ABSTRACT
Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program or the EU FP7 SHAMAN Integrated Project. The very essence of long-term preservation is the preserved data, which in turn requires an appropriate security model, which is so far often neglected in the preservation community. To address this problem, we extend the security relevant parts of the Open Archival Information System (OAIS) standard by a concept for hierarchical security policy development based on given use-cases for a long-term archival system. The corresponding policies are then distributed and implemented by applying an iterative procedure to turn them to rules, and then the rules are enforced. In this paper we describe how to construct a corresponding context model and derive such policies using an iterative approach to assure the system and data security.
- Consultative Committee for Space Data Systems (CCSDS): Reference Model for an Open Archival Information System (OAIS). Recommendation for Space Data System Standards, CCSDS 650.0-B-1, Blue Book (ISO 14721:2003), 2002.Google Scholar
- M. Schott, C. Kraetzer, J. Dittmann, C. Vielhauer: Extending the Clark-Wilson Security Model for Digital Long-Term Preservation Use-cases, Proc. of Multimedia on Mobile Devices, 2010, SPIE Electronic Imaging Conference 7542, 2010Google ScholarCross Ref
- D. D. Clark, D. R. Wilson: A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Security and Privacy, 1987Google ScholarCross Ref
- M. Schott, C. Kraetzer, N. Specht, J. Dittmann, C. Vielhauer, Ensuring Integrity and Authenticity for Images in Digital Long-Term Preservation, Proc. of Optics, Photonics and Digital Technologies for Multimedia Applications, Conference 7723, SPIE Photonics Europe, 2010Google Scholar
- H. Brocks, A. Kranstedt, G. Jäschke, M. Hemmje: Modeling Context for Digital Preservation, Studies in Computational Intelligence, vol. 260, pp. 197--226, 2010Google Scholar
- R. Bhatti, E. Bertino, A. Ghafoor, A Trust-based Context-Aware Access Control Model for Web-Services, Proc. of the IEEE International Conferences on Web Services, 2004 Google ScholarDigital Library
- W. Tolone, G. Ahn, T. Pai, S. Hong, Access Control in Collaborative Systems, ACM Computing Survays, Vol. 37, March 2005. Google ScholarDigital Library
- M. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad, G. D. Abowd, Securing Context-Aware Applications Using Environment Roles, ACM Symposium on Access Control Model and Technology, ACM, Chantilly, VA, USA, 2011. Google ScholarDigital Library
- T. Kindberg, K. Zhang, Context Authentication Using Constrained Channels, Proc. of 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002 Google ScholarDigital Library
- C. Kraetzer, K. Qian, M. Schott, J. Dittmann, A Context Model for Microphone Forensics and its Application in Evaluations, Proc. of Media Watermarking, Security and Forensics XIII, IS&T/SPIE Electronic Imaging Conference7880, San Francisco, CA, USA, 2011Google ScholarCross Ref
- R. J. Anderson, A Security Polity Model for Clinical Information Systems, Proc. of IEEE Symposium on Security and Privacy, 1996 Google ScholarDigital Library
- C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D. Riboni, A Survey of Context Modelling and Reasoning Techniques, Pervasive and Mobile Computing, Elsevier, 2010 Google ScholarDigital Library
- G. Klyne, F. Reynolds, C. Woodrow, H. Ohto, J. Hjelm, M. H. Butler, L. Tran, Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0, W3C Recommendations, W3C, 2004Google Scholar
- T. Strang, C. Linnhoff-Popien, A Context Modeling Survey, Proc. of the First International Workshop on Advanced Context Modelling, Reasoning and Management, in conjunction with UbiComp 2004, Nottingham, England, 2004Google Scholar
- R. Baskerville, M. Siponen, An Information Security Meta-policy for Emergent Organizations, Logistics Information Management, Volume 15, Number 5/6, 2002Google Scholar
- J. Boyle, R. Cohen, S. Herzog, R. Rajan, A. Sastry, The COPS (Common Open Policy Service) Protocol, RFC2748, 2000.Google Scholar
- C. Rensing, M. Karsten, R. Stiller, AAA: A Survey and a Policy-Based Architecture and Framework, IEEE Network, Vol. 16, 2002. Google ScholarDigital Library
- R. Rajan, D. Verma, S. Kamat, E. Felstaine, S. Herzog, A Policy Framework for Integrated and Differentiated Services in the Internet, IEEE Network, Vol. 13, 1999. Google ScholarDigital Library
- K. Yang, A. Galis, C. Todd, Policy-Based Active Grid Management Architecture, Proc. of 10th IEEE International Conference on Networks, 2002.Google Scholar
- I. Horrocks, P. F. Petal-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, SWRL: A Semantic Web Rule Language Combining OWL and RuleML, Member submission 21 May 2004, W3C, 2004.Google Scholar
- J. Fridrich, Digital Image Forensic Using Sensor Noise, IEEE Signal Processing Magazine, vol. 26, no. 2, 2009.Google ScholarCross Ref
Index Terms
- Contextualizing security for digital long-term preservation
Recommendations
Using Archivematica and Omeka S for Long-Term Preservation and Access of Digitized Archive Materials
From Born-Physical to Born-Virtual: Augmenting Intelligence in Digital LibrariesAbstractThis study proposes a workflow using Archivematica, an application for long-term preservation of digital archives, and Omeka S for system accesses, for the long-term preservation of digitized archival materials and their access based on the Open ...
Long-Term Digital Preservation: A Preliminary Study on Software and Format Obsolescence
ArabWIC 2019: Proceedings of the ArabWIC 6th Annual International Conference Research TrackLong-term digital preservation aims to ensure the accessibility, authenticity, intelligibility, and integrity of digital objects for long periods that may be unlimited. It is a big challenge for institutions seeking to preserve their sensitive, ...
Metadata to support long-term preservation of digital assets: PREMIS and its use with METS
US-DPIF '10: Proceedings of the 2010 Roadmap for Digital Preservation Interoperability Framework WorkshopThis paper explores the PREMIS Data Dictionary for Preservation Metadata and its use as a standard for providing metadata in support of preservation of digital assets. The paper provides an introduction to the PREMIS Data Dictionary in terms of its ...
Comments