from chinese wall security policy models to granular computing

72
1 From Chinese Wall Security Policy Models to Granular Computing Tsau Young (T.Y.) Lin [email protected] [email protected] Computer Science Department, San Jose State University, San Jose, CA 95192, and Berkeley Initiative in Soft Computing, UC-Berkeley, Berkeley, CA 94720

Upload: ciqala

Post on 15-Jan-2016

48 views

Category:

Documents


0 download

DESCRIPTION

From Chinese Wall Security Policy Models to Granular Computing. Tsau Young (T.Y.) Lin [email protected] [email protected] Computer Science Department, San Jose State University, San Jose, CA 95192, and Berkeley Initiative in Soft Computing, UC-Berkeley, Berkeley, CA 94720. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: From Chinese Wall Security Policy Models to Granular Computing

1

From Chinese Wall Security Policy Models to Granular Computing

Tsau Young (T.Y.) Lin

[email protected] [email protected]

Computer Science Department, San Jose State University, San Jose, CA 95192,

and

Berkeley Initiative in Soft Computing, UC-Berkeley, Berkeley, CA 94720

Page 2: From Chinese Wall Security Policy Models to Granular Computing

2

From Chinese Wall Security Policy. . .

The goal of this talk is to illustrate how granular computing can be used to solved a long outstanding problem in computer security.

Page 3: From Chinese Wall Security Policy Models to Granular Computing

3

Outline

1. Overview(Main Ideas)

2. Detail Theory

Background

Brewer and Nash Vision

Formal Theory

2

Page 4: From Chinese Wall Security Policy Models to Granular Computing

4

Overview

New Methodology: Granular Computing

Classical Problem:Trojan Horses

Page 5: From Chinese Wall Security Policy Models to Granular Computing

5

Overview - Granular computing

Historical Notes

1. Zadeh (1979) Fuzzy sets and granularity

2. Pawlak, Tony Lee (1982):Partition Theory(RS)

3. Lin 1988/9: Neighborhood Systems(NS) and Chinese

Wall (a set of binary relations. A non-reflexive. . .)

4. Stefanowski 1989 (Fuzzified partition)

5. Qing Liu &Lin 1990 (Neighborhood system)

Page 6: From Chinese Wall Security Policy Models to Granular Computing

6

Overview-Granular computing

Historical Notes

6. Lin (1992):Topological and Fuzzy Rough Sets

7. Lin & Liu: Operator View of RS and NS (1993)

8. Lin & Hadjimichael : Non-classificatory hierarchy (1996)

Page 7: From Chinese Wall Security Policy Models to Granular Computing

7

Overview

Problem Solving Paradigm

Divide and Conquer

1. Divide: Partition (= Equivalence Relation)

2. Conquer: Quotient sets (Bo ZHANG, Knowledge Level Processing)

3. Could this be generalized?

Page 8: From Chinese Wall Security Policy Models to Granular Computing

8

Overview-Example

Partition: disjoint granules(Equivalence Class)

[0]4 = {. . . , 0, 4, 8, . . .}={4n},

[1]4 = {. . . , 1, 5, 9, . . .} ={4n+1},

[2]4 = {. . . , 2, 6, 10, . . .} ={4n+2},

[3]4 = {. . . , 3, 7, 11, . . .} ={4n+3}.

Quotient set = Z/4 (Z/m)

Page 9: From Chinese Wall Security Policy Models to Granular Computing

9

Overview-New Challenge?

Granulation: overlapping granules

B0 = {. . . , 0, 4, 8, 12,. . . 5, 9, }

B1 = {. . . , 1, 5, 9, . . .}

B2 = {. . . , 2, 6, 10, . . ., 7,}

B3 = {. . . , 3, 7, 11, . . ., 6, }.

Quotient ?

Page 10: From Chinese Wall Security Policy Models to Granular Computing

10

Overview-

Granular Computing - New Paradigm ?

Classical paradigm is unavailable for general granulation

Research Direction: New Paradigm ?

Page 11: From Chinese Wall Security Policy Models to Granular Computing

11

Overview- Granular Computing a New Problem Solving Paradigm

Divide and Conquer (incremental development)

1. Divide: Granulation (binary relation)

Topological Partition

2. Conquer: Topological Quotient Set

Page 12: From Chinese Wall Security Policy Models to Granular Computing

12

Application - New Paradigm ?

Report:

Applying an incremental progress

in granulation to

Classical problem in computer security

Page 13: From Chinese Wall Security Policy Models to Granular Computing

13

Overview - Trojan Horses

Classical Problem

Trojan Horses, e.g.virus propagation

Page 14: From Chinese Wall Security Policy Models to Granular Computing

14

Overview - Trojan Horses

Grader G is a conscientious student but lacking computer skills.

So a classmate C sets up a tool box that includes, e.g., editor, spread sheet, …;

Page 15: From Chinese Wall Security Policy Models to Granular Computing

15

Overview - Trojan Horses

C embeds a “copy program”

into G’s tool; it sends

a copy of G’s file to C

(university system normally allows students to exchange information)

Page 16: From Chinese Wall Security Policy Models to Granular Computing

16

Overview - Trojan Horses

As the Grader is not aware of such

Trojan Horses, he cannot stop them;

The system has to stop them!

Can it?

Page 17: From Chinese Wall Security Policy Models to Granular Computing

17

Overview - Trojan Horses

Can it?

In general, NO

With constraints, YES Chinese (Great) Wall Security Policy.

Page 18: From Chinese Wall Security Policy Models to Granular Computing

18

Overview - Trojan HorsesDirect Information flow(DIF); CIF, a sequence of

DIF’s, leaks the information legally !!!

Professor

Grader

StudentCIF

DIF Trojan horse(DIF)

Page 19: From Chinese Wall Security Policy Models to Granular Computing

19

Overview

End of Overview

Page 20: From Chinese Wall Security Policy Models to Granular Computing

20

Details

Background

Page 21: From Chinese Wall Security Policy Models to Granular Computing

21

Background

In UK, a financial service company may consulted by competing companies. Therefore it is vital to have a lawfully enforceable security policy.

3

Page 22: From Chinese Wall Security Policy Models to Granular Computing

22

Background

Brewer and Nash (BN) proposed Chinese Wall Security Policy Model (CWSP) 1989 for this purpose

Page 23: From Chinese Wall Security Policy Models to Granular Computing

23

Background

The idea of CWSP was, and still is, fascinating;

Unfortunately, BN made a technical error.

Page 24: From Chinese Wall Security Policy Models to Granular Computing

24

Outline

BN’s Vision

Page 25: From Chinese Wall Security Policy Models to Granular Computing

25

BN: Intuitive Wall Model

Built a set of impenetrable Chinese Walls among company datasets so that

No corporate data that are in conflict can be stored in the same side of the Walls

5

Page 26: From Chinese Wall Security Policy Models to Granular Computing

26

Policy: Simple CWSP (SCWSP)

"Simple Security", BN asserted that

"people (agents) are only allowed access to information which is notheld to conflict with any other information that they (agents) already possess."

Page 27: From Chinese Wall Security Policy Models to Granular Computing

27

Could Policy Enforce the Goal?

“YES” BN’s intent; technical flaw

Yes, but it relates an outstanding difficult problem in Computer Security

Page 28: From Chinese Wall Security Policy Models to Granular Computing

28

First analysis

Simple CWSP(SCWSP):

No single agent can read data X and Y

that are in CONFLICT

Is SCWSP adequate?

Page 29: From Chinese Wall Security Policy Models to Granular Computing

29

Formal Simple CWSP

SCWSP says that a system is secure, if

“(X, Y) CIR X NDIF Y “

“(X, Y) CIR X DIF Y “ (need to know may apply)CIR=Conflict of Interests Binary Relation

Page 30: From Chinese Wall Security Policy Models to Granular Computing

30

More Analysis

SCWSP requires no single agent can read X and Y,

but do not exclude the possibility a sequence of agents may read them

Is it secure?

Page 31: From Chinese Wall Security Policy Models to Granular Computing

31

Aggressive CWSP (ACWSP)

The Intuitive Wall Model implicitly requires: No sequence of agents can read X and Y:

A0 reads X=X0 and X1,

A1 reads X1 and X1,

. . .An reads Xn=Y

Page 32: From Chinese Wall Security Policy Models to Granular Computing

32

Can SCWSP enforce ACWSP?

Related to a Classical Problem

Trojan Horses

Page 33: From Chinese Wall Security Policy Models to Granular Computing

33

Current States

1.BN-Theory (Rough Computing)-failed

2.Granular Computing Method

Page 34: From Chinese Wall Security Policy Models to Granular Computing

34

Formal Model

When an agent, who has read both X and Y, considers a decision for Y,

information in X may be used

consciously or unconsciously.

Page 35: From Chinese Wall Security Policy Models to Granular Computing

35

Formal Model (DIF)

So the fair assumptions are:

if the same agent can read X and Y

X has direct information flowed into Y, in notation, X DIF Y

also Y DIF X . . .

Page 36: From Chinese Wall Security Policy Models to Granular Computing

36

Formal Simple CWSP

SCWSP says that a system is secure, if

“(X, Y) CIR X NDIF Y “

“(X, Y) CIR X DIF Y “

CIR=Conflict of Interests Binary Relation

Page 37: From Chinese Wall Security Policy Models to Granular Computing

37

Composite Information flow

Composite Information flow(CIF) is

a sequence of DIFs , denoted by such that

X=X0 X1 . . . Xn=Y

And we write X CIF Y

NCIF: No CIF

Page 38: From Chinese Wall Security Policy Models to Granular Computing

38

Formal Aggressive CWSP

Aggressive CWSP says that a system is secure, if

“(X, Y) CIR X NCIF Y “

“(X, Y) CIR X CIF Y “

Page 39: From Chinese Wall Security Policy Models to Granular Computing

39

The Problem

Simple CWSP ? Aggressive CWSP

This is a malicious Trojan Horse problem

Page 40: From Chinese Wall Security Policy Models to Granular Computing

40

Need ACWSP Theorem

Theorem If CIR is anti-reflexive, symmetric and anti-transitive, then

Simple CWSP Aggressive CWSP

Page 41: From Chinese Wall Security Policy Models to Granular Computing

41

Solution

BN’s solution

GrC Solution

Page 42: From Chinese Wall Security Policy Models to Granular Computing

42

BN-Theory(failed)

BN assumed:

Corporate data are decomposed into

Conflict of Interest Classes

(CIR-classes)

(implies CIR is an equivalence relation)

Page 43: From Chinese Wall Security Policy Models to Granular Computing

43

BN-Theory BN assumption: CIR-classes

Class A

Class B

f, g, h i, j, k

Class Cl, m, n

Page 44: From Chinese Wall Security Policy Models to Granular Computing

44

BN-Theory Can they be partitioned?

CUS, Russia

UK?

France, German

Page 45: From Chinese Wall Security Policy Models to Granular Computing

45

BN-theory

Is CIR Equivalence Relation?

NO (will prove)

Page 46: From Chinese Wall Security Policy Models to Granular Computing

46

Some Mathematics

A partition Equivalence Relation

Class A

Class B

f, g, h i, j, k

Class Cl, m, n

Page 47: From Chinese Wall Security Policy Models to Granular Computing

47

Some Mathematics

Partition Equivalence relation

X Y (Equivalence Relation)

if and only if

both belong to the same class/granule

Page 48: From Chinese Wall Security Policy Models to Granular Computing

48

Equivalence Relation Generalized Identity X X (Reflexive)

X Y implies Y X (Symmetric)

X Y, Y Z implies X Z (Transitive)

Page 49: From Chinese Wall Security Policy Models to Granular Computing

49

Is CIR Symmetric?

US (conflict) USSR

implies

USSR (conflict) US ?

YES

Page 50: From Chinese Wall Security Policy Models to Granular Computing

50

Is CIR Transitive?

US (conflict) Russia

Russia (conflict) UK

UK ? US

NO

Page 51: From Chinese Wall Security Policy Models to Granular Computing

51

Is CIR Reflexive?

Is CIR self conflicting?

US (conflict) US ?

NO

Page 52: From Chinese Wall Security Policy Models to Granular Computing

52

Is CIR Equivalence Relation?

NO

Page 53: From Chinese Wall Security Policy Models to Granular Computing

53

Overlapping CIR-classes

• CIR is not an equivalence relation, so CIR classes do overlap

US, UK, Iraq, . . .

USSR

Page 54: From Chinese Wall Security Policy Models to Granular Computing

54

BN-Theory

BN-Theory Failed, but

BN’ intention is valid

Page 55: From Chinese Wall Security Policy Models to Granular Computing

55

New Theory

Formalize BN’s intuition:

O: the set of objects(company datasets)

X, Y, . . . are objects

Page 56: From Chinese Wall Security Policy Models to Granular Computing

56

Summary on Simple CWSP “X and Y has no conflict then they can be read by same

agent “

“(X, Y) CIR X NDIF Y” B(X) ={Y | X NDIF Y }

={Y | (X, Y ) CIR }

6

Page 57: From Chinese Wall Security Policy Models to Granular Computing

57

Granule (“Access Lists”)

B(X) is a set of objects that information of X canNOT be flow into.

Granule / Neighborhood “Access Denied Lists”

Page 58: From Chinese Wall Security Policy Models to Granular Computing

58

DAC and GrC

The association

B: O 2O ; X B(X)

DAC (Discretionary Access Control Model) Basic (binary) Granulation/Neighborhood

System

Page 59: From Chinese Wall Security Policy Models to Granular Computing

59

Derived Equivalence Relation

The inverse images of B is a partition (an equivalence relation)

C ={Cp | Cp =B –1 (Bp) p V}

This is the heart of this talk

Page 60: From Chinese Wall Security Policy Models to Granular Computing

60

The set C of the center sets of CIR

The set C of center sets Cp is a partition

Iraq, . . .US, UK, . . .

German, . . .

Page 61: From Chinese Wall Security Policy Models to Granular Computing

61

C and CIR classes IJAR=Cp

CIR-class Cp -classes

Cp -classes

Page 62: From Chinese Wall Security Policy Models to Granular Computing

62

C and CIR classes

CIR-class Cp -classes

Cp -classes

Page 63: From Chinese Wall Security Policy Models to Granular Computing

63

C and CIR classes CIR: Anti-reflexive, symmetric, anti-transitive

CIR-class Cp -classes

Cp -classes

Page 64: From Chinese Wall Security Policy Models to Granular Computing

64

Derived Equivalence Relation

Cp is called the center set of Bp

A member of Cp is called a center.

Page 65: From Chinese Wall Security Policy Models to Granular Computing

65

Derived Equivalence Relation

The center set Cp consists of all the points that have the same granule

Center set Cp = {q | Bq= Bp}

Page 66: From Chinese Wall Security Policy Models to Granular Computing

66

Aggressive CWSP Theorem

Theorem. If CIR is anti-reflexive, symmetric, anti-transitive, then

C=IJAR(=complement of CIR).

Page 67: From Chinese Wall Security Policy Models to Granular Computing

67

Aggressive CWSP

CIR (with three conditions) only allows information sharing within one IJAR-class

An IJAR-class is an equivalence class; so there is no danger the information will spill to outside.

Page 68: From Chinese Wall Security Policy Models to Granular Computing

68

ACWSP

Theorem If CIR is anti-reflexive, symmetric and anti-transitive, then

Simple CWSP Strong CWSP

Page 69: From Chinese Wall Security Policy Models to Granular Computing

69

Conclusions

1. Classical Problem Solving Paradigm requires partitioning (equivalence relation) may be too strong

2. Classical idea is extended to granulation (binary relation)

Page 70: From Chinese Wall Security Policy Models to Granular Computing

70

Conclusions

3. A small success in apply new paradigm to computer security

4. CWSP is one of the the bigger problem, managing the Information Flow Model in DAC; this was considered impossible in the past.

Page 71: From Chinese Wall Security Policy Models to Granular Computing

71

Conclusions

5. BN’s requirements implies IJAR is an equivalence class. However, if we impose “need to know” constraint, then IJAR is not an equivalence class. Under such constraints, we have weaker form of CWSP theorem

Page 72: From Chinese Wall Security Policy Models to Granular Computing

72

AppendixAggressive CWSP Theorem

If CIR is anti-transitive non-empty and if (u, v) CIR implies that w V (at least one of (u, w) or (w, v) belongs to CIR ). Let (x, y) and (y, z) be in IJAR, we need to show that (x, z) be in IJAR. Assume contrarily, it is in CIR, by anti-transitive, one and only one of (x, y) or (y, z) be in CIR, that is the contradiction.