data and applications security developments and directions

26
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II February 8, 2006

Upload: betha

Post on 06-Jan-2016

32 views

Category:

Documents


2 download

DESCRIPTION

Data and Applications Security Developments and Directions. Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Inference Problem - II February 8, 2006. Outline. Security Constraint Processing Use of Conceptual Structures. Security Constraint Processing. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Data and Applications Security  Developments and Directions

Data and Applications Security Developments and Directions

Dr. Bhavani Thuraisingham

The University of Texas at Dallas

Lecture #8

Inference Problem - II

February 8, 2006

Page 2: Data and Applications Security  Developments and Directions

Outline Security Constraint Processing Use of Conceptual Structures

Page 3: Data and Applications Security  Developments and Directions

Security Constraint Processing Security Constraints are rules that assign security levels to the data MLS/DBMS is augmented with an Inference Engine Inference Engine is the Inference Controller Integrated Architecture for Security Constraint processing

- Query, Update and Database design operations

Page 4: Data and Applications Security  Developments and Directions

Inference Engine Approach

DatabaseMultilevelDatabase

MLS/DBMS

Inference Engine actsas an Inference Controller

Page 5: Data and Applications Security  Developments and Directions

Constraint Generation

DatabaseConsistent Constraints

DatabaseApplicationSpecification

DataMiningTool

Constraint

Generator

DatabasePrivacy Constraints

DataMiningTool

Consistency

Checker

DatabaseConsistent Constraints

DatabaseApplicationSpecification

DataMiningTool

Constraint

Generator

DatabaseSecurityConstraints

DataMiningTool

Consistency

Checker

Page 6: Data and Applications Security  Developments and Directions

Query Processor

DatabaseRelease

Database

DataMiningTool

User Interface Manager

DataMiningTool

Response

Processor

DataMiningTool

Response

Processor

DataMiningTool

Security Constraint Manager

DatabaseSecurityConstraints

DataMining

MLS/ DBMS

DataMiningTool

DataMiningTool

Release Database Manager

DataMiningTool

Query

Modifier

DataMiningTool

DataMiningTool

Release Database Manager

DataMiningTool

Query

Modifier

Page 7: Data and Applications Security  Developments and Directions

Update Processor

DataMiningTool

User Interface Manager

DataMining

MLS/ DBMS

DataMiningTool

SecurityLevelComputer

DataMiningTool

Security Constraint Manager

DatabaseSecurityConstraints

Page 8: Data and Applications Security  Developments and Directions

Database Design Tool

DatabaseSecurityConstraints

DatabasePrivacy Levels for Schema

DatabaseSecurityLevels for Schema

Data

MiningTool

Multilevel Database Design Tool

DataMiningTool

Security Constraint Manager

DatabaseDatabaseScheme

Page 9: Data and Applications Security  Developments and Directions

Integrated Architecture

User Interface Manager

ConstraintManager

Privacy Constraints Knowledge base

Query Processor:

Constraints during query and release operations

Update Processor:

Constraints during update operation

Database Design Tool

Constraints during database design operation

DatabaseDBMS

User Interface Manager

ConstraintManager

Privacy Constraints Knowledge base

Query Processor:

Constraints during query and release operations

Update Processor:

Constraints during update operation

Database Design Tool

Constraints during database design operation

DatabaseDBMS

User Interface Manager

ConstraintManager

Privacy Constraints Knowledge base

Query Processor:

Constraints during query and release operations

Update Processor:

Constraints during update operation

Database Design Tool

Constraints during database design operation

DatabaseDBMS

User Interface Manager

ConstraintManager

SecurityConstraints Knowledge base

Query Processor:

Constraints during query and release operations

Update Processor:

Constraints during update operation

Database Design Tool

Constraints during database design operation

MultilevelDatabase

MLS/DBMS

Page 10: Data and Applications Security  Developments and Directions

Release Control Management

DataMiningTool

User Interface Manager

DataMiningTool

Response

Processor

DataMiningTool

Response

Processor

DataMiningTool

Privacy Constraint Manager

DatabasePrivacy Constraints

DataMiningTool

DataMiningTool

Release ControlManager

Response

DatabaseRelease

Database

DataMiningTool

DBMS

DatabaseDatabase

DataMiningTool

User Interface Manager

DataMiningTool

Response

Processor

DataMiningTool

Response

Processor

DataMiningTool

Security Constraint Manager

DatabaseSecurityConstraints

DataMiningTool

DataMiningTool

Release ControlManager

Response

DatabaseRelease

Database

DataMiningTool

DBMS

DatabaseDatabase

DataMiningTool

User Interface Manager

DataMiningTool

Response

Processor

DataMiningTool

Response

Processor

DataMiningTool

Security Constraint Manager

DatabaseSecurityConstraints

DataMiningTool

DataMiningTool

Release ControlManager

Response

DatabaseRelease

Database

DataMiningTool

DBMS

DatabaseDatabase

DataMiningTool

DataMiningTool

Release ControlManager

Response

DatabaseRelease

Database

DataMiningTool

DBMS

DatabaseDatabase

Page 11: Data and Applications Security  Developments and Directions

Use of Conceptual Structures Use conceptual structures to model the application

- E.g., semantic data models, semantic nets, conceptual graphs, etc.

Use the reasoning strategy of the conceptual structure and determine if security violation via inference can occur

Page 12: Data and Applications Security  Developments and Directions

Multilevel Semantic Nets

SHIPSWEAPONS

CARRY

(a)

SHIPSWEAPONS

CARRY

(b)

SHIPSWEAPONS

CARRY

(c)

SHIPSWEAPONS

CARRY

(d)

SHIPSWEAPONS

CARRY

(e)

SHIPSWEAPONS

CARRY

(f)

SHIPSWEAPONS

CARRY

(g)

SHIPSWEAPONS

CARRY

(h)

SHIPSWEAPONS

CARRY

(a)

SHIPSWEAPONS

CARRY

(b)

SHIPSWEAPONS

CARRY

(c)

SHIPSWEAPONS

CARRY

(d)

SHIPSWEAPONS

CARRY

(e)

SHIPSWEAPONS

CARRY

(f)

SHIPSWEAPONS

CARRY

(g)

SHIPSWEAPONS

CARRY

(h)

Page 13: Data and Applications Security  Developments and Directions

Complex Multilevel Semantic Net

REAGAN

PassengersCarries

SUN Explosive

Mediterranean Sea

16 June 2000

India

ItalyDestination

Location

DateSmith

Captain

Battle Management

20 years

Skills

Skills

Type

Page 14: Data and Applications Security  Developments and Directions

ISA/AKO Links

SHIPSWEAPONS

ISA

(a)

SHIPSWEAPONS

(b)

REAGAN SHIP

(a)

SHIPWATER VEHICLE

AKO

(b)

Page 15: Data and Applications Security  Developments and Directions

Example Rules - II

SHIPSWEAPONS

(a)

SHIPWATER VEHICLE

AKO

VEHICLEAKO

AKO

SHIPSWEAPONS

(a)

SHIPWATER VEHICLE

AKO

VEHICLEAKO

AKO

SHIPSWEAPONS

(c)

REAGAN SHIPISA

WATER VEHICLE

AKO

ISA

SHIPSWEAPONS

(b)

SHIPWATER VEHICLE

AKO

PERSONHas Captain

Has Captain

SHIPSWEAPONS

(b)

SHIPWATER VEHICLE

AKO

PERSONHas Captain

Has Captain

Page 16: Data and Applications Security  Developments and Directions

Example Rules - II

SHIPSWEAPONS

(d)

REAGANSHIP

ISA

PERSONHas Captain

Has Captain

SHIPSWEAPONS

(d)

REAGANSHIP

ISA

PERSONHas Captain

Has Captain

SHIPSWEAPONS

(e)

REAGANIndia

Destination

COUNTRYISA

Destination

Page 17: Data and Applications Security  Developments and Directions

Applying Transfer Rules

REAGAN

SUN Explosive

Mediterranean Sea

IndiaDestination

Location

Carries

Type

(a)

REAGAN

SUN Explosive

Mediterranean Sea

India

Location

Carries

Type

(b)

Smith

Battle Management

Skills

REAGAN

SUN Explosive

Mediterranean Sea

IndiaDestination

Location

Carries

Type

(c) Combines (a) and (b)

Smith

Battle Management

Skills

Page 18: Data and Applications Security  Developments and Directions

Security Constraints

SHIPSWEAPONS

Carries

(a)

REAGAN SUN

SHIPS

Destination

Carries

(b)

REAGAN SUN

COUNTRY

Mediterranean

SHIPSWEAPONS

Carries

(a)

REAGAN SUN

SHIPS

Destination

Carries

(b)

REAGAN SUN

COUNTRY

Mediterranean

Location

Page 19: Data and Applications Security  Developments and Directions

Security Constraint Violation - I

REAGAN

Carries

SUN Explosive

Mediterranean Sea

COUNTRYDestination

Location

SmithCaptain

Battle Management

Skills

Type

REAGAN

Carries

SUN Explosive

Mediterranean Sea

India

Destination

Location

SmithCaptain

Battle Management

Skills

Type

(a)

COUNTRY

(b)

ISA

Page 20: Data and Applications Security  Developments and Directions

Security Constraint Violation - II

SHIPSWEAPONS

Carries

(a)

REAGAN EXPLOSIVEWEAPONS

SHIPS

ISA

Carries

(b)

SHIPEXPLOSIVEWEAPONS

REAGAN

CAPTAIN

Has

Page 21: Data and Applications Security  Developments and Directions

Universal and Existential Conditionals

SHIPS

Carries

Location

(a)

SHIP: ALL XMediterranean

SUN

COUNTRY:SOME Y

Destination

SHIPS

Carries

Location

(b)

SHIP: ALL XMediterranean

WEAPONS: SOME Y

India

Destination

Explosive

Page 22: Data and Applications Security  Developments and Directions

Matching Vectors

SHIPSWEAPONS

SHIPWATER VEHICLE

CARRIES

VEHICLETYPESHIPS: ALL X

WEAPONS

Net A

WEAPONSEXPLOSIVES

SHIPSWEAPONS

SHIPWATER VEHICLE

CARRIES

VEHICLETYPEREAGAN

WEAPONSWEAPONS

EXPLOSIVES

Net B

Page 23: Data and Applications Security  Developments and Directions

Matching and Binding

Carries

Location

(a)

SHIP: ALL XMediterranean

WEAPONS: SOME Y

India

Destination

Explosive

REAGAN

SUN Explosive

Mediterranean Sea

India

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(b)

REAGAN

SUN Explosive

Mediterranean Sea

India

Location

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(c ) Results from (a) and (b)

Carries

Location

(a)

SHIP: ALL XMediterranean

WEAPONS: SOME Y

India

Destination

Carries

Location

(a)

SHIP: ALL XMediterranean

WEAPONS: SOME Y

India

Destination

Explosive

REAGAN

SUN Explosive

Mediterranean Sea

India

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(b)

REAGAN

SUN Explosive

Mediterranean Sea

India

Location

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(c ) Results from (a) and (b)

Carries

Location

(a)

SHIP: ALL XMediterranean

WEAPONS: SOME Y

India

Destination

Explosive

REAGAN

SUN Explosive

Mediterranean Sea

India

Location

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(b)

REAGAN

SUN Explosive

Mediterranean Sea

India

Location

Smith Captain

Battle Management

New Delhi

Skills

Type

Carries

FLORIDA

MOONType

Capital

(c ) Results from (a) and (b)

Destination

Destination

Destination

Carries

Type

Carries

Page 24: Data and Applications Security  Developments and Directions

Negative Statements

SHIPSWEAPONS

DESTINATIONREAGAN

Italy

X

Page 25: Data and Applications Security  Developments and Directions

Refutation

SHIPSWEAPONS

DESTINATION

REAGANPacific Ocean

WEAPONSAustralia

(a)

SHIPSWEAPONS

DESTINATIONREAGAN

Australia

XX

SHIPSWEAPONS

FLORIDAREAGAN

WEAPONSAustralia

(c )

DESTINATION(b)

SHIPSFLORIDA

WEAPONSAustralia

DESTINATION

SHIPSFLORIDA

WEAPONSAustralia

LOCATION

WEAPONSREAGAN

Pacific Ocean

WEAPONSREAGAN

Pacific Ocean

(d)

SHIPSWEAPONS

FLORIDAREAGAN

WEAPONSAustralia

DESTINATION LOCATION

WEAPONSPacific Ocean

(e)

LOCATION

Page 26: Data and Applications Security  Developments and Directions

Directions

Inference problem is still being investigated Census bureau still working on statistical databases Need to find real world examples in the Military world Inference problem with respect to medial records Much of the focus is now on the Privacy problem Privacy problem can be regarded to be a special case of the

inference problem

thura
age