skip to main content
research-article

Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions

Published:11 November 2022Publication History
Skip Abstract Section

Abstract

Data exchange between organizations is becoming an increasingly significant issue due to the great opportunities it presents. However, there is great reluctance to share if data sovereignty is not provided. Providing it calls for not only access control but also usage control implemented in distributed systems. Access control is a research field where there has been a great deal of work, but usage control, especially implemented in distributed systems as Distributed Usage Control (DUC), is a very new field of research that presents great challenges. Moreover, little is known about what challenges must really be faced and how they must be addressed. This is evidenced by the fact that existing research has focused non-specifically on different features of DUC, which are not formalized. Therefore, the path for the development of DUC solutions is unclear and it is difficult to analyze the scope of data sovereignty attained by the wide range of DUC solutions. In this context, this article is based on an initial in-depth analysis of DUC related work. In it, the challenges posed by DUC in terms of data sovereignty and the features that must be provided to address them are identified and analyzed for the first time. Based on these features, an initial DUC framework is proposed to assess in a practical and unified way the extent to which DUC solutions provide data sovereignty. Finally, the assessment framework is applied to compare the scopes of the most widespread DUC solutions and identify their limitations.

REFERENCES

  1. [1] Harrison Michael A., Ruzzo Walter L., and Ullman Jeffrey D.. 1976. Protection in operating systems. Commun ACM 19, 8 (1976), 461471. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Ammann Paul, Lipton Richard J., and Sandhu Ravi S.. 1996. The expressive power of multi-parent creation in monotonic access control models. Journal of Computer Security 4, 2/3 (1996), 149166. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Sandhu Ravi. 1996. Role hierarchies and constraints for lattice-based access controls. In Proceedings of the 4h European Symposium on Research in Computer Security. Lecture Notes in Computer Science, Computer Security-ESORICS96, Springer.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Matunda Nyanchama and Sylvia Osborn. 1996. Modeling Mandatory Access Control in Role-Based Security Systems. In Database Security IX. IFIP Advances in Information and Communication Technology, D. L. Spooner, S. A. Demurjian, and J. E. Dobson (Eds). Springer, Boston, MA. Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Sandhu Ravi and Munawer Qamar. 1998. How to do discretionary access control using roles. In Proceedings of the ACM Workshop on Role-Based Access Control. 4754.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Munawer Qamar and Sandhu Ravi. 1999. Simulation of the augmented typed access matrix model (ATAM) using roles. In Proceedings of INFOSECU99 International Conference on Information and SecurityU99.Google ScholarGoogle Scholar
  7. [7] Osborn Sylvia, Sandhu Ravi, and Munawer Qamar. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 2 (May 2000), 85106. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Yu Zhenxin, Yan Hong, and Edwin Cheng T. C.. 2001. Benefits of information sharing with supply chain partnerships. Industrial Management and Data Systems 101, 3 (2001), 114119. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Park Jaehong and Sandhu Ravi. 2002. Towards usage control models: Beyond traditional access control. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies. Monterey, California, USA, 5764. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Sandhu Ravi and Park Jaehong. 2003. Usage control: A vision for next generation access control. In Proceedings of the Computer Network Security. 1731. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Bettini Claudio, Jajodia Sushil, Sean Wang X., and Wijesekera Duminda. 2003. Provisions and obligations in policy rule management. Journal of Network and Systems Management 11, 3 (2003), 351372. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Li Ninghui, Mitchell John C., and Winsborough William H.. 2005. Beyond Proof-of-compliance: Security analysis in trust management. Journal of the ACM 52, 3 (2005), 474514. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. [13] Tripunitara Mahesh v and Li Ninghui. 2004. Comparing the expressive power of access control models. In Proceedings of the 11th ACM Conference on Computer and Communications Security. 6271. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. [14] Park Jaehong, Zhang Xinwen, and Sandhu Ravi. 2004. Attribute mutability in usage control. In Proceedings of the Research Directions in Data and Applications Security XVIII. 1529. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Park Jaehong and Sandhu Ravi. 2002. The UCON ABC usage control model. ACM Transactions on Information and System Security 7, 1 (2002), 128174. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Zhang Xinwen, Parisi-Presicce Francesco, and Sandhu Ravi. 2005. Formal model and policy specification of usage control. ACM Transactions on Information and System Security 8, 4 (2005), 351387. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Hilty Manuel, Basin David, and Pretschner Alexander. 2005. On obligations. In Proceedings of the 10th European Symposium on Research in Computer Security. 1214. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Alexander Pretschner, Manuel Hilty, and David Basin. 2006. Distributed usage control. Commun. ACM 49, 9 (September 2006), 39--44. Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Hilty M., Pretschner A., Basin D., Schaefer C., and Walter T.. 2007. A policy language for distributed usage control. In Proceedings of the 12th European Symposium on Research in Computer Security. 2426. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Tripunitara Mahesh v and Li Ninghui. 2007. A theory for comparing the expressive power of access control models. Journal of Computer Security 15, 2 (2007), 231272. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Katt Basel, Zhang Xinwen, Breu Ruth, Hafner Michael, and Seifert Jean-Pierre. 2008. A general obligation model and continuity-enhanced policy enforcement engine for usage control. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT). ACM, 123132. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Ardagna Claudio A., Bussard Laurent, Vimercati Sabrina de Capitani Di, Neven Gregory, Paraboschi Stefano, Pedrini Eros, Preiss Franz-Stefan, Raggett Dave, Samarati Pierangela, Trabelsi Slim, and Verdicchio Mario. 2009. PrimeLife Policy Language. Retrieved June 15, 2022 from https://www.w3.org/2009/policy-ws/papers/Trabelisi.pdf.Google ScholarGoogle Scholar
  23. [23] Lazouski Aliaksandr, Martinelli Fabio, and Mori Paolo. 2010. Usage control in computer security: A survey. Computer Science Review 4, 2 (May 2010), 8199. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Pearson Siani and Casassa Mont Marco. 2011. Sticky policies. An approach for managing privacy across multiple parties. IEEE Computer 44, 9 (2011), 6068. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. [25] Trabelsi Slim, Sendor Jakub, and Reinicke Stefanie. 2011. PPL: PrimeLife privacy policy engine. In Proceedings of the 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011. 184185. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] di Cerbo Francesco, Tabelsi Slim, Steingruber Thomas, Dodero Gabriella, and Bezzi Michele. 2013. Sticky policies for mobile devices. In Proceedings of the ACM symposium on Access control Models and Technologies, SACMAT. ACM, 257260. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Hinrichs Timothy L., Martinoia Diego, Garrison William C., Lee Adam J., Panebianco Alessandro, and Zuck Lenore. 2013. Application-sensitive access control evaluation using parameterized expressiveness. In Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium. 145160. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Organization for the Advancement of Structured Information Standards (OASIS). 2013. eXtensible Access Control Markup Language (XACML) Version 3.0. Retrieved June 15, 2022 from http://docs.oasisopen.org/xacml/3.0/xacml-3.0-core-spec-os-en.pdf.Google ScholarGoogle Scholar
  29. [29] Garrison William C., Qiao Yechen, and Lee Adam J.. 2014. On the suitability of dissemination-centric access control systems for group-centric sharing. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy CODASPY 2014. Association for Computing Machinery, 112. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Garrison William C., Lee Adam J., and Hinrichs Timothy L.. 2014. An actor-based, application-aware access control evaluation framework. In Proceedings of the ACM Symposium on Access Control Models and Technologies, SACMAT. Association for Computing Machinery 199210. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Jung Christian, Eitel Andreas, and Schwarz Reinhard. 2014. Enhancing cloud security with context-aware usage control policies. In Proceedings of the Informatik. 211222.Google ScholarGoogle Scholar
  32. [32] Garrison William C. and Lee Adam J.. 2015. Decomposing, comparing, and synthesizing access control expressiveness simulations. In Proceedings of the 2015 IEEE 28th Computer Security Foundations Symposium. 1832.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] di Cerbo Francesco, Some Doliere Francis, Gomez Laurent, and Trabelsi Slim. 2015. PPL v2.0: Uniform data access and usage control on cloud and mobile. In Proceedings of the 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. Institute of Electrical and Electronics Engineers Inc., 27. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Florian Kelbert and Alexander Pretschner. 2015. A Fully Decentralized Data Usage Control Enforcement Infrastructure. In Proc. 13th International Conference on Applied Cryptography and Network Security. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Marra Antonio la, Martinelli Fabio, Mori Paolo, and Saracino Andrea. 2017. Implementing usage control in internet of things: A smart home use case. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, IEEE, 10561063. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Kelbert Florian and Pretschner Alexander. 2018. Data usage control for distributed systems. ACM Transactions on Privacy and Security 21, 3 (June 2018). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Elizabeth Scaria, Arnaud Berghmans, Marta Pont, Catarina Arnaut, and Sophie Leconte. 2018. Study on data sharing between companies in Europe: Final report, Publications Office. Retrieved June 15, 2022 from .Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Schütte Julian and Brost Gerd Stefan. 2018. LUCON: Data flow control for message-based IoT systems. In Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Alonso Álvaro, Pozo Alejandro, Manuel Cantera José, de la Vega Francisco, and José Hierro Juan. 2018. Industrial data space architecture implementation using FIWARE. Sensors (Switzerland) 18, 7 (July 2018). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Bertino Elisa, Abu Jabal Amani, Calo Seraphin, Verma DInesh, and Williams Christopher. 2018. The challenge of access control policies quality. Journal of Data and Information Quality 10, 2 (September 2018). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. [41] Marra Antonio, Martinelli Fabio, Mori Paolo, and Saracino Andrea. 2019. A Distributed Usage Control Framework for Industrial Internet of Things. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Jarke Matthias, Otto Boris, and Ram Sudha. 2019. Data sovereignty and data space ecosystems. Business and Information Systems Engineering 61, 5 (2019), 549550. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Otto Boris et al. 2019. IDSA Reference Architecture Model. Retrieved June 15, 2022 from https://internationaldataspaces.org//wp-content/uploads/IDS-Reference-Architecture-Model-3.0-2019.pdf.Google ScholarGoogle Scholar
  44. [44] Hosseinzadeh Arghavan, Eitel Andreas, and Jung Christian. 2020. A systematic approach toward extracting technically enforceable policies from data usage control requirements. In Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP'20). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  45. [45] Gil Gonzalo, Arnaiz Aitor, and Higuero Marivi. 2019. Theoretical assessment of existing frameworks for data usage control: Strength and limitations with respect to current application scenarios.Google ScholarGoogle Scholar
  46. [46] Jabal Amani Abu, Davari Maryam, Bertino Elisa, Makaya Christian, Calo Seraphin, Verma Dinesh, Russo Alessandra, and Williams Christopher. 2019. Methods and tools for policy analysis. ACM Computing Surveys 51, 6 (February 2019). DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Gil Gonzalo, Arnaiz Aitor, Higuero Marivi, and Diez Francisco Javier. 2020. Evaluation methodology for distributed usage control solutions. In Proceedings of the 2020 Global Internet of Things Summit (GIoTS). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Munoz-Arcentales Andres, López-Pernas Sonsoles, Pozo Alejandro, Alonso Álvaro, Salvachúa Joaquín, and Huecas Gabriel. 2020. Data usage and access control in industrial data spaces: Implementation using FIWARE. Sustainability 12, 9 (May 2020). DOI:Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Bader Sebastian, Pullman Jaroslav, Mader Christian, Tramp Sebastian, Quix Christoph, Muller Andreas W., Bockmann Matthias, Imbusch Benedikt, Lipp Johannes, Geisler Sandra, and Lange Christoph. 2020. The international data spaces information model—an ontology for sovereign exchange of digital content. In Proceedings of the International Semantic Web Conference 2020. DOI:Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50] European Commission. 2022. A European Strategy for data | Shaping Europe. Retrieved June 15, 2022 from https://digital-strategy.ec.europa.eu/en/policies/strategy-data.Google ScholarGoogle Scholar
  51. [51] Internet Society. 2022. Concerns Over Privacy and Security Contribute to Consumer. Retrieved June 15, 2022 from https://www.internetsociety.org/news/press-releases/2019/concerns-over-privacy-and-security-contribute-to-consumer-distrust-in-connected-devices/.Google ScholarGoogle Scholar
  52. [52] Iannella Renato. 2018. Open Digital Rights Language (ODRL) Version 2.2. Retrieved June 15, 2022 from https://www.w3.org/TR/odrl-model/(visitedon19/05/2022).Google ScholarGoogle Scholar

Index Terms

  1. Assessment Framework for the Identification and Evaluation of Main Features for Distributed Usage Control Solutions

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Privacy and Security
      ACM Transactions on Privacy and Security  Volume 26, Issue 1
      February 2023
      342 pages
      ISSN:2471-2566
      EISSN:2471-2574
      DOI:10.1145/3561959
      Issue’s Table of Contents

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 11 November 2022
      • Online AM: 9 September 2022
      • Accepted: 17 August 2022
      • Revised: 17 June 2022
      • Received: 28 April 2021
      Published in tops Volume 26, Issue 1

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Full Text

    View this article in Full Text.

    View Full Text

    HTML Format

    View this article in HTML Format .

    View HTML Format