Title: Why provenance needs its own security model
1Why provenance needs its own security model
- Uri Braun
- PASS Team
- Harvard University
- Workshop on Principles of Provenance
- November 19-20, 07
2Provenance needs security
- Many provenance applications involve sensitive
data - Regulatory Compliance
- Electronic Medical Records
- National Security Intelligence
3National Intelligence EstimateData v. Provenance
Sensitivity
Vice Chair
Chair
Special Advisor
cp vice.txt /shared/
cp chair.txt /shared/
cp advisor.txt /shared/
Public cannot read
Public cannot read
Public cannot read
National Intelligence Estimate
cat /shared/.txt uniq
Public cannot read
4Outline
- Motivation
- Provenance needs its own security model
- Related Work
- Recap
5Provenance needs its own security model
- Sensitivity(Provenance) ? Sensitivity(Data)
- Can have cases where sensitivity of
- Data gt Provenance
- Provenance gt Data
6Performance ReviewData v. Provenance Sensitivity
Managers email
Employee cannot read
mail s Joes Review peer1, peer2
Employee cannot read
Employee cannot read
Email to Peer1
Email to Peer2
mail s RE Joes Review manager
mail s RE Joes Review manager
Employee cannot read
Employee cannot read
Email from Peer1
Email from Peer2
X
X
cp peer1 2s emails and edit
Employee can read
7National Intelligence EstimateData v. Provenance
Sensitivity
Vice Chair
Chair
Special Advisor
cp vice.txt /shared/
cp chair.txt /shared/
cp advisor.txt /shared/
Public cannot read
Public cannot read
Public cannot read
National Intelligence Estimate
cat /shared/.txt uniq
Public cannot read
8Different from traditional security models
- Requires attributes different from existing
security models - Relationships fundamentally different
- Leak information differently
9Performance ReviewRelationship Leak
Managers email
Employee cannot read
mail s Joes Review peer1, peer2
Employee cannot read
Employee cannot read
Email to Peer1
Email to Peer2
mail s RE Joes Review manager
mail s RE Joes Review manager
Employee cannot read
Employee cannot read
Email from Peer1
Email from Peer2
X
X
cp peer1 2s emails and edit
Employee can read
10Relationships leak informationin combination with
- Seemingly unrelated other relationships
- World knowledge
- Mere existence of a relationship
11Outline
- Motivation
- Provenance needs its own security model
- Related Work
- Provenance Projects
- Aggregation
- Applications
- Recap
12PASOA
- Does
- Ensure non-repudiation
- Federate identity
- Obscure portions of records
- Does not
- Consider relationships
- Provide fine grained access control
- Groth, et. al. D3.1.1 An Architecture for
Provenance Systems
13myGrid
- Does
- Authentication
- Access Control per repository
- Does not
- Consider relationships
- Fine grained access control
- Miles myGrid Security Issues
- Egglestone Security in the myGrid project
14Aggregate queries
- May help understand interaction among
relationships - Does not have a model for relationships
- No answers for
- Existence providing data
- Combining with world knowledge
15Information Flow
- Similar to aggregate queries in applicability
- How do we model
- Relationships
- World knowledge
- Existence
16Audit logs
- Audit logs useful for security
- Security also useful for audit logs
- Current security is still binary
- Total access
- No access
- Radack NIST SP 800-92 Guide to Computer Log
Management
17Metadata security
- Metadata embedded in documents
- Word change history has lead to many
unintentional well publicized leaks - Current solution is to remove metadata before
publishing externally
18Compliance
- Increasing interest in tightening financial
oversight - Growing focus on tracking the history of
decisions - Johnson Intersections of Law and Technology in
Balancing Privacy Rights with Free Information
Flow
19Electronic Medical Records
- Medical records include provenance
- HIPAA laws mandates access controls
- Agrawal Hippocratic Databases
20Outline
- Motivation
- Provenance needs its own security model
- Related Work
- Recap
21Recap
- Provenance needs security
- Security needs are different
- No known directly applicable model
22Questions?