TY - GEN
T1 - Data usage control enforcement in distributed systems
AU - Kelbert, Florian
AU - Pretschner, Alexander
PY - 2013
Y1 - 2013
N2 - Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage constraints then have to be enforced for all these clients. We extend a generic model for intra-system data flow tracking-that has been designed and used to track the existence of copies of data on single clients-to the cross-system case. When transferring, i.e., copying, data from one machine to another, our model makes it possible to (1) transfer usage control policies along with the data to the end of local enforcement at the receiving end, and (2) to be aware of the existence of copies of the data in the distributed system. As one example, we concretize "transfer of data" to the Transmission Control Protocol (TCP). Based on this concretized model, we develop a distributed usage control enforcement infrastructure that generically and application-independently extends the scope of usage control enforcement to any system receiving usagecontrolled data. We instantiate and implement our work for OpenBSD and evaluate its security and performance.
AB - Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage constraints then have to be enforced for all these clients. We extend a generic model for intra-system data flow tracking-that has been designed and used to track the existence of copies of data on single clients-to the cross-system case. When transferring, i.e., copying, data from one machine to another, our model makes it possible to (1) transfer usage control policies along with the data to the end of local enforcement at the receiving end, and (2) to be aware of the existence of copies of the data in the distributed system. As one example, we concretize "transfer of data" to the Transmission Control Protocol (TCP). Based on this concretized model, we develop a distributed usage control enforcement infrastructure that generically and application-independently extends the scope of usage control enforcement to any system receiving usagecontrolled data. We instantiate and implement our work for OpenBSD and evaluate its security and performance.
KW - Data flow tracking
KW - Distributed usage control
KW - Policy enforcement
KW - Security and privacy
KW - Sticky policies
UR - http://www.scopus.com/inward/record.url?scp=84874919578&partnerID=8YFLogxK
U2 - 10.1145/2435349.2435358
DO - 10.1145/2435349.2435358
M3 - Conference contribution
AN - SCOPUS:84874919578
SN - 9781450318907
T3 - CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy
SP - 71
EP - 82
BT - CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy
T2 - 3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013
Y2 - 18 February 2013 through 20 February 2013
ER -