22.01.2015 Views

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 4: <strong>Information</strong> Assurance & Cyber Defence<br />

447<br />

The Filter signs parts of the document security metadata (History-related).<br />

As the Filter is only semi-trusted, <strong>and</strong> ADMIN-users may have conflicts of interests,<br />

different public keys need a validity certification from the Owner.<br />

The Filter validity certification is required irrespective of the PKMA. We assume<br />

for simplicity that the correspondence between Owner <strong>and</strong> a document is oneto-many<br />

(instead of many-to-many). Thus the validity certification can be placed<br />

in the per-document metadata element. Furthermore, the schema doesn’t specify<br />

the form of the certification – it could be a PKI certificate, IBC-based delegation (e.g.<br />

with a public key of the type “Owner X grants admin privileges to<br />

Filter Y”, which is verifiable with the Owner X public parameters <strong>and</strong> the claimed<br />

string only), or something else, as long as it contains sufficient cryptographic strength.<br />

In order to separate the administration <strong>and</strong> content, some cryptographic<br />

conventions need to be observed:<br />

• The need to separate non-repudiation <strong>and</strong> basic integrity signatures<br />

is PKMA-dependent, so the number of signatures is left open here, <strong>and</strong><br />

the types of signatures are listed as widely as needed.<br />

• Layered encryption (super-encryption, encrypting already enciphered content)<br />

is not used. Opening administrative metadata would require additional<br />

layers of filters <strong>and</strong>/or key management. In [12] <strong>and</strong> [11] super-encryption<br />

is defined – the purpose here could be embedding other documents or hiding<br />

the access control information – but we leave it out here for simplicity.<br />

D. Design principles: versioning<br />

The main document is assumed to be modifiable. There are two types of modification<br />

possibilities: content modification <strong>and</strong> permission type modification.<br />

In each case, the CAC paradigm entails that since the actual modifications cannot<br />

be prevented (only detected), there should be a possibility of rollback <strong>and</strong> attribution<br />

(finding the perpetrator).<br />

Rollback requires versioning <strong>and</strong> storage of the previous versions. Content<br />

versioning is considered to be outside the scope of this paper – it can be done<br />

by creating a separate document per committed modification <strong>and</strong> transferring<br />

the versioning burden to the Storage (as it should be optimized for availability).<br />

Per-element versioning does affect the CBIS schema itself, <strong>and</strong> this is considered<br />

more of a document management than a security issue. Per-element versioning<br />

should bind the content signature together with the content – thus we do not consider<br />

content signature versioning either here.<br />

Attribution has two facets: illegal modifiers of content <strong>and</strong> security policy.<br />

If content is modified meaningfully, it implies than legal keys of some user are<br />

used. This in turn can be traced back to the user identity by comparing different<br />

versions <strong>and</strong> signature information. Thus content modification attribution is built<br />

in to the signatures (enforcing non-repudiation) <strong>and</strong> versioning.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!