SlideShare a Scribd company logo
A Survey on Context Security Policies in the
Cloud
Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis,
Iraklis Paraskakis
1st International Workshop on Cloud Security and Data
Privacy by Design (CloudSPD'15) Limassol, Cyprus,
December 10, 2015
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
What is Context?
“Any information that can be
used to characterize the
situation of an entity. An entity is
a person, place, or object that is
considered relevant to the
interaction between a user and
an application, including the
user and applications
themselves” (Abowd, et al.,
1999; Dey, 2001)
3
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
What is Context-Aware Security?
“Context-aware security is the use of supplemental information to
improve security decisions at the time they are made, resulting in
more accurate security decisions capable of supporting dynamic
business and IT environments” (Gartner)
4
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
The Adoption of Cloud Computing
 Many users have started relying on cloud services without realizing it
 Many companies have remained cautious due to security concerns
 Applications and storage volumes often reside next to potentially hostile
virtual environments, leaving sensitive information at risk to theft,
unauthorized exposure or malicious manipulation
 Governmental regulation presents an additional concern of significant
legal and financial consequences if data confidentiality is breached
Focused interest Experimentation Near ubiquitous use
CloudAdoption
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Security Challenges in the Cloud
 Top four threats identified (CSA, 2013) are:
 data leakage
 data loss
 account hijacking
 insecure APIs
 The OWASP foundation has categorized the database-related
attacks as the most critical ones
 These attacks were responsible for 83% of the total records stolen
 The most critical part of a
modern cloud application is the
data persistency layer and the
database itself
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Related Work
 Commonly used access control models (Ferrari 2010) are:
 Mandatory Access Control (MAC)
 Discretionary Access Control (DAC)
 Role-Based Access Control (RBAC)
 The Attribute Based Access Control (ABAC)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
MAC and DAC Related Approaches
 Solutions that are based on MAC access control they
involve rigid and static methods (Jürjens, 2001)
 DAC models rely on access control matrices
 rows and columns correspond to subjects and objects
respectively
 their intersection points correspond to a set of allowed access
operations
 Access control lists (ACL)
 the controls are discretionary
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Role-Based Access Control (RBAC)
 Role
 a grouping mechanism for categorizing individual users (called subjects) based
on various properties (e.g. job title, user functions, responsibilities etc.).
 Each subject has a role set, which consists of all the roles
that the subject has been authorized to use.
 It lacks support for expressing access control conditions that refer to
the state of a system
 e.g. the state of a protected resource, parameter values, date or time
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Role-Based Access Control (RBAC)
 Extensions included
 Organization Role Base Access Control (ORBAC)
 authorization is given to users depending on their role in an organization in a
given context
 (Boustia & Mokhtari, 2008)
 Generalized RBAC (GRBAC)
 incorporates the concept of environment roles (Convington et al., 2001)
 Shortcomings
 proposes a domain specific environment role hierarchy, not easily extensible and manageable
in heterogeneous domains
 it doesn’t support the fine-grained modelling of different data objects
 Context-aware access control (CAAC)
 Shortcomings
 incorporate only specific types of contexts (Chandran & Joshi, 2005)
 lack of fine-grained data access control (Zhang & Parashar, 2004)
 inefficient inferring of context (Kayes et al., 2013)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
ABAC Related Approaches
 Authorization to perform operations is determined by
 evaluating attributes associated with the subject, object,
requested operations, and environment conditions
 Key difference
 It can express a complex Boolean rule set that can evaluate
many different attributes
 e.g. OASIS eXtensible Access Control Markup Language (XACML)
 declarative access control policies encouraging the separation of the access
decision from the point of use
 Location-aware access control (LAAC)
 No support of additional pertinent contextual information (Cleeff et
al.,2010)
 OWL-based inefficient inferring of context
 Onto-ACM (Choi et al., 2014), CONON (Wang et al., 2004), (Costabello et
al., 2012)
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Provide a set of unambiguous rules
 which are interpreted by enforcement mechanisms and which
constrain the behaviour of the entities.
 There is lack of proper separation of concerns (Kourtesis
and Paraskakis, 2012)
 The policy definition and policy enforcement are entangled in the
implementation of a single software component, leading to the
lack of
 portability
 explicit representation of policy relationships
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Syntactic Policy Description
 promotes a declarative approach to policy expression,
 where access rules are encoded imperatively, as part of the same
software that checks for their compliance.
 RuleML, XACML, WS-Trust
 fail to capture the knowledge lurking behind policies
 any interoperability relies on the use of vocabularies that are shared
among all parties involved in an interaction.
 leads to ad-hoc reasoning about policy compliance
 limits the reusability and portability of policies
 precludes the identification of inter-policy relations
 limits the ability to perform policy governance
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Policy Modeling
 Semantically-rich Policy Description
 employs ontologies in order to assign meaning to actors, actions
and resources
 ability to reason about policy compliance generically
 identification of inter-policy relations such as inconsistent policies, and
overlapping policies
 portability, visibility, and reusability of policies
 facilitates policy governance
 KAoS [Uszok et al., 2004], Rei [Kagal et al., 2003], [Hu et al.,
2011]
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Security-related context
 Related work on policy modeling
 PaaSword context-aware policy model
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context-aware Security Model
 A model for semantically describing associations
between types of access depending on the data objects
and circumstances under which this access should be
allowed
 These circumstances are determined based on contextual
information
 This model will constitute the background knowledge for
the DAO Annotations
 It will involve lightweight semantics for allowing efficient
inferencing
 It comprises of two dimensions related to
 dynamic security controls
 static security controls
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Context-aware Security Model
SMM: Security model management
DLM: Design-Time Library Management
AF: Annotation-formation
DAO: Data access object
SPM: Security Policies Management
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Ontologically Describing an Access Rule Template
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Agenda
 Introduction
 Data Security Challenges in the Cloud
 PaaSword Framework
 Conclusions
Information Management Unit / ICCS of NTUA www.imu.iccs.gr
Conclusions & Next Steps
 Future work involves the development of appropriate Context and
Policy models editors
 Implementation and validation of the proposed framework in 5
pilots:
 Encrypted persistency as a service in a PaaS provider
 Intergovernmental secure document and personal data exchange
 Secure sensors data fusion and analytics
 Protection of personal data in a multi-tenant CRM
 Protection of sensible enterprise information in multi-tenant ERP
Thank you for listening!
Acknowledgements:
This work is related to the PaaSword project and
has received funding from the European Union’s
Horizon 2020 research and innovation
programme under grant agreement No 644814

More Related Content

PDF
NIST Privacy Engineering Working Group -- Risk Models
PDF
A provenance policy based access
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
PDF
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
DOC
report on Mobile security
PPT
Chapter006
PDF
Knowledge brief securonix-ueba-market_2018-spark-matrix
PPTX
Enterprise Architecture and Information Security
NIST Privacy Engineering Working Group -- Risk Models
A provenance policy based access
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
report on Mobile security
Chapter006
Knowledge brief securonix-ueba-market_2018-spark-matrix
Enterprise Architecture and Information Security

What's hot (19)

PDF
Data Center Security Market — Explore latest facts on networking 2025
PDF
Prevention is futile in 2020 - Gartner Report in Retrospect
PDF
Enterprise Information Security Architecture_Paper_1206
PDF
Bf25342345
PDF
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
PPT
Ea Relationship To Security And The Enterprise V1
 
PDF
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
PPTX
Professional designations in it governance
PDF
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
PDF
Enterprise Security Architecture: From access to audit
PDF
Key Enterprise Mobility Trends of 2015
PPT
Open group spc rosenthal v3
PDF
Zachman Enterprise Security Architecture
PPTX
Does Anyone Remember Enterprise Security Architecture?
PDF
TOGAF 9 - Security Architecture Ver1 0
PPTX
Conceptual security architecture
PDF
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PDF
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Data Center Security Market — Explore latest facts on networking 2025
Prevention is futile in 2020 - Gartner Report in Retrospect
Enterprise Information Security Architecture_Paper_1206
Bf25342345
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Ea Relationship To Security And The Enterprise V1
 
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
Professional designations in it governance
An Empirical Study on the Security Measurements of Websites of Jordanian Publ...
Enterprise Security Architecture: From access to audit
Key Enterprise Mobility Trends of 2015
Open group spc rosenthal v3
Zachman Enterprise Security Architecture
Does Anyone Remember Enterprise Security Architecture?
TOGAF 9 - Security Architecture Ver1 0
Conceptual security architecture
CONTEXT, CONTENT, PROCESS” APPROACH TO ALIGN INFORMATION SECURITY INVESTMENTS...
Cybersecurity Capability Maturity Model (C2M2)
Cybersecurity Risk -- Redefing real risk measurement for the CISO
Ad

Viewers also liked (17)

PDF
Williams stephanie finalppp
PPTX
језичке недоумице
PPTX
Sinclair powerpoint
PPTX
Asthma phenotypes
PPTX
PaaSword Presentation - Project Overview
PDF
HomeClass KEUKENS en BADKAMERS
PPTX
FLEXIGRIP Thoracic Trauma Workshop Mons 230115
PPTX
NEOVEIL presentation UZ Leuven 230315
PPTX
малообеспеченные семьи лютова
PPTX
1. Membuat Blog Dengan Wordpress
DOCX
Press Release 1
PDF
Catalogo lacovadonga2015
PPTX
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
PPT
Enviroment Project
PPTX
Production of double page spread image
PPTX
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
Williams stephanie finalppp
језичке недоумице
Sinclair powerpoint
Asthma phenotypes
PaaSword Presentation - Project Overview
HomeClass KEUKENS en BADKAMERS
FLEXIGRIP Thoracic Trauma Workshop Mons 230115
NEOVEIL presentation UZ Leuven 230315
малообеспеченные семьи лютова
1. Membuat Blog Dengan Wordpress
Press Release 1
Catalogo lacovadonga2015
DMSSO 2016 - The Real State of SEO in 2016 and Beyond @nagyseo
Enviroment Project
Production of double page spread image
STRATOS ICU Presentation CHR La Citadelle Liège 280315 short version
Ad

Similar to A Survey on Context Security Policies in the Cloud (20)

PDF
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PPT
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PDF
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
PDF
In-Depth Analysis and Systematic Literature Review on Risk Based Access Contr...
PDF
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
DOC
Only Abstract
PPTX
DC MEETING I on 19.3.2024 design of context aware security model
PDF
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
PDF
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
DOCX
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
PDF
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
PDF
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
PDF
Enhancing Software Supply Chain Resilience: Strategy for Mitigating Software ...
PDF
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
DOCX
In what ways do you think the Elaboration Likelihood Model applies.docx
PDF
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
PDF
Tools and Techniques for Cloud Security download
PDF
Welcome to International Journal of Engineering Research and Development (IJERD)
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud ...
IN-DEPTH ANALYSIS AND SYSTEMATIC LITERATURE REVIEW ON RISK BASED ACCESS CONTR...
In-Depth Analysis and Systematic Literature Review on Risk Based Access Contr...
PLANT LEAF DISEASES IDENTIFICATION IN DEEP LEARNING
Only Abstract
DC MEETING I on 19.3.2024 design of context aware security model
An Enhancement Role and Attribute Based Access Control Mechanism in Big Data
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
Running head INFORMATION SECURITY1INFORMATION SECURITY6.docx
IT SECURITY PLAN FOR FLIGHT SIMULATION PROGRAM
DISSERTATION ALGORITHM DEVELOPMENT TIPS FOR DEVELOPING SECURE AND FLEXIBLE MA...
Enhancing Software Supply Chain Resilience: Strategy for Mitigating Software ...
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTURE
In what ways do you think the Elaboration Likelihood Model applies.docx
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
Tools and Techniques for Cloud Security download
Welcome to International Journal of Engineering Research and Development (IJERD)

More from PaaSword EU Project (12)

PDF
PaaSword - Distributed Searchable Encryption Engine
PDF
PaaSword - No More Dark Clouds with PaaSword
PDF
PaaSword - Technology Baseline
PDF
PaaSword - Context-aware Access Control
PDF
PaaSword-Business Cases
PDF
Daten unter Kontrolle
PDF
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
PDF
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
PDF
Towards Trusted eHealth Services in the Cloud
PDF
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
PDF
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PDF
PaaSword's main idea, technical architecture and scientific challenges
PaaSword - Distributed Searchable Encryption Engine
PaaSword - No More Dark Clouds with PaaSword
PaaSword - Technology Baseline
PaaSword - Context-aware Access Control
PaaSword-Business Cases
Daten unter Kontrolle
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
A Data Privacy and Security by Design Platform‐as‐a‐Service Framework
Towards Trusted eHealth Services in the Cloud
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
PaaSword's main idea, technical architecture and scientific challenges

Recently uploaded (20)

PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPTX
Derivatives of integument scales, beaks, horns,.pptx
PDF
An interstellar mission to test astrophysical black holes
PPT
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
PPTX
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
PDF
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
PPTX
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PDF
. Radiology Case Scenariosssssssssssssss
DOCX
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PPTX
2. Earth - The Living Planet earth and life
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PDF
bbec55_b34400a7914c42429908233dbd381773.pdf
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PPTX
SCIENCE10 Q1 5 WK8 Evidence Supporting Plate Movement.pptx
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
Classification Systems_TAXONOMY_SCIENCE8.pptx
Derivatives of integument scales, beaks, horns,.pptx
An interstellar mission to test astrophysical black holes
The World of Physical Science, • Labs: Safety Simulation, Measurement Practice
GEN. BIO 1 - CELL TYPES & CELL MODIFICATIONS
Formation of Supersonic Turbulence in the Primordial Star-forming Cloud
Vitamins & Minerals: Complete Guide to Functions, Food Sources, Deficiency Si...
Introduction to Fisheries Biotechnology_Lesson 1.pptx
. Radiology Case Scenariosssssssssssssss
Q1_LE_Mathematics 8_Lesson 5_Week 5.docx
TOTAL hIP ARTHROPLASTY Presentation.pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
Phytochemical Investigation of Miliusa longipes.pdf
2. Earth - The Living Planet earth and life
7. General Toxicologyfor clinical phrmacy.pptx
microscope-Lecturecjchchchchcuvuvhc.pptx
bbec55_b34400a7914c42429908233dbd381773.pdf
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
SCIENCE10 Q1 5 WK8 Evidence Supporting Plate Movement.pptx

A Survey on Context Security Policies in the Cloud

  • 1. A Survey on Context Security Policies in the Cloud Yiannis Verginadis, Gregoris Mentzas, Simeon Veloudis, Iraklis Paraskakis 1st International Workshop on Cloud Security and Data Privacy by Design (CloudSPD'15) Limassol, Cyprus, December 10, 2015
  • 2. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 3. Information Management Unit / ICCS of NTUA www.imu.iccs.gr What is Context? “Any information that can be used to characterize the situation of an entity. An entity is a person, place, or object that is considered relevant to the interaction between a user and an application, including the user and applications themselves” (Abowd, et al., 1999; Dey, 2001) 3
  • 4. Information Management Unit / ICCS of NTUA www.imu.iccs.gr What is Context-Aware Security? “Context-aware security is the use of supplemental information to improve security decisions at the time they are made, resulting in more accurate security decisions capable of supporting dynamic business and IT environments” (Gartner) 4
  • 5. Information Management Unit / ICCS of NTUA www.imu.iccs.gr The Adoption of Cloud Computing  Many users have started relying on cloud services without realizing it  Many companies have remained cautious due to security concerns  Applications and storage volumes often reside next to potentially hostile virtual environments, leaving sensitive information at risk to theft, unauthorized exposure or malicious manipulation  Governmental regulation presents an additional concern of significant legal and financial consequences if data confidentiality is breached Focused interest Experimentation Near ubiquitous use CloudAdoption
  • 6. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Security Challenges in the Cloud  Top four threats identified (CSA, 2013) are:  data leakage  data loss  account hijacking  insecure APIs  The OWASP foundation has categorized the database-related attacks as the most critical ones  These attacks were responsible for 83% of the total records stolen  The most critical part of a modern cloud application is the data persistency layer and the database itself
  • 7. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 8. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Related Work  Commonly used access control models (Ferrari 2010) are:  Mandatory Access Control (MAC)  Discretionary Access Control (DAC)  Role-Based Access Control (RBAC)  The Attribute Based Access Control (ABAC)
  • 9. Information Management Unit / ICCS of NTUA www.imu.iccs.gr MAC and DAC Related Approaches  Solutions that are based on MAC access control they involve rigid and static methods (Jürjens, 2001)  DAC models rely on access control matrices  rows and columns correspond to subjects and objects respectively  their intersection points correspond to a set of allowed access operations  Access control lists (ACL)  the controls are discretionary
  • 10. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Role-Based Access Control (RBAC)  Role  a grouping mechanism for categorizing individual users (called subjects) based on various properties (e.g. job title, user functions, responsibilities etc.).  Each subject has a role set, which consists of all the roles that the subject has been authorized to use.  It lacks support for expressing access control conditions that refer to the state of a system  e.g. the state of a protected resource, parameter values, date or time
  • 11. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Role-Based Access Control (RBAC)  Extensions included  Organization Role Base Access Control (ORBAC)  authorization is given to users depending on their role in an organization in a given context  (Boustia & Mokhtari, 2008)  Generalized RBAC (GRBAC)  incorporates the concept of environment roles (Convington et al., 2001)  Shortcomings  proposes a domain specific environment role hierarchy, not easily extensible and manageable in heterogeneous domains  it doesn’t support the fine-grained modelling of different data objects  Context-aware access control (CAAC)  Shortcomings  incorporate only specific types of contexts (Chandran & Joshi, 2005)  lack of fine-grained data access control (Zhang & Parashar, 2004)  inefficient inferring of context (Kayes et al., 2013)
  • 12. Information Management Unit / ICCS of NTUA www.imu.iccs.gr ABAC Related Approaches  Authorization to perform operations is determined by  evaluating attributes associated with the subject, object, requested operations, and environment conditions  Key difference  It can express a complex Boolean rule set that can evaluate many different attributes  e.g. OASIS eXtensible Access Control Markup Language (XACML)  declarative access control policies encouraging the separation of the access decision from the point of use  Location-aware access control (LAAC)  No support of additional pertinent contextual information (Cleeff et al.,2010)  OWL-based inefficient inferring of context  Onto-ACM (Choi et al., 2014), CONON (Wang et al., 2004), (Costabello et al., 2012)
  • 13. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 14. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Provide a set of unambiguous rules  which are interpreted by enforcement mechanisms and which constrain the behaviour of the entities.  There is lack of proper separation of concerns (Kourtesis and Paraskakis, 2012)  The policy definition and policy enforcement are entangled in the implementation of a single software component, leading to the lack of  portability  explicit representation of policy relationships
  • 15. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Syntactic Policy Description  promotes a declarative approach to policy expression,  where access rules are encoded imperatively, as part of the same software that checks for their compliance.  RuleML, XACML, WS-Trust  fail to capture the knowledge lurking behind policies  any interoperability relies on the use of vocabularies that are shared among all parties involved in an interaction.  leads to ad-hoc reasoning about policy compliance  limits the reusability and portability of policies  precludes the identification of inter-policy relations  limits the ability to perform policy governance
  • 16. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Policy Modeling  Semantically-rich Policy Description  employs ontologies in order to assign meaning to actors, actions and resources  ability to reason about policy compliance generically  identification of inter-policy relations such as inconsistent policies, and overlapping policies  portability, visibility, and reusability of policies  facilitates policy governance  KAoS [Uszok et al., 2004], Rei [Kagal et al., 2003], [Hu et al., 2011]
  • 17. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Security-related context  Related work on policy modeling  PaaSword context-aware policy model  Conclusions
  • 18. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Context-aware Security Model  A model for semantically describing associations between types of access depending on the data objects and circumstances under which this access should be allowed  These circumstances are determined based on contextual information  This model will constitute the background knowledge for the DAO Annotations  It will involve lightweight semantics for allowing efficient inferencing  It comprises of two dimensions related to  dynamic security controls  static security controls
  • 19. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Context-aware Security Model SMM: Security model management DLM: Design-Time Library Management AF: Annotation-formation DAO: Data access object SPM: Security Policies Management
  • 20. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Ontologically Describing an Access Rule Template
  • 21. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Agenda  Introduction  Data Security Challenges in the Cloud  PaaSword Framework  Conclusions
  • 22. Information Management Unit / ICCS of NTUA www.imu.iccs.gr Conclusions & Next Steps  Future work involves the development of appropriate Context and Policy models editors  Implementation and validation of the proposed framework in 5 pilots:  Encrypted persistency as a service in a PaaS provider  Intergovernmental secure document and personal data exchange  Secure sensors data fusion and analytics  Protection of personal data in a multi-tenant CRM  Protection of sensible enterprise information in multi-tenant ERP
  • 23. Thank you for listening! Acknowledgements: This work is related to the PaaSword project and has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 644814