Università degli Studi dell’Insubria  Facoltà di Scienze MM.FF.NN. di Varese  A Framework in Support of EmergencyManagemen...
Emergency ManagementHurricane Katrina       9/11 Attack       Fukushima                    Information Sharing
Traditional vs Emergency        Access ControlTraditional access control models are regulated by a properset of pre-define...
Information Sharing                          Information                            Sharing         Single                ...
Our Model vs BtG              (Break the Glass)                    a subject requests an access                    the s...
Information Sharing in the             cloudUntrusted Domain: cloud servers are usually managed by commercialproviders whi...
ProposalThe overall goal of this proposal is to define, implement andtest an access control framework to enforce controlle...
Emergency Detection                                   Complex Event           Emergency                                   ...
Event Languages  The literature offers several languages for event pattern  specification (e.g., Amit, XChangeEQ, SpaTec, ...
EmergencyAn emergency is modeled as a couple of events, defined inCESL, that signal the beginning and ending of the emerge...
Access Control Model    Access control model for emergency management should    enforce flexible and controlled informatio...
Access Control Enforcement To implement the proposed access control model we exploit CEP systems. A possible architecture ...
Access Control Model             Extensions•   Emergency Policy                                    Validity Checks    Corr...
Information Sharing on the              CloudEnhance the presented architecture in order to enforce informationsharing acr...
Dynamic virtualization for                     emergency management                                          Public Cloud ...
Dynamic information sharing              across multi-domain clouds                                                   Each...
Research Schedule (Flexible          Access Control)Phase          Main TaskRequirement    Understanding requirements of e...
Research Schedule (Cloud-        based Information Sharing)Phase              Main TaskState of the art   Reading, researc...
Upcoming SlideShare
Loading in …5
×

Thesis Proposal

715 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
715
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Thesis Proposal

  1. 1. Università degli Studi dell’Insubria Facoltà di Scienze MM.FF.NN. di Varese A Framework in Support of EmergencyManagement: from Flexible Access Control to Cloud-based Information Sharing Michele Guglielmi michele.guglielmi@uninsubria.it
  2. 2. Emergency ManagementHurricane Katrina 9/11 Attack Fukushima Information Sharing
  3. 3. Traditional vs Emergency Access ControlTraditional access control models are regulated by a properset of pre-defined access control policies.An Emergency access control model should (during anemergency) bypass the regular access control policies andgrant users access to resources not normally authorized. Downgrading of information security Temporary Controlled Timely Flexible access control model
  4. 4. Information Sharing Information Sharing Single Multiple Organization OrganizationsFlexible Access Control Model Cloud-based Information Sharing
  5. 5. Our Model vs BtG (Break the Glass)  a subject requests an access  the system checks regular access control policies  if the access request is denied, the system verifies whether this decision can be overridden by a BtG policy  the subject is notified and asked to confirm. In our proposal, when an emergency is detected related emergency policies are activated. If an access is denied by a regular policy, the system checks if this decision can be overridden by a emergency policy and, in this case, the access is granted. BtG policies are always active  emergency policies are active only a user can decide when to use a BtG during emergencies policy to override a regular one  only the system can override a a user can wait a while to respond regular policy when the system prompts the BtG  system overrides immediately request regular policies when an emergency is detected
  6. 6. Information Sharing in the cloudUntrusted Domain: cloud servers are usually managed by commercialproviders which are outside of the trusted domain of the users. Encrypt Data Selective Queries over Encryption encrypted data
  7. 7. ProposalThe overall goal of this proposal is to define, implement andtest an access control framework to enforce controlledinformation sharing in emergency situations.• Emergency Detection• Flexible Access Control Model• Access Control Model Enforcement• Information Sharing through the cloud
  8. 8. Emergency Detection Complex Event Emergency Processing Detection (CEP) process incoming data through aData Stream Management sequence of transformations based on System (DSMS) common SQL operators to produce streams of new data as an output see incoming data as events happened inComplex Event Processing the external world, which have to be (CEP) filtered and combined to detect occurrences of particular patterns
  9. 9. Event Languages The literature offers several languages for event pattern specification (e.g., Amit, XChangeEQ, SpaTec, TESLA and SASE+). Some languages have also been proposed by vendors (e.g., Streambase, Sybase, Oracle CEP). However, up to now, a standard event specification language has not yet emerged. In the thesis a Core Event Specification Language (CESL) will be usedB. Carminati, E. Ferrari, and M. Guglielmi, Secure information sharing on support of emergency management. In proceeding of The Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT).
  10. 10. EmergencyAn emergency is modeled as a couple of events, defined inCESL, that signal the beginning and ending of the emergencysituation, respectively.Example: Patients wear several monitoring devices that catch their health measures. All gathered measures are encoded as tuples in a data stream and sent to a CEP. BradycariaEmergency { init: σ(heart_rate ≤ 60)(VitalSigns) end: σ(heart_rate > 60)(VitalSigns) }
  11. 11. Access Control Model Access control model for emergency management should enforce flexible and controlled information sharing during emergencies.• Temporary Access Control Policies (tacps): a tuple (sbj, obj, priv) where sbj identifies subjects authorized to exercise the privilege priv on the target object obj• Emergency obligation: an action or a set of actions that must be fulfilled when an emergency is detected.Example: (BradycariaEmergency, tacp1, call_ambulance) tacp1 { sbj: paramedics taking care of the patient at the time of the emergency; obj: Electronic Medical Record (EMR) of the patient under emergency; priv: read;}
  12. 12. Access Control Enforcement To implement the proposed access control model we exploit CEP systems. A possible architecture is the following. User Profiles Repository Access Control Handler Objects user Emergency regular access control Handler policies, emergency Policy descriptions, emergency Repository policies, tacps and CEP Server obligationsDevelop a prototype implementing this architecture and carry out an extensive set of tests on the prototype
  13. 13. Access Control Model Extensions• Emergency Policy Validity Checks Correctness• Distribute the rights of Emergency create emergency policies Administrative Policies• Describe more critical Composed scenarios Emergencies
  14. 14. Information Sharing on the CloudEnhance the presented architecture in order to enforce informationsharing across different organizations that should cooperate foremergency management• Interoperability• Timely responseGiven the increasing trend of moving organizational functionalitiesin the cloud, this proposal wants to offer several solutions so as tobe able to design information sharing for emergency situationssuitable for as many as possible organizations, based on their levelof integration within the cloud infrastructure.• Dynamic virtualization for emergency management• Dynamic information sharing across multi-domain clouds
  15. 15. Dynamic virtualization for emergency management Public Cloud The cloud service provider Organization 1 (i.e., Public Cloud) manages a cloud Resource 1 to provide data storage service. Resource 1 Each Organization stores information to be shared in a local Policy Organization 2 repository managed by theRepository organization itself. Emergency Resource 2 Encryption Techniques Handler Resource 2 CEP Access Control Handler Organization n Resource n Cloud Services Resource n User
  16. 16. Dynamic information sharing across multi-domain clouds Each organization has its data stored in a private cloud. Private Cloud Organization 1 Policy Repository Resource 1 Interoperability problem Policy Private CloudRepository Organization 2 Policy Repository Resource 2 Emergency Handler CEP Access Control Handler Private Cloud Policy Interchange Policy Organization n Language Repository Resource n User
  17. 17. Research Schedule (Flexible Access Control)Phase Main TaskRequirement Understanding requirements of emergency management in terms of analysis access control and information sharingState of the Reading, researching, and evaluating sources about complex event art processing and flexible access control modelsModelization Definition of a formal access control model tailored for  emergency managementEnforcement Development of a prototype implementing the access control model.and Prototype performance evaluation through an extensive set of tests -performanceevaluation  Not yet performed, - Partially performed,  Completed
  18. 18. Research Schedule (Cloud- based Information Sharing)Phase Main TaskState of the art Reading, researching, and evaluating sources about cloud infrastructures - and encryption techniques to store data in the cloudModelization Formal definition of architectures in support of information sharing through - the cloud: dynamic virtualization for emergency management and dynamic information sharing across multi-domain cloudsImplementation Development of a framework implementing the cloud infrastructures in and performance support of information sharingevaluationTesting Testing the framework on a real case study thanks to the collaboration with  Protezione Civile promoted during the workshop on maxi-emergency management organized by the Knowledge and Service Management for Business Applications research centre of the University of Insubria.  Not yet performed, - Partially performed,  Completed

×