skip to main content
10.1145/2037252.2037274acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Contextualizing security for digital long-term preservation

Authors Info & Claims
Published:29 September 2011Publication History

ABSTRACT

Nowadays a growing amount of information not only exists in digital form but was actually born-digital. Digital long-term preservation becomes continuously important and is tackled by several international and national projects like the US National Digital Information Infrastructure and Preservation Program or the EU FP7 SHAMAN Integrated Project. The very essence of long-term preservation is the preserved data, which in turn requires an appropriate security model, which is so far often neglected in the preservation community. To address this problem, we extend the security relevant parts of the Open Archival Information System (OAIS) standard by a concept for hierarchical security policy development based on given use-cases for a long-term archival system. The corresponding policies are then distributed and implemented by applying an iterative procedure to turn them to rules, and then the rules are enforced. In this paper we describe how to construct a corresponding context model and derive such policies using an iterative approach to assure the system and data security.

References

  1. Consultative Committee for Space Data Systems (CCSDS): Reference Model for an Open Archival Information System (OAIS). Recommendation for Space Data System Standards, CCSDS 650.0-B-1, Blue Book (ISO 14721:2003), 2002.Google ScholarGoogle Scholar
  2. M. Schott, C. Kraetzer, J. Dittmann, C. Vielhauer: Extending the Clark-Wilson Security Model for Digital Long-Term Preservation Use-cases, Proc. of Multimedia on Mobile Devices, 2010, SPIE Electronic Imaging Conference 7542, 2010Google ScholarGoogle ScholarCross RefCross Ref
  3. D. D. Clark, D. R. Wilson: A Comparison of Commercial and Military Computer Security Policies, IEEE Symposium on Security and Privacy, 1987Google ScholarGoogle ScholarCross RefCross Ref
  4. M. Schott, C. Kraetzer, N. Specht, J. Dittmann, C. Vielhauer, Ensuring Integrity and Authenticity for Images in Digital Long-Term Preservation, Proc. of Optics, Photonics and Digital Technologies for Multimedia Applications, Conference 7723, SPIE Photonics Europe, 2010Google ScholarGoogle Scholar
  5. H. Brocks, A. Kranstedt, G. Jäschke, M. Hemmje: Modeling Context for Digital Preservation, Studies in Computational Intelligence, vol. 260, pp. 197--226, 2010Google ScholarGoogle Scholar
  6. R. Bhatti, E. Bertino, A. Ghafoor, A Trust-based Context-Aware Access Control Model for Web-Services, Proc. of the IEEE International Conferences on Web Services, 2004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. Tolone, G. Ahn, T. Pai, S. Hong, Access Control in Collaborative Systems, ACM Computing Survays, Vol. 37, March 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad, G. D. Abowd, Securing Context-Aware Applications Using Environment Roles, ACM Symposium on Access Control Model and Technology, ACM, Chantilly, VA, USA, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Kindberg, K. Zhang, Context Authentication Using Constrained Channels, Proc. of 4th IEEE Workshop on Mobile Computing Systems and Applications, 2002 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Kraetzer, K. Qian, M. Schott, J. Dittmann, A Context Model for Microphone Forensics and its Application in Evaluations, Proc. of Media Watermarking, Security and Forensics XIII, IS&T/SPIE Electronic Imaging Conference7880, San Francisco, CA, USA, 2011Google ScholarGoogle ScholarCross RefCross Ref
  11. R. J. Anderson, A Security Polity Model for Clinical Information Systems, Proc. of IEEE Symposium on Security and Privacy, 1996 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Bettini, O. Brdiczka, K. Henricksen, J. Indulska, D. Nicklas, A. Ranganathan, D. Riboni, A Survey of Context Modelling and Reasoning Techniques, Pervasive and Mobile Computing, Elsevier, 2010 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Klyne, F. Reynolds, C. Woodrow, H. Ohto, J. Hjelm, M. H. Butler, L. Tran, Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 1.0, W3C Recommendations, W3C, 2004Google ScholarGoogle Scholar
  14. T. Strang, C. Linnhoff-Popien, A Context Modeling Survey, Proc. of the First International Workshop on Advanced Context Modelling, Reasoning and Management, in conjunction with UbiComp 2004, Nottingham, England, 2004Google ScholarGoogle Scholar
  15. R. Baskerville, M. Siponen, An Information Security Meta-policy for Emergent Organizations, Logistics Information Management, Volume 15, Number 5/6, 2002Google ScholarGoogle Scholar
  16. J. Boyle, R. Cohen, S. Herzog, R. Rajan, A. Sastry, The COPS (Common Open Policy Service) Protocol, RFC2748, 2000.Google ScholarGoogle Scholar
  17. C. Rensing, M. Karsten, R. Stiller, AAA: A Survey and a Policy-Based Architecture and Framework, IEEE Network, Vol. 16, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Rajan, D. Verma, S. Kamat, E. Felstaine, S. Herzog, A Policy Framework for Integrated and Differentiated Services in the Internet, IEEE Network, Vol. 13, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. K. Yang, A. Galis, C. Todd, Policy-Based Active Grid Management Architecture, Proc. of 10th IEEE International Conference on Networks, 2002.Google ScholarGoogle Scholar
  20. I. Horrocks, P. F. Petal-Schneider, H. Boley, S. Tabet, B. Grosof, M. Dean, SWRL: A Semantic Web Rule Language Combining OWL and RuleML, Member submission 21 May 2004, W3C, 2004.Google ScholarGoogle Scholar
  21. J. Fridrich, Digital Image Forensic Using Sensor Noise, IEEE Signal Processing Magazine, vol. 26, no. 2, 2009.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Contextualizing security for digital long-term preservation

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                MM&Sec '11: Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
                September 2011
                140 pages
                ISBN:9781450308069
                DOI:10.1145/2037252

                Copyright © 2011 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 29 September 2011

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                Overall Acceptance Rate128of318submissions,40%
              • Article Metrics

                • Downloads (Last 12 months)1
                • Downloads (Last 6 weeks)0

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader