22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

443<br />

In our approach, the subject policy is assumed to be encoded in the cryptographic<br />

metadata <strong>and</strong> h<strong>and</strong>led by key management, without the need of a separate subjectowner<br />

negotiation.<br />

Embedding access control information in the XML-document itself has a number<br />

of possibilities, such as the policy-tag in [5] <strong>and</strong> specific XML-derivative languages<br />

[4]. The responsibility to enforce this information lies, however, with the data<br />

storage, <strong>and</strong> is usually insufficient with MLS. Of the XML-derivative languages it is<br />

stated in [21] that the whole concept of RBAC for XML is still immature.<br />

The XML framework is originally not designed to be used for MLS [20]. MLS<br />

in XML is somewhat tied to the data management systems available, but our work<br />

is independent from this.<br />

III. Environment assumptions<br />

A. Cryptographic Access Control<br />

Our work attempts to solve parts of the cryptographic access control (CAC)<br />

paradigm, in which traditional access control enforcement method with (implicitly<br />

trusted) reference monitors are replaced by cryptography. This shift is motivated<br />

by the high assurance dem<strong>and</strong>s on the enforcement method <strong>and</strong> the inherent lack<br />

of high assurance in the majority of the real-life reference monitors (such as commercial<br />

OSs) as well as by cloud computing.<br />

The CAC-paradigm benefits include more solid theory (<strong>and</strong> thus assurance)<br />

behind the actual implementations, <strong>and</strong> easier distributability of encrypted content<br />

into the cloud. Especially from the perspective of MLS, st<strong>and</strong>ardized encryption<br />

algorithms provide an accepted means of protecting classified data [10] <strong>and</strong> enforcing<br />

the isolation of different classes.<br />

Enforcing access control cryptographically requires a shift in the mindset<br />

as well: cryptography is not by itself able to enforce much anything. It has mainly<br />

two premises (in this context):<br />

• Cryptography can disable the READ-permission by making the material<br />

incomprehensible (it can not permit viewing per sé)<br />

• Cryptography can disable WRITE-permission by making it possible to<br />

detect unauthorized changes; it can not prevent bit-flips or deletions /<br />

insertions as such.<br />

Thus anything enforcable cryptographically should be able to be reduced to<br />

a set of read- <strong>and</strong> write-operations.<br />

B. Publish-Subscribe model<br />

We adopt the model depicted in [5] for third-party distribution of XMLdocuments,<br />

<strong>and</strong> introduce a “smart edge” acting in between the user <strong>and</strong> the cloud.<br />

The architecture is shown in Fig. 2.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!