Security and Privacy by Declarative Design

被引:12
|
作者
Maffei, Matteo [1 ]
Pecina, Kim [1 ]
Reinert, Manuel [1 ]
机构
[1] Univ Saarland, D-66123 Saarbrucken, Germany
关键词
ACCESS-CONTROL; AUTHENTICATION; AUTHORIZATION; LANGUAGE; SYSTEMS;
D O I
10.1109/CSF.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e. g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking. In this work, we present a solution based on declarative design. The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization. Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification. The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties. We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.
引用
收藏
页码:81 / 96
页数:16
相关论文
共 50 条
  • [21] A Scalable Inclusive Security Intervention to Center Marginalized & Vulnerable Populations in Security & Privacy Design
    Sim, Mattea
    Hugenberg, Kurt
    Kohno, Tadayoshi
    Roesner, Franziska
    [J]. NEW SECURITY PARADIGMS WORKSHOP, NSPW 2023, 2023, : 102 - 115
  • [22] Security and privacy
    Geer, D
    Gong, L
    Ranum, M
    Neuman, C
    Zurko, ME
    [J]. IEEE CONCURRENCY, 2000, 8 (02): : 70 - 79
  • [23] Security and Privacy
    Davies, N
    [J]. IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 20 - 20
  • [24] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael A.
    Chorti, Arsenia
    Pawar, Sanjay S.
    Urbina-Pineda, Julia
    Kurt, Gunes Karabulut
    Cheema, Ahmad Raza
    Taha, Sajid
    Chng, Baw
    Rawal, Bharat S.
    de Carvalho, Glaucio H. S.
    [J]. 2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [25] Privacy and security
    Moglen, Eben
    [J]. Communications of the ACM, 2013, 56 (02) : 20 - 22
  • [26] Security & privacy
    Hong, Jason
    Satyanarayan, Mahadev
    Cybenko, George
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 15 - 17
  • [27] Privacy and Security
    Consolvo, Sunny
    Hong, Jason
    Langheinrich, Marc
    [J]. IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 16 - 17
  • [28] Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
    Wang, Kailong
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 441 - 445
  • [29] Optimal CBDC design for Ukraine through the lens of privacy and security
    Hudima, Tetiana
    Kamyshanskyi, Vladyslav
    Dmytrenko, Tetiana
    Shmyhov, Mykhailo
    [J]. AMAZONIA INVESTIGA, 2023, 12 (69): : 73 - 83
  • [30] Co-Creating Security-and-Privacy-by-Design Systems
    Vicini, Sauro
    Alberti, Francesco
    Sanna, Alberto
    Notario, Nicolas
    Crespo, Alberto
    Troncoso Pastoriza, Juan Ramon
    [J]. PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 768 - 775