Security and Privacy by Declarative Design

被引:13
|
作者
Maffei, Matteo [1 ]
Pecina, Kim [1 ]
Reinert, Manuel [1 ]
机构
[1] Univ Saarland, D-66123 Saarbrucken, Germany
关键词
ACCESS-CONTROL; AUTHENTICATION; AUTHORIZATION; LANGUAGE; SYSTEMS;
D O I
10.1109/CSF.2013.13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The privacy of users has rapidly become one of the most pervasive and stringent requirements in distributed computing. Designing and implementing privacy-preserving distributed systems, however, is challenging since these systems also have to fulfill seemingly conflicting security properties and system requirements: e. g., authorization and accountability require some form of user authentication and session management necessarily involves some form of user tracking. In this work, we present a solution based on declarative design. The core component of our framework is a logic-based declarative API for data processing that exports methods to conveniently specify the system architecture and the intended security properties, and conceals the cryptographic realization. Invisible to the programmer, the implementation of this API relies on a powerful combination of digital signatures, non-interactive zero-knowledge proofs of knowledge, pseudonyms, and reputation lists. We formally proved that the cryptographic implementation enforces the security properties expressed in the declarative specification. The systems produced by our framework enjoy interoperability and open-endedness: they can easily be extended to offer new services and cryptographic data can be shared and processed by different services, without requiring any extra bootstrapping phase or interaction among parties. We implemented the API in Java and conducted an experimental evaluation to demonstrate the practicality of our approach.
引用
收藏
页码:81 / 96
页数:16
相关论文
共 50 条
  • [21] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael
    Behmann, Fawzi
    Chorti, Arsenia
    Cheema, Ahmad
    Kadio, Kassi
    Urbina-Pineda, Julia
    Alam, Khaled
    Limam, Ahmed
    Chu, Fred
    Lester, John
    Park, Jong-Geun
    Bio-Ukeme, Joseph
    Pawar, Sanjay S.
    Layton, Roslyn
    Ramchandran, Prakash
    Okonkwo, Kingsley
    Ong, Lyndon
    Emmelmann, Marc
    Issa, Omneya
    Arul, Rajakumar
    Malik, Sireen
    Krishnan, Sivarama
    Sugumar, Suresh
    Lala, Tk
    Borst, Matthew
    Kloza, Brad
    2022 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2022,
  • [22] Security and privacy
    Geer, D
    Gong, L
    Ranum, M
    Neuman, C
    Zurko, ME
    IEEE CONCURRENCY, 2000, 8 (02): : 70 - 79
  • [23] Security and Privacy
    Davies, N
    IEEE PERVASIVE COMPUTING, 2003, 2 (01) : 20 - 20
  • [24] Privacy and security
    Moglen, Eben
    Communications of the ACM, 2013, 56 (02) : 20 - 22
  • [25] Security and Privacy
    Dutta, Ashutosh
    Hammad, Eman
    Enright, Michael A.
    Chorti, Arsenia
    Pawar, Sanjay S.
    Urbina-Pineda, Julia
    Kurt, Gunes Karabulut
    Cheema, Ahmad Raza
    Taha, Sajid
    Chng, Baw
    Rawal, Bharat S.
    de Carvalho, Glaucio H. S.
    2023 IEEE FUTURE NETWORKS WORLD FORUM, FNWF, 2024,
  • [26] Privacy and Security
    Consolvo, Sunny
    Hong, Jason
    Langheinrich, Marc
    IEEE PERVASIVE COMPUTING, 2015, 14 (01) : 16 - 17
  • [27] Security & privacy
    Hong, Jason
    Satyanarayan, Mahadev
    Cybenko, George
    IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 15 - 17
  • [28] Optimal CBDC design for Ukraine through the lens of privacy and security
    Hudima, Tetiana
    Kamyshanskyi, Vladyslav
    Dmytrenko, Tetiana
    Shmyhov, Mykhailo
    AMAZONIA INVESTIGA, 2023, 12 (69): : 73 - 83
  • [29] Analyzing Security and Privacy in Design and Implementation of Web Authentication Protocols
    Wang, Kailong
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 441 - 445
  • [30] Co-Creating Security-and-Privacy-by-Design Systems
    Vicini, Sauro
    Alberti, Francesco
    Sanna, Alberto
    Notario, Nicolas
    Crespo, Alberto
    Troncoso Pastoriza, Juan Ramon
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 768 - 775