22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

444 <strong>Military</strong> <strong>Communications</strong> <strong>and</strong> <strong>Information</strong> <strong>Technology</strong>...<br />

The data is assumed to be stored in the “cloud”, i.e. somewhere else than where<br />

the actual creators, modifiers, viewers <strong>and</strong> removers of the data reside. This cloud<br />

has several storage providers, which collectively are assumed to have the following<br />

properties:<br />

The cloud focuses on availability, <strong>and</strong> there is always one “clean” copy of a desired<br />

document available (after some time or a number of checks). The cloud is not<br />

able to discern between clean <strong>and</strong> corrupted documents. The cloud is also able to<br />

push authorized changes to a document eventually to other copies throughout its<br />

sphere of influence<br />

Figure 2. Environment for the CBIS documents<br />

The roles related to h<strong>and</strong>ling of data are as follows:<br />

• Data Owner is responsible for the data <strong>and</strong> decides the access control policy<br />

<strong>and</strong> approves its change policy. Each document has a unique owner, who<br />

controls all the sub-elements of the document.<br />

• Users are the “consumers” of the data blob. A User has READ- <strong>and</strong>/or<br />

WRITE-permissions to a set of element. If the user has READ-permissions,<br />

she is able to decrypt the content; if she has WRITE-permissions, her edits<br />

can be considered valid via her digital signature. Some users can act on<br />

the behalf of the Owner, <strong>and</strong> have ADMIN-permissions (permissions to<br />

order changes to the permissions from the Filter)<br />

• Storage is one element in the cloud where the documents physically may<br />

reside. Storage servers are not trusted to view or modify (including filtering<br />

<strong>and</strong> other reference monitor duties) content, but they are trusted to h<strong>and</strong>le

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!