A Data Capsule Framework For Web Services: Providing Flexible Data Access Control To Users

02/01/2010
by   Jayanthkumar Kannan, et al.
0

This paper introduces the notion of a secure data capsule, which refers to an encapsulation of sensitive user information (such as a credit card number) along with code that implements an interface suitable for the use of such information (such as charging for purchases) by a service (such as an online merchant). In our capsule framework, users provide their data in the form of such capsules to web services rather than raw data. Capsules can be deployed in a variety of ways, either on a trusted third party or the user's own computer or at the service itself, through the use of a variety of hardware or software modules, such as a virtual machine monitor or trusted platform module: the only requirement is that the deployment mechanism must ensure that the user's data is only accessed via the interface sanctioned by the user. The framework further allows an user to specify policies regarding which services or machines may host her capsule, what parties are allowed to access the interface, and with what parameters. The combination of interface restrictions and policy control lets us bound the impact of an attacker who compromises the service to gain access to the user's capsule or a malicious insider at the service itself.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/21/2019

Self-Expiring Data Capsule using Trusted Execution Environment

Data privacy is unarguably of extreme importance. Nonetheless, there exi...
research
02/16/2022

Data Capsule: A Self-Contained Data Model as an Access Policy Enforcement Strategy

In this paper, we introduce a data capsule model, a self-contained and s...
research
03/23/2019

PML: An Interpreter-Based Access Control Policy Language for Web Services

Access control is an important component for web services such as a clou...
research
09/13/2018

Fidelius: Protecting User Secrets from Compromised Browsers

Users regularly enter sensitive data, such as passwords, credit card num...
research
08/20/2019

MicroTEE: Designing TEE OS Based on the Microkernel Architecture

ARM TrustZone technology is widely used to provide Trusted Execution Env...
research
02/05/2019

A Surveillance Infrastructure for Malaria Analytics: Provisioning Data Access and Preservation of Interoperability

We propose the Semantics, Interoperability, and Evolution for Malaria An...
research
10/23/2017

New ADS Functionality for the Curator

In this paper we provide an update concerning the operations of the NASA...

Please sign up or login with your details

Forgot password? Click here to reset