In this paper, we describe an approach to distributed enforcement of sticky policies in heterogeneous hardware and software environments. These heterogeneous environments might have differing mechanisms for attesting to their security capabilities and data sources might specify different levels of trust for different data items. Such an environment requires highly flexible policy specification and enforcement mechanisms. We employ sticky policies that travel with data wherever it travels, and we separate them into two components, a hosting policy and a usage policy. Hosting policies are used to ensure that data are transferred only to entities that are provably capable of providing local enforcement and only further transferring data under the same policies. Usage policies confer access, viewing, and update capabilities on users based on their attributes. The approach is supported by attribute-based certificates and policies, which include what authorities are trusted to certify attributes. In addition to presenting a full description of the approach, we report on a prototype implementation that includes all of the aforementioned components and also makes use of a modified version of Excel we developed to track security labels as data move through spreadsheets that are being shared by multiple users across different systems.
II. INTRODUCTIONIn the information age in which we live, organizations maintain large amounts of data, much of it sensitive. In many situations, there could be great value in sharing these data with individuals or partners outside of an organization's controlled hardware/software infrastructure. For example, in the domain of medicine, health professionals would like to safely access patient information on their laptops or even mobile devices, and controlled sharing of such data for both health care and research purposes has obvious scientific and social benefits. Clearly, inadvertent disclosure of health information could have severe consequences for patients with sensitive conditions. Thus, although the benefits of information sharing are great, the risks of data breaches if the information is not properly handled after it is shared are often greater. A similar analysis can be made concerning sensitive customer information held by commercial organizations, information maintained in databases by law enforcement organizations, etc.Organizations that allow sensitive data to be disseminated need assurances that the systems receiving the data will control access so that users only see the information appropriate to their level of authorization, maintain sensitivity labels on information as data are propagated within the system, and only further disseminate the data to other systems if those systems meet the requirements of the data owner. Enabling concepts for this vision are sticky policies, wherein policies on data usage are propagated along with data as they move within and between systems, and information flow control (IFC), where sensitive information is tagged, tags propagate with data as t...