Please use this identifier to cite or link to this item: doi:10.22028/D291-31794
Title: Comprehensive and Practical Policy Compliance in Data Retrieval Systems
Author(s): Elnikety, Eslam
Language: English
Year of Publication: 2019
DDC notations: 004 Computer science, internet
Publikation type: Dissertation
Abstract: Data retrieval systems such as online search engines and online social networks process many data items coming from different sources, each subject to its own data use policy. Ensuring compliance with these policies in a large and fast-evolving system presents a significant technical challenge since bugs, misconfigurations, or operator errors can cause (accidental) policy violations. To prevent such violations, researchers and practitioners develop policy compliance systems. Existing policy compliance systems, however, are either not comprehensive or not practical. To be comprehensive, a compliance system must be able to enforce users' policies regarding their personal privacy preferences, the service provider's own policies regarding data use such as auditing and personalization, and regulatory policies such as data retention and censorship. To be practical, a compliance system needs to meet stringent requirements: (1) runtime overhead must be low; (2) existing applications must run with few modifications; and (3) bugs, misconfigurations, or actions by unprivileged operators must not cause policy violations. In this thesis, we present the design and implementation of two comprehensive and practical compliance systems: Thoth and Shai. Thoth relies on pure runtime monitoring: it tracks data flows by intercepting processes' I/O, and then it checks the associated policies to allow only policy-compliant flows at runtime. Shai, on the other hand, combines offline analysis and light-weight runtime monitoring: it pushes as many policy checks as possible to an offline (flow) analysis by predicting the policies that data-handling processes will be subject to at runtime, and then it compiles those policies into a set of fine-grained I/O capabilities that can be enforced directly by the underlying operating system.
Link to this record: urn:nbn:de:bsz:291--ds-317941
hdl:20.500.11880/29516
http://dx.doi.org/10.22028/D291-31794
Series name: Technischer Bericht / A / Fachbereich Informatik, Universität des Saarlandes
Advisor: Druschel, Peter
Date of oral examination: 24-Jun-2020
Date of registration: 13-Aug-2020
Faculty: MI - Fakultät für Mathematik und Informatik
Department: MI - Informatik
Professorship: MI - Keiner Professur zugeordnet
Collections:SciDok - Der Wissenschaftsserver der Universität des Saarlandes

Files for this record:
File Description SizeFormat 
elnikety-thesis.14.07.pdfDoctoral Dissertation3,37 MBAdobe PDFView/Open


This item is licensed under a Creative Commons License Creative Commons