Garm: Cross Application Data Provenance and Policy Enforcement
نویسنده
چکیده
We present Garm, a new tool for tracing data provenance and enforcing data access policies with arbitrary binaries. Users can use Garm to attach access policies to data and Garm ensures that all accesses to the data (and derived data) across all applications and executions are consistent with the policy. Garm uses a staged analysis that combines a static analysis with a dynamic analysis to trace the provenance of an application’s state and the policies that apply to this state. The implementation monitors the interactions of the application with the underlying operating system to enforce policies. Conceptually, Garm combines trusted computing support from the underlying operating system with a stream cipher to ensure that data protected by an access policy cannot be accessed outside of Garm’s policy enforcement mechanisms. We have evaluated Garm with several common Linux applications. We found that Garm can successfully trace the provenance of data across executions of multiple applications and enforce data access policies on the application’s executions.
منابع مشابه
Provenance-based data traceability model and policy enforcement framework for cloud services
FACULTY OF ENGINEERING AND APPLIED SCIENCE DEPARTMENT OF ELECTRONICS AND COMPUTER SCIENCE Doctor of Engineering
متن کاملLanguage-based Enforcement of User-defined Security Policies (As Applied to Multi-tier Web Programs)
Title of dissertation: Language-based Enforcement of User-defined Security Policies As Applied to Multi-tier Web Programs Nikhil Swamy, Doctor of Philosophy, 2008 Directed by: Professor Michael Hicks Department of Computer Science Over the last 35 years, researchers have proposed many different forms of security policies to control how information is managed by software, e.g., multi-level infor...
متن کاملData Provenance, Evidence-Based Policy Assessment, and e-Social Science
This paper considers how the concept of data provenance, developed in e-Science, can be applied to e-Social Science, specifically Evidence Based Policy Assessment. It considers what Evidence Based Policy Assessment is and what types of information can be used in such research. Quantitative and qualitative data and analytical/ interpretative approaches are outlined and the implications of these ...
متن کاملACCESSPROV: Tracking the Provenance of Access Control Decisions
Access control protects security-sensitive operations from access by unauthorized subjects. Unfortunately, access control mechanisms are implemented manually in practice, which can lead to exploitable errors. Prior work aims to find such errors through static analysis, but the correctness of access control enforcement depends on runtime factors, such as the access control policies enforced and ...
متن کاملThe Aspect-Oriented Architecture of the CAPS Framework for Capturing, Analyzing and Archiving Provenance Data
With aspect-oriented programming techniques, modularity may be achieved via separating cross-cutting concerns. Data provenance can be considered as a crosscutting concern: code for collecting provenance data is usually scattered across various places in a software system. Aspect-oriented programming allows to seamlessly integrate cross-cutting concerns into existing software applications withou...
متن کامل