健康数据访问控制:评估风险和收益

Thibaud Ecarot, Samuel Dussault, Ameni Souid, L. Lavoie, J. Éthier
{"title":"健康数据访问控制:评估风险和收益","authors":"Thibaud Ecarot, Samuel Dussault, Ameni Souid, L. Lavoie, J. Éthier","doi":"10.1109/IOTSMS52051.2020.9340206","DOIUrl":null,"url":null,"abstract":"The AppArmor Linux Security Module (LSM) is widely used on Linux operating systems as it, among other things, provides mandatory access control (MAC) and isolates processes. This isolation helps meet the privacy requirements for critical applications. These application security policies are defined with profiles loaded into the Linux system kernel. However, these access control mechanisms are far from covering all the rising demands for confidentiality enforcement regarding critical applications. This paper conducts a risks and benefits analysis to assess whether a healthcare infrastructure can safely rely on the AppArmor LSM to protect its sensitive data. Thus, the general architecture of AppAmor comes to be detailed. Then, a static code analysis is performed to study the data structures found in the LSM. Finally, the outbreak of would-be side-channel attacks from userspace is discussed while offering mitigation methods. The result of this analysis shows that the AppArmor LSM is susceptible to side-channel attacks and should be used as part of a more comprehensive defense-in-depth strategy.","PeriodicalId":147136,"journal":{"name":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"AppArmor For Health Data Access Control: Assessing Risks and Benefits\",\"authors\":\"Thibaud Ecarot, Samuel Dussault, Ameni Souid, L. Lavoie, J. Éthier\",\"doi\":\"10.1109/IOTSMS52051.2020.9340206\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The AppArmor Linux Security Module (LSM) is widely used on Linux operating systems as it, among other things, provides mandatory access control (MAC) and isolates processes. This isolation helps meet the privacy requirements for critical applications. These application security policies are defined with profiles loaded into the Linux system kernel. However, these access control mechanisms are far from covering all the rising demands for confidentiality enforcement regarding critical applications. This paper conducts a risks and benefits analysis to assess whether a healthcare infrastructure can safely rely on the AppArmor LSM to protect its sensitive data. Thus, the general architecture of AppAmor comes to be detailed. Then, a static code analysis is performed to study the data structures found in the LSM. Finally, the outbreak of would-be side-channel attacks from userspace is discussed while offering mitigation methods. The result of this analysis shows that the AppArmor LSM is susceptible to side-channel attacks and should be used as part of a more comprehensive defense-in-depth strategy.\",\"PeriodicalId\":147136,\"journal\":{\"name\":\"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)\",\"volume\":\"52 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IOTSMS52051.2020.9340206\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 7th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IOTSMS52051.2020.9340206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

AppArmor Linux Security Module (LSM)广泛用于Linux操作系统,因为它提供了强制访问控制(MAC)和隔离进程等功能。这种隔离有助于满足关键应用程序的隐私要求。这些应用程序安全策略是通过加载到Linux系统内核中的配置文件定义的。然而,这些访问控制机制远远不能满足关键应用程序的所有日益增长的保密要求。本文进行了风险和收益分析,以评估医疗保健基础设施是否可以安全地依赖AppArmor LSM来保护其敏感数据。因此,详细介绍了AppAmor的总体架构。然后,执行静态代码分析来研究LSM中发现的数据结构。最后,讨论了来自用户空间的潜在侧通道攻击的爆发,同时提供了缓解方法。分析结果表明,AppArmor LSM容易受到侧信道攻击,应该作为更全面的纵深防御策略的一部分使用。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
AppArmor For Health Data Access Control: Assessing Risks and Benefits
The AppArmor Linux Security Module (LSM) is widely used on Linux operating systems as it, among other things, provides mandatory access control (MAC) and isolates processes. This isolation helps meet the privacy requirements for critical applications. These application security policies are defined with profiles loaded into the Linux system kernel. However, these access control mechanisms are far from covering all the rising demands for confidentiality enforcement regarding critical applications. This paper conducts a risks and benefits analysis to assess whether a healthcare infrastructure can safely rely on the AppArmor LSM to protect its sensitive data. Thus, the general architecture of AppAmor comes to be detailed. Then, a static code analysis is performed to study the data structures found in the LSM. Finally, the outbreak of would-be side-channel attacks from userspace is discussed while offering mitigation methods. The result of this analysis shows that the AppArmor LSM is susceptible to side-channel attacks and should be used as part of a more comprehensive defense-in-depth strategy.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Evaluation of Objective Function Descriptions And Optimization Methodologies For Task Allocation In A Dynamic Fog Environment A Data Generator for Cloud-Edge Vehicle Communication in Multi Domain Cellular Networks Methodological approach for creating an IoT manufacturing application IOTSMS 2020 Organizers and Sponsors BA-TLS: Blockchain Authentication for Transport Layer Security in Internet of Things
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1