Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

On Multi-Level Secure Structured Content: A Cryptographic Key Management – Independent XML Schema for MLS Content Mikko Kiviharju Electronics and Information Technology Division, Finnish Defence Forces Technical Research Centre, Riihimäki, Finland, mikko.kiviharju@mil.fi Abstract: Multi-Level Security, MLS, refers to handling information from different levels of security classification securely by people from different levels of clearance. We propose a structured document format to host data from different classification levels (e.g. RESTRICTED and SECRET) in the same, modifiable document. The document access control is enforced cryptographically – content and access control information is encrypted and digitally signed, but the document structure itself is independent of the adjoining key management architecture. We detail the different security-related metadata and sanitization procedures needed for passing data from a common storage to a user with lower clearance. Keywords: MLS; CBIS; XML; cryptography; key management I. Introduction Handling classified information in today’s networked world with conflicting needs to hide and to share both in homeland and in coalitions with dynamically shifting boundaries is becoming increasingly more cumbersome. Large information leaks from classified networks (e.g. the one described in [22]) are partly possible only because the concept of system-high networks has been stretched to its limits: it makes no sense to classify data (to e.g. MISSION SECRET), if most of the personnel are cleared to the highest level anyway. This is, however, currently the only economical solution dictated by the existing technology in use. Technologies that take full use of the security classification spectrum without trivial physical separation (and duplication) in hardware are called Multi-Level Secure (MLS). There have been a number of solutions aspiring to be MLS in the past, and the work is still ongoing. Our work concerns the cryptographic approach to enforce MLS. We envision structured documents (i.e. XML), with content from multiple different classifications, which is then encrypted, signed, and eventually filtered from the most sensitive items before given to the end user. We propose an XML schema based on

On Multi-Level Secure Structured Content:<br />

A Cryptographic Key Management<br />

– Independent XML Schema for MLS Content<br />

Mikko Kiviharju<br />

Electronics <strong>and</strong> <strong>Information</strong> <strong>Technology</strong> Division,<br />

Finnish Defence Forces Technical Research Centre, Riihimäki, Finl<strong>and</strong>,<br />

mikko.kiviharju@mil.fi<br />

Abstract: Multi-Level Security, MLS, refers to h<strong>and</strong>ling information from different levels of security<br />

classification securely by people from different levels of clearance. We propose a structured document<br />

format to host data from different classification levels (e.g. RESTRICTED <strong>and</strong> SECRET) in the same,<br />

modifiable document. The document access control is enforced cryptographically – content <strong>and</strong> access<br />

control information is encrypted <strong>and</strong> digitally signed, but the document structure itself is independent<br />

of the adjoining key management architecture. We detail the different security-related metadata <strong>and</strong><br />

sanitization procedures needed for passing data from a common storage to a user with lower clearance.<br />

Keywords: MLS; CBIS; XML; cryptography; key management<br />

I. Introduction<br />

H<strong>and</strong>ling classified information in today’s networked world with conflicting<br />

needs to hide <strong>and</strong> to share both in homel<strong>and</strong> <strong>and</strong> in coalitions with dynamically<br />

shifting boundaries is becoming increasingly more cumbersome.<br />

Large information leaks from classified networks (e.g. the one described in [22])<br />

are partly possible only because the concept of system-high networks has been<br />

stretched to its limits: it makes no sense to classify data (to e.g. MISSION SECRET),<br />

if most of the personnel are cleared to the highest level anyway. This is, however,<br />

currently the only economical solution dictated by the existing technology in use.<br />

Technologies that take full use of the security classification spectrum without<br />

trivial physical separation (<strong>and</strong> duplication) in hardware are called Multi-Level Secure<br />

(MLS). There have been a number of solutions aspiring to be MLS in the past,<br />

<strong>and</strong> the work is still ongoing.<br />

Our work concerns the cryptographic approach to enforce MLS. We envision<br />

structured documents (i.e. XML), with content from multiple different classifications,<br />

which is then encrypted, signed, <strong>and</strong> eventually filtered from the most<br />

sensitive items before given to the end user. We propose an XML schema based on

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!