Data usage control enforcement in distributed systems

Florian Kelbert, Alexander Pretschner

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

34 Scopus citations

Abstract

Distributed usage control is concerned with how data may or may not be used in distributed system environments after initial access has been granted. If data flows through a distributed system, there exist multiple copies of the data on different client machines. Usage constraints then have to be enforced for all these clients. We extend a generic model for intra-system data flow tracking-that has been designed and used to track the existence of copies of data on single clients-to the cross-system case. When transferring, i.e., copying, data from one machine to another, our model makes it possible to (1) transfer usage control policies along with the data to the end of local enforcement at the receiving end, and (2) to be aware of the existence of copies of the data in the distributed system. As one example, we concretize "transfer of data" to the Transmission Control Protocol (TCP). Based on this concretized model, we develop a distributed usage control enforcement infrastructure that generically and application-independently extends the scope of usage control enforcement to any system receiving usagecontrolled data. We instantiate and implement our work for OpenBSD and evaluate its security and performance.

Original languageEnglish
Title of host publicationCODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy
Pages71-82
Number of pages12
DOIs
StatePublished - 2013
Event3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013 - San Antonio, TX, United States
Duration: 18 Feb 201320 Feb 2013

Publication series

NameCODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy

Conference

Conference3rd ACM Conference on Data and Application Security and Privacy, CODASPY 2013
Country/TerritoryUnited States
CitySan Antonio, TX
Period18/02/1320/02/13

Keywords

  • Data flow tracking
  • Distributed usage control
  • Policy enforcement
  • Security and privacy
  • Sticky policies

Fingerprint

Dive into the research topics of 'Data usage control enforcement in distributed systems'. Together they form a unique fingerprint.

Cite this