FriendStar: Extensible Web Applications with Information Flow Control

نویسندگان

  • Amit Levy
  • Ali Mashtizadeh
چکیده

Web applications are increasingly becoming the primary curators of personal and corporate data. Social media applications like Facebook, LinkedIn and Twitter have transformed how users communicate with each other, while online document suites like Google Docs or Docs.com have made online collaboration the norm. Much of the success of such Web applications is due to the flexibility in allowing third-party vendors to extend user experiences. For example, Mint.com has been able to leverage the availability of banking data online to provide users with better ways of managing and visualizing their money. However, today’s web application APIs provide too little extensibility at too high a privacy cost for the next generation of web application extensions. Commonly, web application platforms find a middle ground between restricting access to data by third-party applications and requiring users to disclose private information: sacrificing both extensibility and privacy. This is a fundamental tradeoff in current architectures since third-party vendors must be trusted completely with data they have access to. For example, it is impossible for users to use an external photo editing application like Picnik while having the guarantee that their private Facebook photos won’t be misused. In the social web, data belonging to one user might be accessible to an application installed by another user, introducing even more complexity. In this paper we describe FriendStar, a web platform built in Haskell that uses information flow control [1] (IFC) to enforce policies on untrusted code. IFC allows users to specify policies in terms of where data can flow instead of what code is privileged to access it. For example, Alice can allow Bob to access her photo albums, while preventing any of Bob’s applications from leaking her photos to other users or external servers. To enforce these policies, every object is labeled, allowing the system to verify information flow is not being violated at the boundaries, e.g. the file system, network or database.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Balancing Isolation and Sharing of Data in Third-Party Extensible App Ecosystems

In the landscape of application ecosystems, today’s cloud users wish to personalize not only their browsers with various extensions or their smartphones with various applications, but also the various extensions and applications themselves. The resulting personalization significantly raises the attractiveness for typical Web 2.0 users, but gives rise to various security risks and privacy concer...

متن کامل

Rethinking Web Platform Extensibility

OF THE DISSERTATION RETHINKING WEB PLATFORM EXTENSIBILITY by MOHAN DHAWAN Dissertation Director: Vinod Ganapathy The modern Web platform provides an extensible architecture that lets third party extensions, often untrusted, enhance and customize the Web browser and the Web applications. While the prevalence of extensions for both browsers and applications has been instrumental in making the Web...

متن کامل

Identifying Inter-Component Control Flow in Web Applications

As web applications become more complex, automated techniques for their testing and verification have become essential. Many of these techniques, such as ones for identifying security vulnerabilities, require information about a web application’s control flow. Currently, this information is manually specified or automatically generated using techniques that cannot give strong guarantees of comp...

متن کامل

Versus: A Web Repository

The Web is a great personal enhancement tool, but the amount of data available is so vast that its true potential can only be harnessed with applications specialized in aiding users to find, sort, filter, summarize and mine this data. With today’s limitations, applications wouldn’t be able to solve user queries based on a vast part of the Web in useful time, because it would take them too long ...

متن کامل

Reflective Collaborative Agents for Complex Service Integration

With the advent of more and more services available on the Web, a user can have a difficult job of assembling the various pieces of a complex task to arrive at a final solution. Not only would the user need to access each web-based resource through its individual client-side interface, but she would also need to interpret its response to her request, and to manually combine the multiple respons...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011