A provenance-based access control model

Existence of data provenance information in a system raises at least two security-related issues. One is how provenance data can be used to enhance security in the system and the other is how to protect provenance data which might be more sensitive than the data itself. Recent data provenance-related access control literature mainly focuses on the latter issue of protecting provenance data. In this paper, we propose a novel provenance-based access control model that addresses the former objective. Using provenance data for access control to the underlying data facilitates additional capabilities beyond those available in traditional access control models. We utilize a notion of dependency as the key foundation for access control policy specification. Dependency-based policy provides simplicity and effectiveness in policy specification and access control administration. We show our model can support dynamic separation of duty, workflow control, origin-based control, and object versioning. The proposed model identifies essential components and concepts and provides a foundational base model for provenance-based access control. We further discuss possible extensions of the proposed base model for enhanced access controls.

[1]  Margo I. Seltzer,et al.  Securing Provenance , 2008, HotSec.

[2]  Marianne Winslett,et al.  Preventing history forgery with secure provenance , 2009, TOS.

[3]  Adriane Chapman,et al.  PLUS: A provenance manager for integrated information , 2011, 2011 IEEE International Conference on Information Reuse & Integration.

[4]  Paul T. Groth,et al.  Security Issues in a SOA-Based Provenance System , 2006, IPAW.

[5]  Bhavani M. Thuraisingham,et al.  A language for provenance access control , 2011, CODASPY '11.

[6]  Dan Suciu,et al.  Regular Paths in SparQL: Querying the NCI Thesaurus , 2008, AMIA.

[7]  Thomas Heinis,et al.  Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.

[8]  Adriane Chapman,et al.  Efficient provenance storage , 2008, SIGMOD Conference.

[9]  Ravi S. Sandhu,et al.  Separation of Duties in Computerized Information Systems , 1990, DBSec.

[10]  Margo I. Seltzer,et al.  Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.

[11]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[12]  Jaehong Park,et al.  On data provenance in group-centric secure collaboration , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[13]  Shouhuai Xu,et al.  An Access Control Language for a General Provenance Model , 2009, Secure Data Management.

[14]  Vipin Chaudhary,et al.  History-based access control for mobile code , 1998, CCS '98.

[15]  Ravi Sandhu,et al.  Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.

[16]  Marianne Winslett,et al.  Introducing secure provenance: problems and challenges , 2007, StorageSS '07.

[17]  Martín Abadi,et al.  Access Control Based on Execution History , 2003, NDSS.

[18]  Adriane Chapman,et al.  Surrogate Parenthood: Protected and Informative Graphs , 2011, Proc. VLDB Endow..

[19]  James Cheney,et al.  Provenance management in curated databases , 2006, SIGMOD Conference.

[20]  Ravi S. Sandhu,et al.  Towards a framework for group-centric secure collaboration , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[21]  Anindya Banerjee,et al.  History-Based Access Control and Secure Information Flow , 2004, CASSIS.

[22]  Paul T. Groth,et al.  Representing distributed systems using the Open Provenance Model , 2011, Future Gener. Comput. Syst..

[23]  Adriane Chapman,et al.  Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[24]  Mary Ellen Zurko,et al.  Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.

[25]  Bhavani M. Thuraisingham,et al.  Transforming provenance using redaction , 2011, SACMAT '11.