Security and Privacy by Declarative Design

被引:12
|
作者
Maffei, Matteo [1 ]
Pecina, Kim [1 ]
Reinert, Manuel [1 ]
机构
[1] Univ Saarland, D-66123 Saarbrucken, Germany
关键词
ACCESS-CONTROL; AUTHENTICATION; AUTHORIZATION; LANGUAGE; SYSTEMS;
D O I
10.1109/CSF.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e. g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking. In this work, we present a solution based on declarative design. The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization. Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification. The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties. We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.
引用
收藏
页码:81 / 96
页数:16
相关论文
共 50 条
  • [31] Lagrange Coded Computing: Optimal Design for Resiliency, Security, and Privacy
    Yu, Qian
    Li, Songze
    Raviv, Netanel
    Kalan, Seyed Mohammadreza Mousavi
    Soltanolkotabi, Mahdi
    Avestimehr, A. Salman
    [J]. 22ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND STATISTICS, VOL 89, 2019, 89
  • [32] Defining IoT Orchestrations with Security and Privacy by Design: A Gap Analysis
    Manos, Papoutsakis
    Konstantinos, Fysarakis
    George, Spanoudakis
    Sotiris, Ioannidis
    [J]. IEEE Internet of Things Magazine, 2021, 4 (02): : 80 - 87
  • [33] Security and Privacy by Design is Key in the Internet of Everything (IoE) Era
    Mohanty, Saraju P.
    [J]. IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 4 - 5
  • [34] Design and Use of Privacy Capture-the-Flag Challenges in an Introductory Class on Information Privacy and Security
    Vigl, Wolfgang
    Abramova, Svetlana
    [J]. PROCEEDINGS OF THE 2024 CONFERENCE INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, VOL 1, ITICSE 2024, 2024, : 618 - 624
  • [35] Enhancing web privacy protection through declarative policies
    Kolari, P
    Ding, L
    Shashidhara, G
    Joshi, A
    Finin, T
    Kagal, L
    [J]. SIXTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 57 - 66
  • [36] Security and Privacy: Why Privacy Matters
    Bird, Stephanie J.
    [J]. SCIENCE AND ENGINEERING ETHICS, 2013, 19 (03) : 669 - 671
  • [37] Security and Privacy: Why Privacy Matters
    Stephanie J. Bird
    [J]. Science and Engineering Ethics, 2013, 19 : 669 - 671
  • [38] The Need for Declarative Properties in Digital IC Security
    El Massad, Mohamed
    Imeson, Frank
    Garg, Siddharth
    Tripunitara, Mahesh
    [J]. PROCEEDINGS OF THE GREAT LAKES SYMPOSIUM ON VLSI 2017 (GLSVLSI' 17), 2017, : 333 - 338
  • [39] The ethics of trading privacy for security: The multifaceted effects of privacy on liberty and security
    Satra, Henrik Skaug
    [J]. TECHNOLOGY IN SOCIETY, 2022, 68
  • [40] Privacy and Security Making Security Sustainable
    Anderson, Ross
    [J]. COMMUNICATIONS OF THE ACM, 2018, 61 (03) : 24 - 26