22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

384 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

Figure 5. HAAG as a separation service<br />

The HAAG service is responsible for enforcing access control based on advanced<br />

security policies, taking into account the properties of users (e.g. clearance<br />

level <strong>and</strong> his role in the organization), properties of devices (e.g. hardware cryptographic<br />

modules, trusted computing platform), <strong>and</strong> properties of the information<br />

(e.g. its validity time, sensitivity <strong>and</strong> area of application).<br />

In this phase, the traditional characterization of information through simple<br />

metadata (or so-called security label e.g. NATO Secret releasable to Australia),<br />

is replaced by a more detailed (<strong>and</strong> complex) metadata describing the information<br />

(e.g. logistic data relevant to transport of goods to Australian troops based<br />

in Afghanistan). Similarly, instead of being characterized only by a clearance level,<br />

the end-user would be characterized by metadata describing his role, affiliation, <strong>and</strong><br />

trustworthiness. The terminal would also have to be characterized by additional<br />

metadata describing its trustworthiness, such as none, basic, normal, enhanced <strong>and</strong><br />

high, instead of being just characterized by the network domain in which it is located.<br />

The required separation of information flows in Phase 2 can only be achieved<br />

by using advanced cryptography, including encryption of both data at rest <strong>and</strong> data<br />

in transfer. Recently, several relevant new cryptographic techniques have been<br />

developed, including homomorphic encryption enabling processing of encrypted<br />

data [12] <strong>and</strong> wild-carded identity-based encryption [13], potentially enabling<br />

encryption of data for groups of user, e.g., users playing the same role within organization,<br />

<strong>and</strong> effective key management.<br />

V. High level design<br />

One of the current activities coordinated by the NCIA is development of high<br />

level design (HLD) for the HAAG. The target of the HLD is Phase 1 <strong>and</strong> Phase 2<br />

of the HAAG as described in the previous section.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!