NGUYEN NGOC DIEP Master Fellow – uSec Group Contextual Risk-based Access Control Mechanism 1 AGENDA 1 – Introduction 2 – Access Control Model 3 – Risk Assessment 4 – Related Work 5 – Conclusion 2 Introduction- Background In the new environment, security problems are much more complex since ubiquitous environment is more dynamic, more distributed, more invisible and heterogeneous. Therefore, we need to view security problems in a new paradigm and explore them thoroughly under the above effects. Information security can be broadly categorized into three types: confidentiality, integrity and availability. Access Control is critical to preserve the confidentiality and integrity of information. Autonomous decision-making is an increasingly popular application for security, including access control in ubiquitous computing 3 Introduction- Motivation Current research about Access Control is mostly based on the context and role. Some recently research used trust as the fundamental component. Risk Assessment is an effective tool using in decision-making and is an important factor in economics, but is not applied well in security, especially in access control Context is not used in an effective way in decision- making process 4 Introduction- Problem Statement Risk in Access Control in Ubiquitous Computing Environment is a new problem. In this work, we will present a contextual risk-based Access Control model. Applying risk assessment to make decisions, based on context parameters. 5 Access Control Model Context Retrieval Context values (time,space, network state) Context values actions, outcomes Risk Assessment Access Control Manager Request (principle,c redentials) Decision cost, outcomes 6 Access Control Model - A request by principle p (user or process) to Access Control Manager - Risk Assessment module calculate risk based on the credentials, sort of actions and the current context (risk context) - The risk value is compared with the threshold, then return the decision We call the period doing action is session 7 Access Control Model Factors in the access control model: • Principle (p): admin, staff, professor, guest • Set of Actions (a), i.e. : read, write, delete, modify • Set of Outcomes (o): confidentiality, availability, integrity • Set of Context (c): time (night, daytime,…), location (in-building, in-office, outside), network state • Consequence function: shows the cost of each outcome in a specific context • Risk function: calculates risk of the action in current context. 8 Risk Assessment Definition: “Risk is often evaluated based on the probability of the threat and the potential impact” 3 factors: loss of availability, loss of confidentiality and loss of integrity. The parameters: - Principle context - Environment context - Resource context - List of outcomes of the action 10 Risk Assessment Multi Factor Evaluation Process: In reality, we have many decision-making problems that need to consider many factors. We can use Multi Factor Evaluation Process (MFEP) In MFEP, decision maker subjectively identify important factors in a given decision situation and assign a weight for each factor. The weight presents the relative importance of each factor in making the decision Secondly, identify alternatives (solutions) available to decision maker. Thirdly, factor evaluation: for each alternative, all factors are evaluated and a weight is assigned to each. A weighted evaluation is then computed for each alternative as the sum of product of factors weights and factors evaluations. 11 Risk Assessment Multi Factor Evaluation Process: Step 1: List all factors and give to factor i a value weight Fwi (0 < Fwi < 1). Fwi expresses the important of factor i in comparative. Step 2: Factor Evaluation With each factor i, we assess solution j by giving it a coefficient FEij (called evaluation of solution j under factor i) Step 3: Total Weighted Evaluation choose solution j0 if we have Max TWEj with j = j0 12 Risk Assessment MFEP example: Problems: A graduate student wants to find a work. The important factors in this situation is salary, position of office, partners, kind of works, other benefits, … He need to find a best decision. - Solution: Assuming that after considering, he found that 3 most important factors is: Salary, Promotion, Position of office and the relative importance of each factor is respectively 0.3, 0.6, 0.1. (Table 1) - There are 3 companies A, B, C that accepts him. For each company, he evaluates according to 3 above factors and has evaluation table (table 2) 13 Risk Assessment Step 1: Factor i Factor weight Fwi Salary 0.3 Promotion 0.6 Position of office 0.1 Step 2: Evaluate FEij Solution j A B C Salary 0.7 0.8 0.9 Promotion 0.9 0.7 0.6 Position of office 0.6 0.8 0.9 Factor i 14 Risk Assessment Step 3: Total Weight Evaluation (TWE) TWE(A) = 0.3*0.7+0.6*0.9+0.1*0.6 = 0.81 TWE(B) = 0.3*0.8+0.7*0.7+0.1*0.8 = 0.74 TWE(C) = 0.3*0.9+0.6*0.6+0.1*0.9 = 0.72 choose company A 15 A case study –Access control management in a hospital Access control system to manage accesses to patient‘s records in a hospital. Data is stored in database and can be accessed through remote terminal. The records can be text, video, image or sound format and it has some properties Each member has his role and set of permitted corresponding actions. Each action has list of outcomes 16 Outcomes and risk values for each action Risk value Actions View record Outcomes - Unavailable - Leaking information - Service corrupted - Can not do Modify record - Lose information - Can not update - Can not do Risk context /Probability Availability Integrity Confidentia lity - Record too big /f1 - Transaction session is full /f2 - Data unencrypted /f3 - Connection is not secured/f4 - Connection is lost /f5 Cost1 Cost2 Cost3 Cost4 Cost5 Cost6 Cost7 Cost8 Cost9 f=1 cost10 0 0 - Connection lost /f6 Cost11 Coss12 Cost13 - Server busy, corrupted /f7 f=1 Cost14 Cost17 Cost15 0 Cost16 0 17 Risk Assessment Definitions Action is an action in set of action A (available for the principle), i N o ai , j is an outcome in set of outcome O of action lo _ a a , j is cost of outcome j of action in term of availability lo _ i a , j is cost of outcome j of action in term of integrity lo _ c a , j is cost of outcome j of action in term of confidentiality s k is a set of context parameter f o ,s is the probability of outcome oa , j in s k ai i i i ai , j k i 18 Risk Assessment Schema Step 1: Identify actions in service, outcomes of each action Step 2: Assign weight for each factor availability, integrity, confidentiality to each action. Step 3: Specify cost of each outcome in term of availability, integrity, confidentiality Step 4: Identify probability of outcome (f), based on the set of current context and probability of it. Step 5: We have 2 solutions: Accept or Reject, and risk value of action in term of availability, integrity and confidentiality in both 2 solution Step 6: Apply MFEP with the above parameters and choose the better solution 19 Risk Assessment (cont) Cost of outcome Cost of outcome: is calculated based on context parameters. We calculate the cost in the aspect of availability, integrity, confidentiality 20 Risk Assessment (cont) Cost of outcome For loss of availability: c _ aoai , j lo _ aai , j ( f oai , j , sk ) k For loss of integrity: c _ ioai , j lo _ iai , j ( f oai , j ,sk ) For loss of confidentiality: k c _ coa , j lo _ cai , j ( f oa , j , sk ) i k i with s k exists if and only if all required context parameters exist. 21 Risk Assessment (cont) Cost of action Cost of an action is a total weighted evaluation of all outcomes of the action 22 Risk Assessment (cont) Cost of action For availability: RV _ Ai cos t (a i , " availabili ty" ) c _ aoa , j i j For integrity: RV _ I i cos t (a i , " integrity" ) c _ ioa , j i j For confidentiality: RV _ Ci cos t (a i , " confidentiality" ) c _ coa , j j i 23 Risk Assessment (cont) Risk value evaluation With each service, we consider the importance of each element (availability, integrity, confidentiality) different. Risk value of an action is defined as a weighted arithmetic mean of its risk value of availability, confidentiality and integrity. w1 RV _ Ai w2 RV _ I i w3 RV _ Ci RV w1 w2 w3 where wi N , i 1,2,3 and they can be adjusted to a suitable value if more weight is to be given to a specific metric. 24 A Case Study Risk value Actions View record Outcomes - Unavailable - Leaking information - Service corrupted - Can not do Modify record - Lose information - Can not update - Can not do Risk context /Probability Availability Integrity Confidentia lity - Record too big /f1=0.3 - Transaction session is in peak /f2=0.6 - Data unencrypted /f3=0.6 - Connection is not secured/f4=0.5 - Connection is lost /f5=0.7 Cost1=5 Cost2=0 Cost3=0 Cost4=0 Cost5=0 Cost6=1 Cost7=5 Cost8=0 Cost9=0 f=1 Cost10=cost1 0 0 - Connection lost /f6=0.1 Cost11 Coss12 Cost13 - Server busy, corrupted/f7=0.05 f=1 Cost14 Cost17 Cost15 0 Cost16 0 25 A Case Study Step 1: Factor i Factor weight Fwi Availability 0.3 Integrity 0.4 Confidentiality 0.3 26 A Case Study Cost Evaluation: 1-10 0: No impact, 1-2: Small impact 3-5: Medium impact 5-8: Big impact 9-10: Disaster View Action: Cost of each outcome - (See the table in previous slide) 27 A Case Study Assuming that: we have current context Record too big, Data unencrypted View Action: Accept solution: RV = 0.3x1.5+0.3x0.6 = 0.63 Reject solution: RV = 0.3x5+0.4x0+0.3x0 = 1.5 Solution Accept Reject 1.5 5 0 0 0.6 0 Factor Availability Integrity Confidentiality Choose Accept solution * But if current context includes Record too big, Data unencrypted and Transaction session is in peak, the result will be Reject solution 28 Related works - In some context-based access control model, they really provide dynamic and flexible , but the decision-making process is not powerful and precise as in our model using risk. - The paper “Using Trust and Risk in RBAC policies” [7] used the concept outcome to calculate cost for each outcome and risk value but they did not consider the context for risk assessment, but trust. - In “Risk Probability Estimating Based on Clustering” of YongChen et al (2003), they used neural network for risk estimator. In this work, we use a simpler method, that takes advantage of context to know about the state of the network and the service - Compare with my previous work, this one is better. We apply MFEP to calculate risk and do not need threshold which is hard to define. 29 Conclusion We have investigated how to apply risk to access control and propose an access control model with risk assessment. It provides a precise way of making decision because of utilizing context in risk assessment process. We have further demonstrated how this model can be applied to manage access control in a practical scenario and explored it in manner of ubiquitous computing. The disadvantage of this mechanism is: the service provider need to work out the cost of each outcome in each action 30 Future work Decision-making should be done during the working period of the activity, whenever the context changes into another state. Automatically update the cost of outcomes of the actions in making decision process and detailed information of current network state based on evidence gathered from context Do the simulation work to prove the performance of the system We need to consider more parameters and factors that effect to risk assessment process such as risk in authentication phase. 31 References [1] R.J. Hulsebosch , A.H. Salden, M.S. Bargh, P.W.G. Ebben, J. Reitsma. “Context Sensitive Access Control”. In proceedings of the tenth ACM symposium on Access control models and technologies, Stockholm, Sweden, 2005. [2] Lalana Kagal, Tim Finin, and Anupam Joshi. “Trust-based security in pervasive computing environments”. IEEE Computer, 34(12):154--157, December 2001. [3] V. Cahill, B. Shand, E. Gray, et al., "Using Trust for Secure Collaboration in Uncertain Environments," Pervasive Computing, vol. 2, no. 3, pp. 52--61, July-September 2003. [4] Nathan Dimmock , Jean Bacon, David Ingram, and Ken Moody. “Risk Models for Trust Based Access Control”. University of Cambridge, Computer Laboratory, JJ Thomson Ave, Cambridge CB3 0FD,UK. [5] Peter Chapin , Christian Skalka , X. Sean Wang. “Risk assessment in distributed authorization”. Proceedings of the 2005 ACM workshop on Formal methods in security engineering, November 11-11, 2005, Fairfax, VA, USA [6] Hassan Jameel, Le Xuan Hung, Umar Kalim, Ali Sajjad, Sungyoung Lee, Young-Koo Lee, "A Trust Model for Ubiquitous Systems based on Vectors of Trust Values", ism, pp. 674679, Seventh IEEE International Symposium on Multimedia (ISM'05), 2005. [7] Nathan Dimmock et al , “Using Trust and Risk in RBAC policies”, 2004 32 THANK YOU! 33