Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control
Abstract
:1. Introduction
2. Motivation Example
3. Provenance and Collection Purposes
3.1. Provenance Preservation
3.2. Provenance in Aggregated Resources
4. Provenance-Enabled Access Control
4.1. Provenance-Enabled AERBAC
4.2. Analysis and Discussion
5. Related Work
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- What Is Personal Information? 5 May 2017. Available online: https://www.oaic.gov.au/privacy/guidance-and-advice/what-is-personal-information (accessed on 10 April 2021).
- Principles Relating to the Processing of Personal Data. 2018. Available online: http://gdpr-info.eu/art-5-gdpr/ (accessed on 15 March 2021).
- Goodwin Simon Strategic Research. Summary of Key Findings from California Privacy Survey; Goodwin Simon Strategic Research: Oakland, CA, USA, 2019. [Google Scholar]
- Strohbach, M.; Ziekow, H.; Gazis, V.; Akiva, N. Towards a Big Data Analytics Framework for IoT and Smart City Applications. In Modeling and Processing for Next-Generation Big-Data Technologies; Modeling and Optimization in Science and Technologies; Xhafa, F., Barolli, L., Barolli, A., Papajorgji, P., Eds.; Springer: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Li, W.; Batty, M.; Goodchild, M.F. Real-time GIS for smart cities. Int. J. Geogr. Inf. Sci. 2020, 34, 311–324. [Google Scholar] [CrossRef]
- Wenning, R.; Kirrane, S. Compliance Using Metadata. In Semantic Applications: Methodology, Technology, Corporate Use; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Banerjee, A.; Naumann, D.A. History-Based Access Control and Secure Information Flow. In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop CASSIS; Springer: Berlin/Heidelberg, Germany, 2005; pp. 27–48. [Google Scholar]
- Moreau, L. The foundations for provenance on the web. Found. Trends Web Sci. 2010, 2, 99–241. [Google Scholar] [CrossRef]
- Allen, M.; Chapman, A.; Seligman, L.; Blaustein, B. Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), Orlando, FL, USA, 15–18 October 2011; pp. 342–351. [Google Scholar]
- Sultan, S.; Jensen, C.D. Secondary Use Prevention in Large-Scale Data Lakes. In Advances in Intelligent Systems and Computing; Computing Conference 2021, London, UK, 15–16 July 2021; Springer: Berlin/Heidelberg, Germany, 2021. [Google Scholar]
- Moreau, L.; Clifford, B.; Freire, J.; Futrelle, J.; Gil, Y.; Groth, P.T.; Kwasnikowska, N.; Miles, S.; Missier, P.; Myers, J.; et al. The open provenance model core specification (OPM) (v1.1). Future Gener. Comp. Syst. 2011, 27, 743–756. [Google Scholar] [CrossRef] [Green Version]
- Braun, U.; Shinnar, A.; Seltzer, M. Securing Provenance. In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec ’08), San Jose, CA, USA, 28 July–1 August 2008; pp. 1–5. [Google Scholar]
- Buneman, P.; Cheney, J.; Kostylev, E. Hierarchical models of provenance. In Proceedings of the 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2012), Boston, MA, USA, 14–15 June 2012. [Google Scholar]
- Sandhu, R.; Ferraiolo, D.; Kuhn, R. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (RBAC ’00), Berlin, Germany, 26–27 July 2000; Association for Computing Machinery: New York, NY, USA, 2000; pp. 47–63. [Google Scholar]
- Al-Kahtani, M.A.; Sandhu, R. A model for attribute-based user-role assignment. In Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC), Las Vegas, NV, USA, 9–13 December 2002; pp. 353–362. [Google Scholar]
- Anggorojati, B.; Mahalle, P.N.; Prasad, N.R.; Prasad, R. Capability-based Access Control Delegation Model on the Federated IoT Network. In Proceedings of the WPMC 2012: 15th International Symposium on Wireless Personal Multimedia Communications, Taipei, Taiwan, 24–27 September 2012; pp. 604–608. [Google Scholar]
- Dimmock, N.; Bacon, J.; Ingram, D.; Moody, K. Risk Models for Trust-Based Access Control (TBAC). In iTrust 2005: Trust Management; Lecture Notes in Computer, Science; Herrmann, P., Issarny, V., Shiu, S., Eds.; Springer: Berlin/Heidelberg, Germany, 2005; Volume 3477. [Google Scholar]
- Cadenhead, T.; Khadilkar, V.; Kantarcioglu, M.; Thuraisingham, B. A language for provenance access control. In Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY’11), San Antonio, TX, USA, 21–23 February 2011; pp. 133–144. [Google Scholar]
- Cadenhead, T.; Khadilkar, V.; Kantarcioglu, M.; Thuraisingham, B. Transforming provenance using redaction. In Proceedings of the 16th ACM Symposium on Access Control Models and Technologies (SACMAT’11), Innsbruck, Austria, 15–17 June 2011; pp. 93–102. [Google Scholar]
- Mahmood Rajpoot, Q.; Jensen, C.D.; Krishnan, R. Attributes Enhanced Role-Based Access Control Model. In Proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business (TrustBus’15), Valencia, Spain, 1–2 September 2015; pp. 3–17. [Google Scholar]
- Davidson, S.; Cohen-Boulakia, S.; Eyal, A.; Ludaescher, B.; McPhillips, T.; Bowers, S.; Anand, M.; Freire, J. Provenance in scientific workflow systems. IEEE Data Eng. Bull. 2007, 30, 44–50. [Google Scholar]
- Chapman, A.; Blaustein, B.T.; Seligman, L.; Allen, M.D. PLUS: A provenance manager for integrated information. In Proceedings of the 12th IEEE International Conference on Information Reuse and Integration (IRI 2011), Las Vegas, NV, USA, 3–5 August 2011; pp. 269–275. [Google Scholar]
- Mahmood Rajpoot, Q. Enhancing Security and Privacy in Video Surveillance through Role-Oriented Access Control Mechanism. Ph.D. Thesis, Technical University of Denmark, Kgs. Lyngby, Denmark, 2016. [Google Scholar]
- Abu Jabal, A.; Davari, M.; Bertino, E.; Makaya, C.; Calo, S.B.; Verma, D.; Williams, C. ProFact: A Provenance-based Analytics Framework for Access Control Policies. IEEE Trans. Serv. Comput. 2019. [Google Scholar] [CrossRef]
- Brouwer, E.R. Legality and Data Protection Law: The Forgotten Purpose of Purpose Limitation. In The Eclipse of Legality Principle in the European Union; Besselink, L., Pennings, F., Prechal, S., Eds.; Kluwer Law International: Alphen aan den Rijn, The Netherlands, 2011; pp. 273–294. [Google Scholar]
- Nguyen, D.; Park, J.; Sandhu, R. Integrated provenance data for access control in group-centric collaboration. In Proceedings of the 13th IEEE International Conference on Information Reuse and Integration (IRI 2012), Las Vegas, NV, USA, 8–10 August 2012; pp. 255–262. [Google Scholar]
- Missier, P.; Belhajjame, K.; Cheney, J. The W3C PROV family of specifications for modelling provenance metadata. In Proceedings of the 16th International Conference on Extending Database Technology (EDBT’13), Genoa, Italy, 18–22 March 2013; Association for Computing Machinery: New York, NY, USA, 2013; pp. 773–776. [Google Scholar] [CrossRef]
- Nguyen, D.; Park, J.; Sandhu, R. A provenance-based access control model for dynamic separation of duties. In Proceedings of the 11th Annual Conference on Privacy, Security, and Trust (PST 2013), Tarragona, Catalonia, 10–12 July 2013. [Google Scholar]
- Gehani, A.; Tariq, D.; Baig, B.; Malik, T. Policy-Based Integration of Provenance Metadata. In Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6–8 June 2011; pp. 149–152. [Google Scholar] [CrossRef] [Green Version]
- Park, J.; Nguyen, D.; Sandhu, R. A provenance-based access control model. In Proceedings of the 2012 10th Annual International Conference on Privacy, Security, and Trust, (PST 2012), Paris, France, 16–18 July 2012; pp. 137–144. [Google Scholar] [CrossRef]
- Nguyen, D.; Park, J.; Sandhu, R. Adopting Provenance-Based Access Control in OpenStack Cloud IaaS. In NSS 2015: Network and System Security; Lecture Notes in Computer Science; Au, M.H., Carminati, B., Kuo, C.C.J., Eds.; Springer: Berlin/Heidelberg, Germany, 2014; Volume 8792. [Google Scholar]
- Fan, X.; Zhang, F.; Turamat, E.; Tong, C.; Wu, J.H.; Wang, K. Provenance-based Classification Policy based on Encrypted Search. In Proceedings of the 2020 2nd International Conference on Industrial Artificial Intelligence (IAI), Shenyang, China, 24–26 July 2020. [Google Scholar]
- Bates, A.; Mood, B.; Valafar, M.; Butler, K. Towards secure provenance-based access control in cloud environments. In Proceedings of the Third ACM Conference on Data and Application Security and Privacy (CODASPY 2013), San Antonio, TX, USA, 18–20 February 2013; pp. 277–284. [Google Scholar]
- Bertino, E.; Zhou, L.; Ooi, B.C.; Meng, X. Purpose Based Access Control for Privacy Protection in Database Systems. In Proceedings of the 10th International Conference on Database Systems for Advanced Applications (DASFAA’05), Beijing, China, 17–20 April 2005. [Google Scholar]
- Kabir, M.E.; Wang, H.; Bertino, E. A Conditional Purpose-Based Access Control Model with Dynamic Roles. Expert Syst. Appl. 2011, 38, 1482–1489. [Google Scholar] [CrossRef]
- Kabir, M.E.; Wang, H. Conditional Purpose-Based Access Control Model for Privacy Protection. In Proceedings of the Twentieth Australasian Conference on Australasian Database (ADC ’09), Wellington, New Zealand, 20–23 January 2009; Volume 92, pp. 135–142. [Google Scholar]
- Colombo, P.; Ferrari, E. Enhancing MongoDB with Purpose-Based Access Control. IEEE Trans. Dependable Secure Comput. 2017, 14, 591–604. [Google Scholar] [CrossRef]
- Wang, H.; Sun, L.; Bertino, E. Building access control policy model for privacy-preserving and testing policy conflicting problems. J. Comput. System Sci. 2014, 80, 1493–1503. [Google Scholar] [CrossRef]
Data Source (with Personal Information) | Legal Base | Likely Collection Purposes for Aggregated Resource |
---|---|---|
Video Surveillance Data (Unstructured) | Public Interest |
|
Vehicles’ Sensor Data from Public Transportation Modes (Semi-Structured) | Contract |
|
Vehicle registration data (structured) | Legal Obligation |
|
GDPR Article Info. | Description |
---|---|
Data minimization (9, Article 5, x1(c)) | “(Personal data shall be) adequate, relevant, and limited to what is necessary for relation to the purposes for which they are processed (...)” |
Purpose limitation (9, Article 5, x1(b)) | “(Personal data shall be) collected for specified, explicit, and legitimate purposes and not further processed in a manner that is incompatible with those purposes (...)” |
Access control (9, Article 25, x1) | “The controller shall implement appropriate technical and organizational measures for ensuring that, by default, only personal data, which are necessary for each specific purpose of the processing, are processed (...) personal data are not made accessible without the individual’s intervention to an indefinite number of natural persons.” |
Legal Base | “Consent should be given by a clear affirmative act establishing a freely given, specific, informed, and unambiguous indication of the data subject’s agreement to the processing of personal data relating to him or her (...)” |
Consent (9, Recital (32)) | “(...) the controller shall have the obligation to erase personal data without undue delay where one of the following grounds applies: the personal data are no longer necessary in relation to the purposes for which they were collected or otherwise.” |
Right to be forgotten (9, Article 17 x1) |
OBS | OATT | EATT |
---|---|---|
Video Surveillance Recording (entityA) | Time-of-recording, compression-ratio, camera-type, camera-elevation, events-type-detected-in-recording, objects-type-detected-in-recording, object-type (human, vehicles), object-descriptive-features (gender, color, estimated age, and height), object-identification-features (face, gait, license plate), geo-location data (spatiotemporal position of any object at a specific time), camera-locations (highways and others along the road capturing traffic only), devices (video camera types and unique IDs), timestamp-of-the-recording, etc. | Recording Location Time-of-recording |
Vehicle GPS Readings (entityB) | Vehicle-ID, GPS-reading, geo-location data (spatiotemporal position of a vehicle at a specific time), timestamp-of-the-recording, etc. | Reading Timestamp Reading Location |
Vehicle Registration Data (entityC) | Vehicle-ID, owner-ID, registered-license-plate, owners-driving-license-ID, violation-history, etc. | Vehicle Location |
Implicit Collection Purpose for OBS (entityABC) Traffic Law Enforcement | Obj. Expression (Examples) |
---|---|
*As entityABC is an aggregation of three OBS so it inherits (OATT) from all three parent entities. Only OATT that can store personal information is mentioned in ‘collection purpose’. 1.Personal Data Properties: (entityA) OATT: Object-type (human, vehicles), object-descriptive-features (gender, color, estimated-age and height), object- identification-features (face, gait, license-plate) (entityB) OATT: Vehicle-ID, geo-location data (Spatio-temporal position of a vehicle) (entityC) OATT: Vehicle-ID, Owner-ID, registered-license-plate, Owners-driving-license-ID 2.Personal data property to function Mapping: (Vehicle’s License plate, driver’s face) -> (are bound to functions {traffic light violation, Speeding vehicle, Wrong parking, Wrong turn, Driving in a bus lane, Junction-box violation}) (Vehicle’s License plate, driver’s and passengers’ face)-> {Accident/ Vehicle collision, Seat belt, child detected without a child seat, etc.} *An exhaustive list is defined for different agreed-upon functions and are bind to the required OATT describing personal information 3.Compliance Policy: will be used for public interest reasons:
4. Aggregation Limitation: The said resource when aggregated with any other resource requires specific authorization from public-authority DC supported by a legal base of Consent, Legal obligation, or Vital Interest if used for the following functions/sub purposes.
| Example 1 Description: Video-recordings that contains event-type “Speeding” (OATT) at location (EATT) “east highway” at the current time (EATT) Formal: Loc-type (EATT) = “East Highway”) ^ (Event (OATT) INCLUDES “speeding”) ^ (timestamp (EATT) current. Timestamp) Example 2 Description: Video-recordings that contains event-type “trespassing” (OATT) at a location (EATT) “town-museum” from December 1, 2020- December 15, 2020 (EATT) Formal: Loc-type (EATT) = “East Highway”) ^ (Event (OATT) INCLUDES “speeding”) ^ (timestamp (EATT) ” ^ (timestamp(o) AFTER 2020.12.01 00:00:00 BEFORE 2020.12.15 00:00:00) Example 3 Description: Insert fine for licensed-owner of the vehicle with event-type “Speeding” (OATT) Formal: OBS event-type “Speeding” (OATT) ^ object-identification = “license-plate”-> Operation (OPS) INSERT fine (OATT) FOR “license-plate-> licensed owner” = “licensed owner” |
Role UATT | Access Purpose (Issue Fine for a Traffic Violation) | Authorized OBS | Conditions |
---|---|---|---|
Traffic-Law Enforcement System | 1. Detect and identify traffic event that is considered a violation either via video recording or senor-reading (e.g., speeding) 2. Identify the object-type vehicle (through its license plate or driver’s identification information) from video data, and in case of a detected traffic violation issue a fine and penalty points to the object-type driver, if applicable. | Video Surveillance Recordings, Vehicle Registration Database, Real-Time Updates From Traffic-Related Sensors | Licensed-owner (OATT) of entityC Vehicle Registration is equal to the license plate (OATT) of entityA value of object-type associated to the “Event-type” = traffic violation AND [“Event-type” (OATT) of the OBS video-recording is a traffic violation OR “Event-type” (OATT) of the OBS traffic sensors is a traffic violation] |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sultan, S.; Jensen, C.D. Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control. Sensors 2021, 21, 3041. https://doi.org/10.3390/s21093041
Sultan S, Jensen CD. Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control. Sensors. 2021; 21(9):3041. https://doi.org/10.3390/s21093041
Chicago/Turabian StyleSultan, Shizra, and Christian D. Jensen. 2021. "Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control" Sensors 21, no. 9: 3041. https://doi.org/10.3390/s21093041
APA StyleSultan, S., & Jensen, C. D. (2021). Ensuring Purpose Limitation in Large-Scale Infrastructures with Provenance-Enabled Access Control. Sensors, 21(9), 3041. https://doi.org/10.3390/s21093041