SlideShare una empresa de Scribd logo
1 de 18
Descargar para leer sin conexión
A Distributed Architecture for
Sharing Ecological Data Sets with
Access and Usage Control
Guarantees
Ph.Bonnet,	
  J.Gonzalez	
  and	
  J.	
  Granados	
  
jgon@itu.dk	
  
	
  
Sensor data lifecycle
Instruments	
  
Raw	
  	
  
Measurements	
  
Data	
  
Products	
  
Data	
  
Products	
  
Data	
  
Products	
  
Data	
  
Products	
  
Data	
  
Products	
  
Model	
  
Archive	
  
l  Focus on instrumentation and
data sharing
-  DB models defined at
institution level for archiving/
sharing
-  Typically, each data set is a
separate entity. Focus is on
making data accessible, not on
making it easy/efficient to later
on work with this data.
-  Sharing policies defined but
not enforced by the IT
infrastructure.
Interact Project – Workflow Scenario
l  Transnational access (INTERACT)
l  GOAL: People work on several sites and integrate observations across sites.
l  Field stations (Zackenberg, Abisko, ...)
l  Some sensors and data loggers are deployed for automatic data acquisition. Technicians (A) or
researchers (B) go in the field to collect data from data loggers or to manually perform data
acquisition.
l  Data is handed to a program manager (monitoring activities). Researchers gather their observations
(research activities). This is a form of manual sneakernet.
l  Field stations are not online. They are hard to access. People work on a single site.
l  Monitoring
l  Program managers collect raw data and lead the cleaning process that might involve colleagues in
other institutions.
l  Cleaned up data is then made publically available (as promised to the funding agency). In practice the
public data sets from the monitoring programs are very difficult to work with for people who have
not collected them (as data sets are just dumped, there is no query capabilities).
l  Research
l  B collected data in the field, and collaborates with C to build a model, interpret it and write a paper
about it.
l  Until the paper is published, B and C jealously keep their data. When the paper is published B and C
make the data sets used for the graphs publically available on KBN (as required by Nature).
l  B archives the raw data and shares it with C (password protected ftp server at U.Oulu)
l  R reads a nature paper and gets access to the derived data set.
Data Sharing
l  Sensitive data?
l  No, not really. Nothing like a patient record. Data is neither personal, nor classified.
l  However, we need incentives to encourage data sharing.
Most researchers happily embrace the idea of sharing. It opens up observations to
independent scrutiny, fosters new collaborations and encourages further discoveries
in old data sets. But in practice those advantages often fail to outweigh researchers'
concerns. What will keep work from being scooped, poached or misused? What
rights will the scientists have to relinquish? Where will they get the hours and money
to find and format everything?
http://www.nature.com/news/2009/090909/full/461160a.html
l  Our vision
l  A decentralized architecture enables researchers to keep on working as they used to.
l  They will now be able to control and audit who is accessing your data.
Interact Project - Tomorrow
l  Virtual Instrumentation
l  Data loggers are networked and made available online (via a gateway that
controls access to a field station server that collects data from the data loggers).
l  The data streams generated by the sensor are gathered on the data loggers,
replicated on the field server and on the gateway.
l  Gateways are publically accessible (via subscriptions or access to snapshot data
sets). Access rights should be enforced to differentiate public access to views over
the data streams/snapshots and full access (to some data streams) by M on the
data she manages.
l  Sneakernet is still required for those data which are manually collected (for backup
purposes).
l  Decentralized Architecture to enforce Access and Usage Control
l  What is usage control?
l  How to enforce it?
UCONABC
Jaehong Park and Ravi Sandhu. The UCONabc usage control model. ACM Trans. Inf. Syst.
Secur., 7(1):128–174, February 2004.
Audit: a posteriori control
of how rights were used
Enforcement: a priori
control of usage rights
Formal Model
Strong security
Assumptions
No implementation!
Jaehong Park and Ravi Sandhu. The UCONabc usage control model. ACM Trans. Inf. Syst.
Secur., 7(1):128–174, February 2004.
Can model complex
frameworks
UCONABC
Requirements UCONABC
UCON needs to be implemented within a security
perimeter protected by hardware so that attackers with
administrator privileges cannot disable it using software.
From inside the security perimeter it should be possible
to “monitor” programs outside the security perimeter
Communicating with programs in the security perimeter
should entail a low overhead
Secure Platforms
Level of
Protection
Communication
Execution
Environment
Only Software Rich OS
Rich OS + TEE
SW and Tamper
resistant HW
Secure
Ad-how OS
Narrow
Interfaces
Very High
Low
Messages,
Sockets, SM
Software and
Hardware
Shared
Memory
Medium/High ARM TrustZone
Examples
Android, Linux,
IOS, Windows
IBM CryptoCards,
TPM, Secure Token
Normal Execution Environment Security Perimeter
Monitor
With Low
Overhead
Protected by
HardwareAll Sorts of Applications
Monitoring
Applications
Building Blocks
Integrity
Confidentiality
(encryption)
Enforce usage
policies
Define usage
policies (UCON)
UsageControl	
  
Trusted Integrity Module (TIM)
Background Information
Secondary storage is exposed to attacks and data
corruption, both when data is at rest and in use.
Logs are a vital component to verify the integrity of a
running system. They can - and will – be tampered with
by an attacker (101 system hacking)
Integrity is the base (root of trust) to build usage control.
Indeed, usage control policies emerge from it.
Architecture
Trusted Integrity Module (TIM)
Contribution
Trusted Integrity Module (TIM)
Usage control policies emerge naturally from TIM, acting
as a base for complex UCON-based policies
Provide an architecture to guarantee the integrity of
system files adding a low overhead to file system
primitives
Provide an method to log actions involving system files
in trusted storage, preventing attackers to clean after
themselves
Next Steps
Implement UCON on top of TIM to add complex usage
control policies to secure file operations (i.e.,
enforcement, embedded behaviour, and audit)
Extend TIM with a machine learning algorithm to learn
from past attacks - antifrigility
Exploring how to monitor running processes without
introducing a big overhead. Ideas: Use of resources,
peripherals, etc.
Conclusion
•  Vision: Data sharing policies enforced by IT infrastructure
–  Potential benefits for scientific data sharing, as well as
privacy in general
•  Work under way to realize this vision based on software
components executed in Trusted Execution Environments
(protected by hardware).
A Distributed Architecture for
Sharing Ecological Data Sets with
Access and Usage Control
Guarantees
Ph.Bonnet,	
  J.Gonzalez	
  and	
  J.	
  Granados	
  
jgon@itu.dk	
  
	
  Slides available at http://javigon.com/publications	
  

Más contenido relacionado

La actualidad más candente

Eyeo 2019-Lightning-Cytoscape
Eyeo 2019-Lightning-CytoscapeEyeo 2019-Lightning-Cytoscape
Eyeo 2019-Lightning-CytoscapeKeiichiro Ono
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...ijassn
 
Rapid Sensor Data Modeling
Rapid Sensor Data ModelingRapid Sensor Data Modeling
Rapid Sensor Data ModelingAlys Spillman
 
Virtual Research Environment for Cancer Imaging
Virtual Research Environment for Cancer ImagingVirtual Research Environment for Cancer Imaging
Virtual Research Environment for Cancer ImagingJisc
 
Concept Drift Identification using Classifier Ensemble Approach
Concept Drift Identification using Classifier Ensemble Approach  Concept Drift Identification using Classifier Ensemble Approach
Concept Drift Identification using Classifier Ensemble Approach IJECEIAES
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionJean-Paul Calbimonte
 
Emergency Management Through Sensor of Enterprise Systems
Emergency Management Through Sensor of Enterprise SystemsEmergency Management Through Sensor of Enterprise Systems
Emergency Management Through Sensor of Enterprise SystemsKiran Vemuri
 
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesA Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesKaashivInfoTech Company
 
ITK Tutorial Presentation Slides-943
ITK Tutorial Presentation Slides-943ITK Tutorial Presentation Slides-943
ITK Tutorial Presentation Slides-943Kitware Kitware
 
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...Robert Grossman
 
What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?Robert Grossman
 
Introduction to Biological Network Analysis and Visualization with Cytoscape ...
Introduction to Biological Network Analysis and Visualization with Cytoscape ...Introduction to Biological Network Analysis and Visualization with Cytoscape ...
Introduction to Biological Network Analysis and Visualization with Cytoscape ...Keiichiro Ono
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report IIIMatteo Avalle
 
Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridIan Foster
 
EdgarDB overview
EdgarDB overviewEdgarDB overview
EdgarDB overviewMark Khoury
 
Briefing Room analyst comments - streaming analytics
Briefing Room analyst comments - streaming analyticsBriefing Room analyst comments - streaming analytics
Briefing Room analyst comments - streaming analyticsmark madsen
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approachijdms
 

La actualidad más candente (20)

Eyeo 2019-Lightning-Cytoscape
Eyeo 2019-Lightning-CytoscapeEyeo 2019-Lightning-Cytoscape
Eyeo 2019-Lightning-Cytoscape
 
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
NO PUBLICATION CHARGES - International Journal of Advanced Smart Sensor Netwo...
 
Rapid Sensor Data Modeling
Rapid Sensor Data ModelingRapid Sensor Data Modeling
Rapid Sensor Data Modeling
 
Virtual Research Environment for Cancer Imaging
Virtual Research Environment for Cancer ImagingVirtual Research Environment for Cancer Imaging
Virtual Research Environment for Cancer Imaging
 
Concept Drift Identification using Classifier Ensemble Approach
Concept Drift Identification using Classifier Ensemble Approach  Concept Drift Identification using Classifier Ensemble Approach
Concept Drift Identification using Classifier Ensemble Approach
 
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - IntroductionTutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
Tutorial ESWC2011 Building Semantic Sensor Web - 01 - Introduction
 
Emergency Management Through Sensor of Enterprise Systems
Emergency Management Through Sensor of Enterprise SystemsEmergency Management Through Sensor of Enterprise Systems
Emergency Management Through Sensor of Enterprise Systems
 
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series SequencesA Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
A Framework for Periodic Outlier Pattern Detection in Time-Series Sequences
 
ITK Tutorial Presentation Slides-943
ITK Tutorial Presentation Slides-943ITK Tutorial Presentation Slides-943
ITK Tutorial Presentation Slides-943
 
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
How Data Commons are Changing the Way that Large Datasets Are Analyzed and Sh...
 
What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?What is Data Commons and How Can Your Organization Build One?
What is Data Commons and How Can Your Organization Build One?
 
Shifting the Burden from the User to the Data Provider
Shifting the Burden from the User to the Data ProviderShifting the Burden from the User to the Data Provider
Shifting the Burden from the User to the Data Provider
 
Introduction to Biological Network Analysis and Visualization with Cytoscape ...
Introduction to Biological Network Analysis and Visualization with Cytoscape ...Introduction to Biological Network Analysis and Visualization with Cytoscape ...
Introduction to Biological Network Analysis and Visualization with Cytoscape ...
 
Ph.D Annual Report III
Ph.D Annual Report IIIPh.D Annual Report III
Ph.D Annual Report III
 
Cri big data
Cri big dataCri big data
Cri big data
 
Aaas Data Intensive Science And Grid
Aaas Data Intensive Science And GridAaas Data Intensive Science And Grid
Aaas Data Intensive Science And Grid
 
EdgarDB overview
EdgarDB overviewEdgarDB overview
EdgarDB overview
 
Big Data
Big Data Big Data
Big Data
 
Briefing Room analyst comments - streaming analytics
Briefing Room analyst comments - streaming analyticsBriefing Room analyst comments - streaming analytics
Briefing Room analyst comments - streaming analytics
 
Data repository for sensor network a data mining approach
Data repository for sensor network  a data mining approachData repository for sensor network  a data mining approach
Data repository for sensor network a data mining approach
 

Similar a A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfCarlosRodrigues517978
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...Ijripublishers Ijri
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla SahiSilvaGraf83
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things PayamBarnaghi
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...INFOGAIN PUBLICATION
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
Hughes RDAP11 Data Publication Repositories
Hughes RDAP11 Data Publication RepositoriesHughes RDAP11 Data Publication Repositories
Hughes RDAP11 Data Publication RepositoriesASIS&T
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMijiert bestjournal
 
Web analytics webinar
Web analytics webinarWeb analytics webinar
Web analytics webinarJim Jansen
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET Journal
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountabilityNandini Chandran
 
Simplify Your Gape work Operations in four Steps.pdf
Simplify Your Gape work Operations in four Steps.pdfSimplify Your Gape work Operations in four Steps.pdf
Simplify Your Gape work Operations in four Steps.pdfNarciso Lebsack
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountabilityNagaraj Naidu
 
HathiTrust Research Center Secure Commons
HathiTrust Research Center Secure CommonsHathiTrust Research Center Secure Commons
HathiTrust Research Center Secure CommonsBeth Plale
 
INSTRUCT - Integrated Structural Biology Infrastructure
INSTRUCT - Integrated Structural Biology InfrastructureINSTRUCT - Integrated Structural Biology Infrastructure
INSTRUCT - Integrated Structural Biology InfrastructureResearch Data Alliance
 
Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science Beth Plale
 
Web analytics presentation
Web analytics presentationWeb analytics presentation
Web analytics presentationJim Jansen
 

Similar a A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees (20)

Towards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdfTowards a distributed framework to analyze multimodal data.pdf
Towards a distributed framework to analyze multimodal data.pdf
 
UCIAD overview
UCIAD overviewUCIAD overview
UCIAD overview
 
public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...public truthfulness assessment for shared active cloud data storage with grou...
public truthfulness assessment for shared active cloud data storage with grou...
 
1 Object tracking using sensor network Orla Sahi
1       Object tracking using sensor network Orla Sahi1       Object tracking using sensor network Orla Sahi
1 Object tracking using sensor network Orla Sahi
 
Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things Dynamic Semantics for the Internet of Things
Dynamic Semantics for the Internet of Things
 
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...IRJET -  	  Identifying Information Relocate with Reliable Estimation and Sec...
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...
 
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
Privacy Preserving Public Auditing and Data Integrity for Secure Cloud Storag...
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
GRID COMPUTING.ppt
GRID COMPUTING.pptGRID COMPUTING.ppt
GRID COMPUTING.ppt
 
Hughes RDAP11 Data Publication Repositories
Hughes RDAP11 Data Publication RepositoriesHughes RDAP11 Data Publication Repositories
Hughes RDAP11 Data Publication Repositories
 
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEMSURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
SURVEY ON DYNAMIC DATA SHARING IN PUBLIC CLOUD USING MULTI-AUTHORITY SYSTEM
 
Web analytics webinar
Web analytics webinarWeb analytics webinar
Web analytics webinar
 
IRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast EnvironmentIRJET - Virtual Data Auditing at Overcast Environment
IRJET - Virtual Data Auditing at Overcast Environment
 
Ensuring distributed accountability
Ensuring distributed accountabilityEnsuring distributed accountability
Ensuring distributed accountability
 
Simplify Your Gape work Operations in four Steps.pdf
Simplify Your Gape work Operations in four Steps.pdfSimplify Your Gape work Operations in four Steps.pdf
Simplify Your Gape work Operations in four Steps.pdf
 
64.ensuring distributed accountability
64.ensuring distributed accountability64.ensuring distributed accountability
64.ensuring distributed accountability
 
HathiTrust Research Center Secure Commons
HathiTrust Research Center Secure CommonsHathiTrust Research Center Secure Commons
HathiTrust Research Center Secure Commons
 
INSTRUCT - Integrated Structural Biology Infrastructure
INSTRUCT - Integrated Structural Biology InfrastructureINSTRUCT - Integrated Structural Biology Infrastructure
INSTRUCT - Integrated Structural Biology Infrastructure
 
Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science Capsule Computing: Safe Open Science
Capsule Computing: Safe Open Science
 
Web analytics presentation
Web analytics presentationWeb analytics presentation
Web analytics presentation
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees

  • 1. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees Ph.Bonnet,  J.Gonzalez  and  J.  Granados   jgon@itu.dk    
  • 2. Sensor data lifecycle Instruments   Raw     Measurements   Data   Products   Data   Products   Data   Products   Data   Products   Data   Products   Model   Archive   l  Focus on instrumentation and data sharing -  DB models defined at institution level for archiving/ sharing -  Typically, each data set is a separate entity. Focus is on making data accessible, not on making it easy/efficient to later on work with this data. -  Sharing policies defined but not enforced by the IT infrastructure.
  • 3.
  • 4. Interact Project – Workflow Scenario l  Transnational access (INTERACT) l  GOAL: People work on several sites and integrate observations across sites. l  Field stations (Zackenberg, Abisko, ...) l  Some sensors and data loggers are deployed for automatic data acquisition. Technicians (A) or researchers (B) go in the field to collect data from data loggers or to manually perform data acquisition. l  Data is handed to a program manager (monitoring activities). Researchers gather their observations (research activities). This is a form of manual sneakernet. l  Field stations are not online. They are hard to access. People work on a single site. l  Monitoring l  Program managers collect raw data and lead the cleaning process that might involve colleagues in other institutions. l  Cleaned up data is then made publically available (as promised to the funding agency). In practice the public data sets from the monitoring programs are very difficult to work with for people who have not collected them (as data sets are just dumped, there is no query capabilities). l  Research l  B collected data in the field, and collaborates with C to build a model, interpret it and write a paper about it. l  Until the paper is published, B and C jealously keep their data. When the paper is published B and C make the data sets used for the graphs publically available on KBN (as required by Nature). l  B archives the raw data and shares it with C (password protected ftp server at U.Oulu) l  R reads a nature paper and gets access to the derived data set.
  • 5. Data Sharing l  Sensitive data? l  No, not really. Nothing like a patient record. Data is neither personal, nor classified. l  However, we need incentives to encourage data sharing. Most researchers happily embrace the idea of sharing. It opens up observations to independent scrutiny, fosters new collaborations and encourages further discoveries in old data sets. But in practice those advantages often fail to outweigh researchers' concerns. What will keep work from being scooped, poached or misused? What rights will the scientists have to relinquish? Where will they get the hours and money to find and format everything? http://www.nature.com/news/2009/090909/full/461160a.html l  Our vision l  A decentralized architecture enables researchers to keep on working as they used to. l  They will now be able to control and audit who is accessing your data.
  • 6.
  • 7. Interact Project - Tomorrow l  Virtual Instrumentation l  Data loggers are networked and made available online (via a gateway that controls access to a field station server that collects data from the data loggers). l  The data streams generated by the sensor are gathered on the data loggers, replicated on the field server and on the gateway. l  Gateways are publically accessible (via subscriptions or access to snapshot data sets). Access rights should be enforced to differentiate public access to views over the data streams/snapshots and full access (to some data streams) by M on the data she manages. l  Sneakernet is still required for those data which are manually collected (for backup purposes). l  Decentralized Architecture to enforce Access and Usage Control l  What is usage control? l  How to enforce it?
  • 8. UCONABC Jaehong Park and Ravi Sandhu. The UCONabc usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128–174, February 2004.
  • 9. Audit: a posteriori control of how rights were used Enforcement: a priori control of usage rights Formal Model Strong security Assumptions No implementation! Jaehong Park and Ravi Sandhu. The UCONabc usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128–174, February 2004. Can model complex frameworks UCONABC
  • 10. Requirements UCONABC UCON needs to be implemented within a security perimeter protected by hardware so that attackers with administrator privileges cannot disable it using software. From inside the security perimeter it should be possible to “monitor” programs outside the security perimeter Communicating with programs in the security perimeter should entail a low overhead
  • 11. Secure Platforms Level of Protection Communication Execution Environment Only Software Rich OS Rich OS + TEE SW and Tamper resistant HW Secure Ad-how OS Narrow Interfaces Very High Low Messages, Sockets, SM Software and Hardware Shared Memory Medium/High ARM TrustZone Examples Android, Linux, IOS, Windows IBM CryptoCards, TPM, Secure Token Normal Execution Environment Security Perimeter Monitor With Low Overhead Protected by HardwareAll Sorts of Applications Monitoring Applications
  • 13. Trusted Integrity Module (TIM) Background Information Secondary storage is exposed to attacks and data corruption, both when data is at rest and in use. Logs are a vital component to verify the integrity of a running system. They can - and will – be tampered with by an attacker (101 system hacking) Integrity is the base (root of trust) to build usage control. Indeed, usage control policies emerge from it.
  • 15. Contribution Trusted Integrity Module (TIM) Usage control policies emerge naturally from TIM, acting as a base for complex UCON-based policies Provide an architecture to guarantee the integrity of system files adding a low overhead to file system primitives Provide an method to log actions involving system files in trusted storage, preventing attackers to clean after themselves
  • 16. Next Steps Implement UCON on top of TIM to add complex usage control policies to secure file operations (i.e., enforcement, embedded behaviour, and audit) Extend TIM with a machine learning algorithm to learn from past attacks - antifrigility Exploring how to monitor running processes without introducing a big overhead. Ideas: Use of resources, peripherals, etc.
  • 17. Conclusion •  Vision: Data sharing policies enforced by IT infrastructure –  Potential benefits for scientific data sharing, as well as privacy in general •  Work under way to realize this vision based on software components executed in Trusted Execution Environments (protected by hardware).
  • 18. A Distributed Architecture for Sharing Ecological Data Sets with Access and Usage Control Guarantees Ph.Bonnet,  J.Gonzalez  and  J.  Granados   jgon@itu.dk    Slides available at http://javigon.com/publications