no annonymity

© Ravi Sandhu 15World-Leading Research with Real-World Impact!

Why is the ATM System Secure?

Application Centric

Page 16: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

16World-Leading Research with Real-World Impact!

Cyber Security Research

© Ravi Sandhu

FOUNDATIONSBuilding blocks and theory

ApplicationCentric

TechnologyCentric

AttackCentric

Page 17: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

17

The DASPY System Challenge

Security and system goals(objectives/policy)

Policy models

Enforcement models

Implementation models

Necessarily informal

Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting.Security analysis (objectives, properties, etc.).Approximated policy realized using system architecture with trusted servers, protocols, etc.Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.).Technologies such as Cloud Computing, Trusted Computing, etc.Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.)Software and HardwareConcrete System

© Ravi Sandhu World-Leading Research with Real-World Impact!

PEI

MODELS

Page 18: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

RBAC96 Model (P Layer)

© Ravi Sandhu 18World-Leading Research with Real-World Impact!

ROLES

USER-ROLEASSIGNMENT

PERMISSIONS-ROLEASSIGNMENT

USERS PERMISSIONS

... SESSIONS

ROLE HIERARCHIES

CONSTRAINTS

Page 19: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Server Pull Model (E Layer)

© Ravi Sandhu 19World-Leading Research with Real-World Impact!

Client Server

User-roleAuthorization

Server

Page 20: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

Client Pull Model (E Layer)

© Ravi Sandhu 20World-Leading Research with Real-World Impact!

Client Server

User-roleAuthorization

Server

Page 21: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

21

The DASPY System Challenge

Security and system goals(objectives/policy)

Policy models

Enforcement models

Implementation models

Necessarily informal

Specified using users, subjects, objects, admins, labels, roles, groups, etc. in an ideal setting.Security analysis (objectives, properties, etc.).Approximated policy realized using system architecture with trusted servers, protocols, etc.Enforcement level security analysis (e.g. stale information due to network latency, protocol proofs, etc.).Technologies such as Cloud Computing, Trusted Computing, etc.Implementation level security analysis (e.g. vulnerability analysis, penetration testing, etc.)Software and HardwareConcrete System

© Ravi Sandhu World-Leading Research with Real-World Impact!

PEI

MODELS

Page 22: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

22

g-SIS Model (P layer)

Operational aspects Group operation semanticso Add, Join, Leave, Remove, etco Multicast group is one example

Object modelo Read-onlyo Read-Write (no versioning vs versioning)

User-subject modelo Read-only Vs read-write

Policy specification Administrative aspects

Authorization to create group, user join/leave, object add/remove, etc.

© Ravi Sandhu World-Leading Research with Real-World Impact!

Users

Objects

GroupAuthz (u,o,r)?

join leave

add remove

Page 23: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

23

g-SIS Model (E layer)

© Ravi Sandhu World-Leading Research with Real-World Impact!

Super-Distribution (SD) Micro-Distribution (MD)

Scalability/Performance SD: Encrypt once, access where authorized MD: Custom encrypt for each user on initial access

Assurance/Recourse SD: Compromise one client, compromise group key MD: Compromise of one client contained to objects on that client

Page 24: 1 The Data and Application Security and Privacy (DASPY) Challenge Prof. Ravi Sandhu Executive Director and Endowed Chair 11/11/11 ravi.sandhu@utsa.edu

How can we be “secure” while being

“insecure”?

versus

How can we be “secure”?

© Ravi Sandhu 24World-Leading Research with Real-World Impact!

Conclusion