SlideShare uma empresa Scribd logo
1 de 19
Australia’s National Science Agency
Modeling Multi-Layer
Access Control Policies of a
Hyperledger-Fabric-Based
Agriculture Supply Chain
rmat it correctly: Use the styles within this template
H.M.N. Dilum Bandara, Shiping Chen, Mark
Staples, and Yilin Sai
Data61, CSIRO
Sydney, Australia
Dilum.Bandara@csiro.au
• Blockchains’ transparency & immutability  Enhance traceability & trust in agriculture
supply chains
• Users worry about business confidentiality  Prefer to keep data off-chain
• Better clarity on “who can see what data”  Encourage active data contribution
• While blockchains are proposed for access control in other systems, no detailed study on
blockchain platforms’ access control
• Propose a process to model & verify such complex policies
• A case study of an agriculture traceability platform based on Hyperledger Fabric
• Model its 5 layers of multi-layered & multi-model access control policies
• Model & validate safeness of those policies using NIST’s access control rule logic circuit simulator
• Conduct a reflective privacy assessment to answer “which other participants can see my data?”
• Enhance supply chain participants’ confidence in storing data on-chain
Research Contribution
2 |
Q. Lu et al. (2021)
• Many use cases
• Provenance & traceability for food safety & biosecurity
• Supporting farmer cooperatives, agriculture finance, & precision agriculture
• Needs to ensure business confidentiality of data
• Direct competitors – Farmers
• Indirect competitors – Farmer & Distributor
• Permissioned blockchains can partly address such concerns
• Use multiple access control models spanning multiple layers
• However, it’s nontrivial to determine “who can see what data”
• Consequently, most data are kept off-chain
• Limits automation, efficiency, & real-time compliance enforcement
Blockchain in Agriculture
3 |
Q. Lu et al., “Integrated model‐driven engineering of blockchain applications for business processes and asset management,” Software: Practice and
Experience, 51(5), 2021, 1059-1079.
Supply Chain Scenario
• Derived from a real blockchain-
based traceability platform for an
agriculture supply chain
• Client
• A keystone company in the ecosystem
• Had the greatest exposure to regulatory
compliance risks
• Did the integration
• A consortium governs the platform
• Subset of parties hosted a blockchain node
• Others connected via API
• Build on-top of Hyperledger Fabric
using cloud-native technologies
4 |
Hyper Ledger Fabric
• A modular, permissioned, & open-source
blockchain framework
• Emphasizes data privacy & performance
• Logical partitioning of the ledger
1. Channels – Hides transactions from
non-members
2. Private Data Collections (PDCs) –
Hides data on a transaction
• Policy-driven access control
• Process 100s to 1,000 TPS under varying
conditions
• Applied in multiple horizontally &
vertically integrated supply chains
5 |
ABAC - Attribute-Based Access Control
ACL – Access Control List
PBAC - Policy-Based Access Control
RBAC - Role-Based Access Control
RBAC-A - RBAC, attribute centric
Gain supply chain participants’ confidence to contribute data &
actively engage in blockchain governance by answering:
1. How to model multi-model, multi-layer, & dynamic access control policies in
the traceability platform?
2. Are those policies free of conflicts & effective in ensuring data safeness?
3. Which other parties can see my data?
Goal
6 |
Modeling Access Control Policies
7 |
• Entities in a Fabric network have unique identities
• X.509 certificate
• An identity belongs to an organization & has a set of
attributes
• Organizational Unit (OU)
– Node OU – special OU used to confer a role on an identity
• Role
1. client – Invoke smart contracts
2. admin – Network management, Invoke smart contracts
3. peer – Maintain ledger, Endorse transactions by
executing & signing their results
4. orderer – Order transactions into blocks
• Union of identity & its attributes is called a principal
• Farmer.client
Subjects
8 |
Source: https://hyperledger-fabric.readthedocs.io
• Users issue transactions that invoke chaincodes
• Can also subscribe to blockchain events streams
• These endpoints are resources requiring access
control
• Fabric lists 19 resources in configtx.yaml
• Specified using component/resource format, e.g.,
• _lifecycle/CommitChaincodeDefinition
• event/Block
• Other resources that need protection
• Data in a smart contract
• Smart contract functions
• API endpoints
Objects
9 |
• Describe how an identity or role (aka., subject) may
access a resource (aka., object)
• Fabric defines 6 high-level actions
1. Readers – Read data
2. Writers – Write data
3. Admins – Administrative actions
4. Endorsement – Execute transactions & sign their results
5. LifecycleEndorsement – Endorsement related to lifecycle
management actions of a chaincode
6. BlockValidation – Packaging transactions into a block &
signing it
• Only read & write actions are distinguished at chaincode
& API layers
Actions
10 |
• A set of rules that defines how
decisions are made & specific
outcomes are reached
• Reflect business needs
• Fabric evaluates signatures attached to
a transaction & validates that they
fulfill access control needs
• 2 types of policies
1. Signature – Requires a transaction to
include explicit sign-off from principals
2. ImplicitMeta – Aggregates result of
policies deeper in a configuration tree
Policies
11 |
/Channel/Application/Endorsement:
Type: Signature
Rule: AND(Farmer.peer,
Processor.peer)
/Channel/Application/Admins:
Type: ImplicitMeta
Rule: MAJORITY Admins
…/Farmer/Admins …/Processor/Admins …/Client/Admins
(Any 2 organizations out of 3 can satisfy MAJORITY)
/Channel/Application/Farmer/Admins:
Type: Signature
Rule: OR(Farmer.admin)
Access Control Verification
12 |
• Focus on safety properties
• Fundamental security requirements on whether a policy leaks access permission to
unauthorized or unintended subjects
• 3 types of safety property violations (aka., faults)
1. Privilege leakage – A subject can access objects prohibited by security requirements
2. Privilege blocking – A subject’s legitimate access to an object is blocked
3. Privilege conflict – Multiple access control rules result in conflicting decisions
• Many tools to validate access control policies against safety properties
• Li et al. [18] compared 8 tools under 11 metrics
• We chose NIST’s Access Control Rule Logic Circuit Simulation (ACRLCS) technique
• Models policies as a hierarchically-designed digital logic circuit
• Supports static, dynamic, & historical access control models; separation of duty
• Real-time detection of privilege leakage, blocking, & conflicts
Verification Tool Section
13 | A. Li et al., “Evaluating the capability and performance of access control policy verification tools,” in 2015 IEEE Military Communications Conf.
(MILCOM), 2015, pp. 366–371.
• Channel & PDC membership as Boolean functions
• Compliance Manager (CM), Framer (FR), Processor (PR),
Transporter (TR), & Primary Consumer (PC) are in Post
Harvest PDC
• PDCPostHarvest = CM + FA + PR + TR + PC
• Default set of action-related policies in Fabric for
Compliance Manager organization
• Readers = CM.client + CM.admin + CM.peer
• Writers = CM.client + CM.admin
• Admins = CM.admin
• Endorsement = CM.peer
Representing Policies with ACRLCS
14 |
Representing Policies with ACRLCS (Cont.)
15 |
/Channel/Admins = MAJORITY Admins
/Channel/Application/Admins =
MAJORITY Admins
/Channel/Orderer/Admins =
MAJORITY Admins
CM BR AC DR FA PR CO
Admins = CM.admin
Similarly, AND gate can be used to link
hierarchical & multi-layer policies
• To detect faults, ACRLCS requires Grant & Deny circuits
• There’s a conflict if both Grant & Deny circuits result in logical 1
• Grant – admin role can change channel configuration
• Deny – client, peer, & orderer roles can’t change channel configuration
• When it’s difficult to specify security
properties either in a grant or deny circuit
• To detect privilege leakage, look for outputs
that result in 1 but should have been 0
• To detect privilege blocking, look for outputs
that result in 0 but should have been 1
Access Control Evaluation
16 |
_lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers
Writers = CM.admin + CM.client
Grant
Deny
Even clients can
install chaincode
• Which other participants can see my
data?
• Assume the position of a potential
data accessor for the sake of
assessing the privacy implications of
access control policies
• A farmer (FA) may want to know how
the distributor (DR) sees their data
• Distributor can only see farmers inputs not
outputs
Reflective Privacy Assessment
17 |
PDCPreHarvest
PDCPostHarvest
Channel
• Enterprise blockchain-based applications adopt multi-layered & multi-model
access control policies
• Proposed a process to model & verify such policies to determine “who has access
to what data?”
• Demonstrated it using an agriculture tractability platform built on Hyperledger Fabric
• Used NIST’s ACRLCS technique to verify polices
• Identified 2 access control faults in Fabric’s default policies
• Used ACRLCS circuits simulation for reflective privacy assessment
• ACRLCS can capture a broader set of models  Our process could be applied to
other blockchain-based applications & frameworks
• Future work
• Model workflow access control as many business processes are enforced using smart
contracts
• Develop a test oracle to generate transactions to validate access control implementation of an
entire blockchain-based application
Summary
18 |
Australia’s National Science Agency
Dilum.Bandara@csiro.au
linkedin.com/in/dilumb/

Mais conteúdo relacionado

Mais procurados

Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
KaashivInfoTech Company
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
Neel Chakraborty
 

Mais procurados (20)

Blockchain testing strategy
Blockchain testing strategyBlockchain testing strategy
Blockchain testing strategy
 
Introduction to blockchains
Introduction to blockchainsIntroduction to blockchains
Introduction to blockchains
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 
Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...Identity based proxy-oriented data uploading and remote data integrity checki...
Identity based proxy-oriented data uploading and remote data integrity checki...
 
Kaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain ServicesKaleido Platform Overview and Full-stack Blockchain Services
Kaleido Platform Overview and Full-stack Blockchain Services
 
PPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMESPPT FOR IDBSDDS SCHEMES
PPT FOR IDBSDDS SCHEMES
 
Hyperledger Fabric
Hyperledger FabricHyperledger Fabric
Hyperledger Fabric
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Multi-tenant Framework for SDN Virtualization
Multi-tenant Framework for SDN VirtualizationMulti-tenant Framework for SDN Virtualization
Multi-tenant Framework for SDN Virtualization
 
Attributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryptionAttributes based encryption with verifiable outsourced decryption
Attributes based encryption with verifiable outsourced decryption
 
Blockchain Hyper Ledger Fabric : Bangkok Conference
Blockchain Hyper Ledger Fabric : Bangkok ConferenceBlockchain Hyper Ledger Fabric : Bangkok Conference
Blockchain Hyper Ledger Fabric : Bangkok Conference
 
Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18Ibm blockchain - Hyperledger 15.02.18
Ibm blockchain - Hyperledger 15.02.18
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
Advanced Cryptography for Cloud Security
Advanced Cryptography for Cloud SecurityAdvanced Cryptography for Cloud Security
Advanced Cryptography for Cloud Security
 
Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud Privacy Preserving Public Auditing for Data Storage Security in Cloud
Privacy Preserving Public Auditing for Data Storage Security in Cloud
 
Understanding blockchains
Understanding blockchainsUnderstanding blockchains
Understanding blockchains
 
IDC - Blockchain Threat Model
IDC - Blockchain Threat ModelIDC - Blockchain Threat Model
IDC - Blockchain Threat Model
 
Identity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storageIdentity based distributed provable data possession in multicloud storage
Identity based distributed provable data possession in multicloud storage
 
Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2Blockchin architecture & use cases -part-2
Blockchin architecture & use cases -part-2
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 

Semelhante a Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain

Semelhante a Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain (20)

BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Block chain fundamentals and hyperledger
Block chain fundamentals and hyperledgerBlock chain fundamentals and hyperledger
Block chain fundamentals and hyperledger
 
Design patterns
Design patternsDesign patterns
Design patterns
 
Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
The Role of Blockchain in Future Integrations
The Role of Blockchain in Future IntegrationsThe Role of Blockchain in Future Integrations
The Role of Blockchain in Future Integrations
 
Cloud security issues and concerns
Cloud security   issues and concernsCloud security   issues and concerns
Cloud security issues and concerns
 
Myths of validation
Myths of validationMyths of validation
Myths of validation
 
Alliance Compant Presentation
Alliance Compant PresentationAlliance Compant Presentation
Alliance Compant Presentation
 
Lessson 1
Lessson 1Lessson 1
Lessson 1
 
Data Domain-Driven Design
Data Domain-Driven DesignData Domain-Driven Design
Data Domain-Driven Design
 
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
Kolegov tkachenko-Non-Invasive Elimination of Logical Access Control Vulnerab...
 
Identity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computingIdentity Management Standardization in the cloud computing
Identity Management Standardization in the cloud computing
 
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
SQLCAT: Addressing Security and Compliance Issues with SQL Server 2008
 
3 the system architecture
3 the system architecture3 the system architecture
3 the system architecture
 
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...Non-Invasive Elimination of  Logical Access Control  Vulnerabilities in Web A...
Non-Invasive Elimination of Logical Access Control Vulnerabilities in Web A...
 
BlockChain-1.pptx
BlockChain-1.pptxBlockChain-1.pptx
BlockChain-1.pptx
 
Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018
 
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
 
Cloud security
Cloud securityCloud security
Cloud security
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 

Mais de Dilum Bandara

Mais de Dilum Bandara (20)

Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Time Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in PracticeTime Series Analysis and Forecasting in Practice
Time Series Analysis and Forecasting in Practice
 
Introduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCAIntroduction to Dimension Reduction with PCA
Introduction to Dimension Reduction with PCA
 
Introduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive AnalyticsIntroduction to Descriptive & Predictive Analytics
Introduction to Descriptive & Predictive Analytics
 
Introduction to Concurrent Data Structures
Introduction to Concurrent Data StructuresIntroduction to Concurrent Data Structures
Introduction to Concurrent Data Structures
 
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-MatrixHard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
Hard to Paralelize Problems: Matrix-Vector and Matrix-Matrix
 
Introduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with HadoopIntroduction to Map-Reduce Programming with Hadoop
Introduction to Map-Reduce Programming with Hadoop
 
Embarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel ProblemsEmbarrassingly/Delightfully Parallel Problems
Embarrassingly/Delightfully Parallel Problems
 
Introduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale ComputersIntroduction to Warehouse-Scale Computers
Introduction to Warehouse-Scale Computers
 
Introduction to Thread Level Parallelism
Introduction to Thread Level ParallelismIntroduction to Thread Level Parallelism
Introduction to Thread Level Parallelism
 
CPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching TechniquesCPU Memory Hierarchy and Caching Techniques
CPU Memory Hierarchy and Caching Techniques
 
Data-Level Parallelism in Microprocessors
Data-Level Parallelism in MicroprocessorsData-Level Parallelism in Microprocessors
Data-Level Parallelism in Microprocessors
 
Instruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware TechniquesInstruction Level Parallelism – Hardware Techniques
Instruction Level Parallelism – Hardware Techniques
 
Instruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler TechniquesInstruction Level Parallelism – Compiler Techniques
Instruction Level Parallelism – Compiler Techniques
 
CPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An IntroductionCPU Pipelining and Hazards - An Introduction
CPU Pipelining and Hazards - An Introduction
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
High Performance Networking with Advanced TCP
High Performance Networking with Advanced TCPHigh Performance Networking with Advanced TCP
High Performance Networking with Advanced TCP
 
Introduction to Content Delivery Networks
Introduction to Content Delivery NetworksIntroduction to Content Delivery Networks
Introduction to Content Delivery Networks
 
Peer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and StreamingPeer-to-Peer Networking Systems and Streaming
Peer-to-Peer Networking Systems and Streaming
 
Mobile Services
Mobile ServicesMobile Services
Mobile Services
 

Último

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
VictoriaMetrics
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
masabamasaba
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Último (20)

%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 

Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain

  • 1. Australia’s National Science Agency Modeling Multi-Layer Access Control Policies of a Hyperledger-Fabric-Based Agriculture Supply Chain rmat it correctly: Use the styles within this template H.M.N. Dilum Bandara, Shiping Chen, Mark Staples, and Yilin Sai Data61, CSIRO Sydney, Australia Dilum.Bandara@csiro.au
  • 2. • Blockchains’ transparency & immutability  Enhance traceability & trust in agriculture supply chains • Users worry about business confidentiality  Prefer to keep data off-chain • Better clarity on “who can see what data”  Encourage active data contribution • While blockchains are proposed for access control in other systems, no detailed study on blockchain platforms’ access control • Propose a process to model & verify such complex policies • A case study of an agriculture traceability platform based on Hyperledger Fabric • Model its 5 layers of multi-layered & multi-model access control policies • Model & validate safeness of those policies using NIST’s access control rule logic circuit simulator • Conduct a reflective privacy assessment to answer “which other participants can see my data?” • Enhance supply chain participants’ confidence in storing data on-chain Research Contribution 2 |
  • 3. Q. Lu et al. (2021) • Many use cases • Provenance & traceability for food safety & biosecurity • Supporting farmer cooperatives, agriculture finance, & precision agriculture • Needs to ensure business confidentiality of data • Direct competitors – Farmers • Indirect competitors – Farmer & Distributor • Permissioned blockchains can partly address such concerns • Use multiple access control models spanning multiple layers • However, it’s nontrivial to determine “who can see what data” • Consequently, most data are kept off-chain • Limits automation, efficiency, & real-time compliance enforcement Blockchain in Agriculture 3 | Q. Lu et al., “Integrated model‐driven engineering of blockchain applications for business processes and asset management,” Software: Practice and Experience, 51(5), 2021, 1059-1079.
  • 4. Supply Chain Scenario • Derived from a real blockchain- based traceability platform for an agriculture supply chain • Client • A keystone company in the ecosystem • Had the greatest exposure to regulatory compliance risks • Did the integration • A consortium governs the platform • Subset of parties hosted a blockchain node • Others connected via API • Build on-top of Hyperledger Fabric using cloud-native technologies 4 |
  • 5. Hyper Ledger Fabric • A modular, permissioned, & open-source blockchain framework • Emphasizes data privacy & performance • Logical partitioning of the ledger 1. Channels – Hides transactions from non-members 2. Private Data Collections (PDCs) – Hides data on a transaction • Policy-driven access control • Process 100s to 1,000 TPS under varying conditions • Applied in multiple horizontally & vertically integrated supply chains 5 | ABAC - Attribute-Based Access Control ACL – Access Control List PBAC - Policy-Based Access Control RBAC - Role-Based Access Control RBAC-A - RBAC, attribute centric
  • 6. Gain supply chain participants’ confidence to contribute data & actively engage in blockchain governance by answering: 1. How to model multi-model, multi-layer, & dynamic access control policies in the traceability platform? 2. Are those policies free of conflicts & effective in ensuring data safeness? 3. Which other parties can see my data? Goal 6 |
  • 7. Modeling Access Control Policies 7 |
  • 8. • Entities in a Fabric network have unique identities • X.509 certificate • An identity belongs to an organization & has a set of attributes • Organizational Unit (OU) – Node OU – special OU used to confer a role on an identity • Role 1. client – Invoke smart contracts 2. admin – Network management, Invoke smart contracts 3. peer – Maintain ledger, Endorse transactions by executing & signing their results 4. orderer – Order transactions into blocks • Union of identity & its attributes is called a principal • Farmer.client Subjects 8 | Source: https://hyperledger-fabric.readthedocs.io
  • 9. • Users issue transactions that invoke chaincodes • Can also subscribe to blockchain events streams • These endpoints are resources requiring access control • Fabric lists 19 resources in configtx.yaml • Specified using component/resource format, e.g., • _lifecycle/CommitChaincodeDefinition • event/Block • Other resources that need protection • Data in a smart contract • Smart contract functions • API endpoints Objects 9 |
  • 10. • Describe how an identity or role (aka., subject) may access a resource (aka., object) • Fabric defines 6 high-level actions 1. Readers – Read data 2. Writers – Write data 3. Admins – Administrative actions 4. Endorsement – Execute transactions & sign their results 5. LifecycleEndorsement – Endorsement related to lifecycle management actions of a chaincode 6. BlockValidation – Packaging transactions into a block & signing it • Only read & write actions are distinguished at chaincode & API layers Actions 10 |
  • 11. • A set of rules that defines how decisions are made & specific outcomes are reached • Reflect business needs • Fabric evaluates signatures attached to a transaction & validates that they fulfill access control needs • 2 types of policies 1. Signature – Requires a transaction to include explicit sign-off from principals 2. ImplicitMeta – Aggregates result of policies deeper in a configuration tree Policies 11 | /Channel/Application/Endorsement: Type: Signature Rule: AND(Farmer.peer, Processor.peer) /Channel/Application/Admins: Type: ImplicitMeta Rule: MAJORITY Admins …/Farmer/Admins …/Processor/Admins …/Client/Admins (Any 2 organizations out of 3 can satisfy MAJORITY) /Channel/Application/Farmer/Admins: Type: Signature Rule: OR(Farmer.admin)
  • 13. • Focus on safety properties • Fundamental security requirements on whether a policy leaks access permission to unauthorized or unintended subjects • 3 types of safety property violations (aka., faults) 1. Privilege leakage – A subject can access objects prohibited by security requirements 2. Privilege blocking – A subject’s legitimate access to an object is blocked 3. Privilege conflict – Multiple access control rules result in conflicting decisions • Many tools to validate access control policies against safety properties • Li et al. [18] compared 8 tools under 11 metrics • We chose NIST’s Access Control Rule Logic Circuit Simulation (ACRLCS) technique • Models policies as a hierarchically-designed digital logic circuit • Supports static, dynamic, & historical access control models; separation of duty • Real-time detection of privilege leakage, blocking, & conflicts Verification Tool Section 13 | A. Li et al., “Evaluating the capability and performance of access control policy verification tools,” in 2015 IEEE Military Communications Conf. (MILCOM), 2015, pp. 366–371.
  • 14. • Channel & PDC membership as Boolean functions • Compliance Manager (CM), Framer (FR), Processor (PR), Transporter (TR), & Primary Consumer (PC) are in Post Harvest PDC • PDCPostHarvest = CM + FA + PR + TR + PC • Default set of action-related policies in Fabric for Compliance Manager organization • Readers = CM.client + CM.admin + CM.peer • Writers = CM.client + CM.admin • Admins = CM.admin • Endorsement = CM.peer Representing Policies with ACRLCS 14 |
  • 15. Representing Policies with ACRLCS (Cont.) 15 | /Channel/Admins = MAJORITY Admins /Channel/Application/Admins = MAJORITY Admins /Channel/Orderer/Admins = MAJORITY Admins CM BR AC DR FA PR CO Admins = CM.admin Similarly, AND gate can be used to link hierarchical & multi-layer policies
  • 16. • To detect faults, ACRLCS requires Grant & Deny circuits • There’s a conflict if both Grant & Deny circuits result in logical 1 • Grant – admin role can change channel configuration • Deny – client, peer, & orderer roles can’t change channel configuration • When it’s difficult to specify security properties either in a grant or deny circuit • To detect privilege leakage, look for outputs that result in 1 but should have been 0 • To detect privilege blocking, look for outputs that result in 0 but should have been 1 Access Control Evaluation 16 | _lifecycle/CommitChaincodeDefinition: /Channel/Application/Writers Writers = CM.admin + CM.client Grant Deny Even clients can install chaincode
  • 17. • Which other participants can see my data? • Assume the position of a potential data accessor for the sake of assessing the privacy implications of access control policies • A farmer (FA) may want to know how the distributor (DR) sees their data • Distributor can only see farmers inputs not outputs Reflective Privacy Assessment 17 | PDCPreHarvest PDCPostHarvest Channel
  • 18. • Enterprise blockchain-based applications adopt multi-layered & multi-model access control policies • Proposed a process to model & verify such policies to determine “who has access to what data?” • Demonstrated it using an agriculture tractability platform built on Hyperledger Fabric • Used NIST’s ACRLCS technique to verify polices • Identified 2 access control faults in Fabric’s default policies • Used ACRLCS circuits simulation for reflective privacy assessment • ACRLCS can capture a broader set of models  Our process could be applied to other blockchain-based applications & frameworks • Future work • Model workflow access control as many business processes are enforced using smart contracts • Develop a test oracle to generate transactions to validate access control implementation of an entire blockchain-based application Summary 18 |
  • 19. Australia’s National Science Agency Dilum.Bandara@csiro.au linkedin.com/in/dilumb/

Notas do Editor

  1. transparency & immutability amplify business confidentiality concerns
  2. Model policies Model & validate safeness of those policies reflective privacy assessment
  3. Subjects, objects, actions, & their attributes are represented as Boolean variables
  4. Architectural Trade-off Analysis Method (ATAM)