Security and Privacy by Declarative Design

被引:12
|
作者
Maffei, Matteo [1 ]
Pecina, Kim [1 ]
Reinert, Manuel [1 ]
机构
[1] Univ Saarland, D-66123 Saarbrucken, Germany
关键词
ACCESS-CONTROL; AUTHENTICATION; AUTHORIZATION; LANGUAGE; SYSTEMS;
D O I
10.1109/CSF.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e. g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking. In this work, we present a solution based on declarative design. The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization. Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification. The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties. We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.
引用
收藏
页码:81 / 96
页数:16
相关论文
共 50 条
  • [1] Design and Generation of a Set of Declarative APIs for Security Orchestration
    Islam, Chadni
    Babar, M. Ali
    Nepal, Surya
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (01) : 127 - 141
  • [2] Privacy and security by design: Comparing the EU and Israeli approaches to embedding privacy and security
    Haber, Eldar
    Tamo-Larrieux, Aurelia
    [J]. COMPUTER LAW & SECURITY REVIEW, 2020, 37
  • [3] “Global privacy and security, by design: Turning the “privacy vs. security” paradigm on its head”
    Ann Cavoukian
    [J]. Health and Technology, 2017, 7 (4) : 329 - 333
  • [4] International council on global privacy and security, by design
    Cavoukian A.
    [J]. IEEE Potentials, 2016, 35 (05): : 43 - 46
  • [5] Privacy and Security by Design Guest Editors' Introduction
    Gedeon, Ibrahim J.
    Snively, Pamela
    Frey, Carey
    Almuhtadi, Wahab
    Mohanty, Saraju P.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 76 - 77
  • [6] Protecting Privacy with a Declarative Policy Framework
    Martiny, Karsten
    Elenius, Daniel
    Denker, Grit
    [J]. 2018 IEEE 12TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2018, : 227 - 234
  • [7] The need for declarative security mechanisms
    Probst, S
    Küng, J
    [J]. PROCEEDINGS OF THE 30TH EUROMICRO CONFERENCE, 2004, : 526 - 531
  • [8] Usable Security and Privacy for Security and Privacy Workers
    Zurko, Mary Ellen
    Haney, Julie
    [J]. IEEE SECURITY & PRIVACY, 2023, 21 (01) : 8 - 10
  • [9] Cyber Security and Privacy Experiments: A Design and Reporting Toolkit
    Coopamootoo, Kovila P. L.
    Gross, Thomas
    [J]. PRIVACY AND IDENTITY MANAGEMENT: THE SMART REVOLUTION, 2018, 526 : 243 - 262
  • [10] Pripare: A new vision on engineering privacy and security by design
    Notario, Nicolás
    Crespo, Alberto
    Kung, Antonio
    Kroener, Inga
    Le Métayer, Daniel
    Troncoso, Carmela
    Del Álamo, José M.
    Martín, Yod Samuel
    [J]. Communications in Computer and Information Science, 2014, 470 : 65 - 76