SlideShare a Scribd company logo
!

Who has the data?
... and will breach the duty of confidence!
Emil Lupu

Imperial College London

Panel: Key Challenges in Distributed Security
22nd IFIP WG 11.3 Working Conference on Data and Applications Security
Body Area Networks for eHealth
Home Appliance
Control
Events

Monitor

Events

Manager
Agent
Managed
Objects

Control
actions

Decisions

Policies
New functionality

Body Area Networks

Policies
Ad-hoc collaborations
Pervasive Spaces

Events

Monitor

Events

Manager
Agent
Managed
Objects

Control
actions

Decisions

Policies
New functionality

Policies

PAN Control

Autonomous 

Vehicles

Personal Area Networks
Home Appliance
Control
Events

Monitor

Events

Manager
Agent
Managed
Objects

Control
actions

Decisions

Policies
New functionality

Policies

Intelligent Home
Networks

Pervasive
Environments
Observations
• Sensory data is continuously captured and aggregated. 

• Data is frequently exchanged at device level, at application level and at
institutional level.

• Data is often exchanged through intermediaries which may themselves have
rights to access the data (and aggregate or modify it) and is stored at multiple
locations. 

• Rights to access data are often determined by context which changes
dynamically (in addition to longer lived attributes e.g., role, competency,...)

• Decisions have to be made with intermittent network access, on devices with
limited computational capabilities and based on incomplete information.
Goals
• Retaining control over data usage once data has been exchanged remains an
elusive goal that appears in many application scenarios with varying threats. 

• Different research topics aim to address variations of the problem: Document
Protection Models, Privacy, UCON, DCON, DRM, ERM, Policy.

• It’s not just about Access Control but includes obligations (both imperative
and deontic), information filtering and/or transformation, monitored
conditions, association between policy and data. 

• Access Control models such as RBAC do not easily distribute, scale down or
combine with other concepts such as obligations.
Some lessons from elsewhere (non-security)
• Data processing and device management must be done as close to the origin
as possible. Protection?

• (Constrained) Programmability is the most efficient way of achieving
adaptation. 

• Agreements (Contracts) are often desired by all parties. 

• This would imply: 

• Protect data at source. Add layers e.g. when crossing domain boundaries 

• Policies (rules) follow data. Partially? enforced by the recepient; context. 

• Establish and enforce Data Sharing Agreements.
Consequence

Data Sharing 

Agreement
Refinement

Analysis
PRiMMA
• Enforcing privacy policies
on small devices

• Learning privacy policies
from user behaviour
Thank you!

More Related Content

PDF
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
PDF
WSN Security Research Directions
PDF
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
PPT
Poster nci 2010
PPTX
PPTX
Cyber Security Architecture - A Systems Approach December 05 2012
PPTX
Mobile Computing - Research Survey May 05 2012
PPT
00 what is_msit223(information technology)
Autonomous Pervasive Systems and the Policy Challenges of a Small World!
WSN Security Research Directions
Goal Decomposition and Abductive Reasoning for Policy Analysis and Refinement
Poster nci 2010
Cyber Security Architecture - A Systems Approach December 05 2012
Mobile Computing - Research Survey May 05 2012
00 what is_msit223(information technology)

What's hot (16)

PPTX
Interface interoperability
PDF
PERICLES workshop (London 15 October 2015) - Digital Ecosystem Model
PDF
IDS / IPS Survey
PDF
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
PDF
The Science of Cyber Security Experimentation: The DETER Project
PDF
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
PDF
Framework architecture for improving
PPT
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
PPTX
PERICLES Modelling Policies - Acting on Change 2016
PDF
Expert panel on industrialising microbiomics - with Unilever
PPT
06 styles and_greenfield_design
PDF
Finding Critical Link and Critical Node Vulnerability for Network
PPT
Challenges in SE: Knowledge reuse
PDF
Inspiration to Application: A Tutorial on Artificial Immune Systems
PDF
Inter-organisational Production Systems - 2012 STS Roundtable Presentation
PPTX
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
Interface interoperability
PERICLES workshop (London 15 October 2015) - Digital Ecosystem Model
IDS / IPS Survey
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
The Science of Cyber Security Experimentation: The DETER Project
The DETER Project: Advancing the Science of Cyber Security Experimentation an...
Framework architecture for improving
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infras...
PERICLES Modelling Policies - Acting on Change 2016
Expert panel on industrialising microbiomics - with Unilever
06 styles and_greenfield_design
Finding Critical Link and Critical Node Vulnerability for Network
Challenges in SE: Knowledge reuse
Inspiration to Application: A Tutorial on Artificial Immune Systems
Inter-organisational Production Systems - 2012 STS Roundtable Presentation
PERICLES Ecosystem Modelling (NCDD use case) - Acting on Change 2016
Ad

Similar to Who has the data ... and will breach the duty of confidence (20)

PPTX
Study of Security functionality in Distributed Database.pptx
PPTX
Final Study of Security functionality in Distributed Database.pptx
PPT
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
PDF
Mergers and Acquisition Security - Areas of Interest
PPT
Securing Apps & Data in the Cloud by Spyders & Netskope
PPTX
Data Domain-Driven Design
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PDF
Software Defined Networking in the ATMOSPHERE project
PPTX
Chapter_5_Security_CC.pptx
PDF
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
PPT
Mining IT Summit Nov 6 2014
PPTX
Unit -3.pptx cloud Security unit -3 notes
PPTX
Computer security concepts
PDF
Cervone uof t - nist framework (1)
PPTX
Data protection within development
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PPTX
Unit 9 Technological trends in Information Technology By Sulav Acharya
PPTX
Mobile database security threats
DOC
Information security
Study of Security functionality in Distributed Database.pptx
Final Study of Security functionality in Distributed Database.pptx
Securing Apps and Data in the Cloud - July 23 2014 Toronto Board of Trade
Mergers and Acquisition Security - Areas of Interest
Securing Apps & Data in the Cloud by Spyders & Netskope
Data Domain-Driven Design
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Software Defined Networking in the ATMOSPHERE project
Chapter_5_Security_CC.pptx
Beware the Firewall My Son: The Jaws That Bite, The Claws That Catch!
Mining IT Summit Nov 6 2014
Unit -3.pptx cloud Security unit -3 notes
Computer security concepts
Cervone uof t - nist framework (1)
Data protection within development
Unit 9 Technological trends in Information Technology By Sulav Acharya
Unit 9 Technological trends in Information Technology By Sulav Acharya
Mobile database security threats
Information security
Ad

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPT
Teaching material agriculture food technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Mushroom cultivation and it's methods.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Approach and Philosophy of On baking technology
PDF
August Patch Tuesday
PDF
A comparative analysis of optical character recognition models for extracting...
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
NewMind AI Weekly Chronicles - August'25-Week II
Teaching material agriculture food technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Mushroom cultivation and it's methods.pdf
A Presentation on Artificial Intelligence
Diabetes mellitus diagnosis method based random forest with bat algorithm
Heart disease approach using modified random forest and particle swarm optimi...
1. Introduction to Computer Programming.pptx
Approach and Philosophy of On baking technology
August Patch Tuesday
A comparative analysis of optical character recognition models for extracting...

Who has the data ... and will breach the duty of confidence

  • 1. ! Who has the data? ... and will breach the duty of confidence! Emil Lupu Imperial College London Panel: Key Challenges in Distributed Security 22nd IFIP WG 11.3 Working Conference on Data and Applications Security
  • 2. Body Area Networks for eHealth Home Appliance Control Events Monitor Events Manager Agent Managed Objects Control actions Decisions Policies New functionality Body Area Networks Policies
  • 4. Pervasive Spaces Events Monitor Events Manager Agent Managed Objects Control actions Decisions Policies New functionality Policies PAN Control Autonomous 
 Vehicles Personal Area Networks Home Appliance Control Events Monitor Events Manager Agent Managed Objects Control actions Decisions Policies New functionality Policies Intelligent Home Networks Pervasive Environments
  • 5. Observations • Sensory data is continuously captured and aggregated. • Data is frequently exchanged at device level, at application level and at institutional level. • Data is often exchanged through intermediaries which may themselves have rights to access the data (and aggregate or modify it) and is stored at multiple locations. • Rights to access data are often determined by context which changes dynamically (in addition to longer lived attributes e.g., role, competency,...) • Decisions have to be made with intermittent network access, on devices with limited computational capabilities and based on incomplete information.
  • 6. Goals • Retaining control over data usage once data has been exchanged remains an elusive goal that appears in many application scenarios with varying threats. • Different research topics aim to address variations of the problem: Document Protection Models, Privacy, UCON, DCON, DRM, ERM, Policy. • It’s not just about Access Control but includes obligations (both imperative and deontic), information filtering and/or transformation, monitored conditions, association between policy and data. • Access Control models such as RBAC do not easily distribute, scale down or combine with other concepts such as obligations.
  • 7. Some lessons from elsewhere (non-security) • Data processing and device management must be done as close to the origin as possible. Protection? • (Constrained) Programmability is the most efficient way of achieving adaptation. • Agreements (Contracts) are often desired by all parties. • This would imply: • Protect data at source. Add layers e.g. when crossing domain boundaries • Policies (rules) follow data. Partially? enforced by the recepient; context. • Establish and enforce Data Sharing Agreements.
  • 9. PRiMMA • Enforcing privacy policies on small devices • Learning privacy policies from user behaviour