policy auditing over incomplete logs: theory, implementation and applications deepak garg 1, limin...

23
Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1 , Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie Mellon University) 2 Carnegie Mellon University

Upload: shirley-collicott

Post on 28-Mar-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Policy Auditing over Incomplete Logs: Theory, Implementation and Applications

Deepak Garg1, Limin Jia2 and Anupam Datta2

1MPI-SWS (work done at Carnegie Mellon University)2Carnegie Mellon University

Page 2: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Privacy

Personal information collected and used to provide services (census statistics, health care & financial services, targeted advertisements, social network services)

Organizational goals and individual privacy goals conflict

Page 3: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Privacy Legislation

Regulate use and disclosure of personal information, but allow organizational work to proceed

Examples: HIPAA (medical information), GLBA (financial information)

Page 4: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Research Goal

Build a principled system for enforcing practical privacy

policies

Non-trivial due to complexity of practical

privacy policies

Page 5: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Example from HIPAA Privacy RuleA covered entity may disclose an individual’s protected

health information (phi) to law-enforcement officials for the

purpose of identifying an individual if the individual made a

statement admitting participating in a violent crime that the

covered entity believes may have caused serious physical

harm to the victim

Concepts in privacy policies◦ Actions: send(p1, p2, m)◦ Roles: inrole(p2, law-enforcement)◦ Data attributes: attr_in(prescription, phi)◦ Temporal constraints: in-the-past(state(q, m))

◦ Purposes: purp_in(u, id-criminal)) ◦ Beliefs: believes-crime-caused-serious-harm(p, q, m)

Black-and-white

concepts

Grey concepts

Pre-emptive enforcement (access control or runtime monitoring) does not suffice

Must rely on after-the-fact audit

Page 6: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Audit-Based Approach

Privacy law

Computer-readable privacy policy

in first-order logic

Organizational audit log Detect

policy violations

Audit

Prior work

This paper

Collected by organizational

databases

Page 7: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Outline of TalkIntroductionOverview of Audit AlgorithmDetails of Audit AlgorithmFormal PropertiesConclusion

Page 8: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Challenge for Enforcement

Audit Logs are Incomplete

Future: store only past and current events

Example: Timely data breach notification refers to future event

Subjective: no “grey” informationExample: May not records evidence for purposes and beliefs

Spatial: remote logs may be inaccessible

Example: Logs distributed across different departments of a hospital

Page 9: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Abstract Model of Incomplete Logs

Model all incomplete logs uniformly as 3-valued structures

Define semantics (meanings of formulas) over 3-valued structures

Page 10: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

An Iterative Algorithm

Check as much policy as possible on

current log and output a residual policy.

Iterate when log is extended with more information.

Grey concepts checked by human auditor at any time.

Page 11: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Reduce: The Iterative Algorithm

reduce (L, φ) = φ'

φ0 φ1 φ2

reduce

reduce

Logs

Policy

Time

Page 12: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

12

φ =

∀p1, p2, m, u, q, t.

(send(p1, p2, m) ∧ tagged(m, q, t, u) ∧ attr_in(t, phi))

⊃ inrole(p2, law-enforcement)

∧ purp_in(u, id-criminal)

∧ m’. ( state(q, m’)

∧ is-admission-of-crime(m’)

∧ believes-crime-caused-serious-harm(p1, m’))

Example{ p1 UPMC, p2 allegeny-police, m M2, q Bob, u id-bank-robber, t date-of-treatment}

∧ purp_in(id-bank-robber, id-criminal)

{ m’ M1 }

∧ is-admission-of-crime(M1)

∧ believes-crime-caused-serious-harm(UPMC, M1)

Log

Jan 1, 2011state(Bob, M1)

Jan 5, 2011send(UPMC, allegeny-police, M2)tagged(M2, Bob, date-of-treatment, id-bank-robber)

Tφ' =

Page 13: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Reduce: Formal Definition

c is a formula for which satisfying substitutions of x can be computed

Initial policy must also pass a one-time, linear check called a mode check

We have verified that the entire HIPAA and GLBA Privacy Rules pass this check

Page 14: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Formal Properties of Reduce

Correctness

Page 15: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Formal Properties of Reduce

Complexity

Page 16: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Formal Properties of Reduce

Minimality of Output

Page 17: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Implementation and evaluation over simulated audit logs for compliance with all disclosure-related clauses of HIPAA Privacy Rule

Performance:◦ Average time for checking compliance of each

disclosure of protected health information is 0.16s for a 15MB log

Mechanical enforcement:◦ Reduce can automatically check 80% of all the

atomic predicates

Implementation and Case Study

Page 18: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Other Applications of ReduceRuntime monitoring

For policies that do not mention future obligations or grey concepts

Advisory tool: Is an action allowed?

Run reduce on hypothetical log containing the action

Page 19: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Closely Related WorkRuntime monitoring in MFOTL [Basin et al ’10]

Pre-emptive enforcementEfficient implementationAssumes past-completeness of logsLess expressive mode checking

Page 20: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Closely Related Work

Iterative Model Checking [Thati, Rosu ’05]

Propositional logicCannot express privacy legislation

Page 21: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

ConclusionIterative, interactive algorithm for

policy audit◦Checks as much policy as possible◦Outputs residual policy

Provably correct, efficient, optimal

Works with incomplete logsExpressive for real privacy laws

Page 22: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

Questions?

Page 23: Policy Auditing over Incomplete Logs: Theory, Implementation and Applications Deepak Garg 1, Limin Jia 2 and Anupam Datta 2 1 MPI-SWS (work done at Carnegie

The Case for AuditRun-time access control

mechanisms are not sufficient to enforce privacy policies◦Purposes & beliefs (“grey” concepts

on previous slide)◦And also future obligations (e.g.,

notice of data breach should go out within 30 days)

Human input is essential for resolving grey concepts