Please use this identifier to cite or link to this item:
doi:10.22028/D291-31794
Title: | Comprehensive and Practical Policy Compliance in Data Retrieval Systems |
Author(s): | Elnikety, Eslam |
Language: | English |
Year of Publication: | 2019 |
DDC notations: | 004 Computer science, internet |
Publikation type: | Dissertation |
Abstract: | Data retrieval systems such as online search engines and online social networks process many data items coming from different sources, each subject to its own data use policy. Ensuring compliance with these policies in a large and fast-evolving system presents a significant technical challenge since bugs, misconfigurations, or operator errors can cause (accidental) policy violations. To prevent such violations, researchers and practitioners develop policy compliance systems. Existing policy compliance systems, however, are either not comprehensive or not practical. To be comprehensive, a compliance system must be able to enforce users' policies regarding their personal privacy preferences, the service provider's own policies regarding data use such as auditing and personalization, and regulatory policies such as data retention and censorship. To be practical, a compliance system needs to meet stringent requirements: (1) runtime overhead must be low; (2) existing applications must run with few modifications; and (3) bugs, misconfigurations, or actions by unprivileged operators must not cause policy violations. In this thesis, we present the design and implementation of two comprehensive and practical compliance systems: Thoth and Shai. Thoth relies on pure runtime monitoring: it tracks data flows by intercepting processes' I/O, and then it checks the associated policies to allow only policy-compliant flows at runtime. Shai, on the other hand, combines offline analysis and light-weight runtime monitoring: it pushes as many policy checks as possible to an offline (flow) analysis by predicting the policies that data-handling processes will be subject to at runtime, and then it compiles those policies into a set of fine-grained I/O capabilities that can be enforced directly by the underlying operating system. |
Link to this record: | urn:nbn:de:bsz:291--ds-317941 hdl:20.500.11880/29516 http://dx.doi.org/10.22028/D291-31794 |
Series name: | Technischer Bericht / A / Fachbereich Informatik, Universität des Saarlandes |
Advisor: | Druschel, Peter |
Date of oral examination: | 24-Jun-2020 |
Date of registration: | 13-Aug-2020 |
Faculty: | MI - Fakultät für Mathematik und Informatik |
Department: | MI - Informatik |
Professorship: | MI - Keiner Professur zugeordnet |
Collections: | SciDok - Der Wissenschaftsserver der Universität des Saarlandes |
Files for this record:
File | Description | Size | Format | |
---|---|---|---|---|
elnikety-thesis.14.07.pdf | Doctoral Dissertation | 3,37 MB | Adobe PDF | View/Open |
This item is licensed under a Creative Commons License