process running in a system. In contrast, objects rep-
resent entities such as files, database entries, or exe-
cutable code within a system. Subjects access objects.
However, imagine a subject which wants to change
the access conditions of another subject, such as e.g.
the user from Figure 1 limiting the position sharing
to only family members (assuming subjects can be
grouped according to their family membership). In
this case, the former user modifying the access condi-
tions is the subject whereas the latter user represents
the object. Throughout this work we will refer to the
respective entity type being either a subject or an ob-
ject.
2.2 Classification of Protection Goals
Information can be protected under the consideration
of different protection goals, which leads to the so-
called protection targets. These protection targets in-
fluence the actual design and functioning of the sys-
tem or process concerned. The classification is build
out of four protection target classes which in turn
consist of a variety of targets. The protection target
classes are: Authentication, Access Control, Process
Control, and Granularity Control.
• Authentication: Covers all targets for the reli-
able identification of the relevant subjects and ob-
jects which are participating in the system. These
include the authenticity of subjects and objects
which must have the necessary rights to join the
system as well as the action liability, which as-
signs each action to a specific subject. To make
these actions traceable a storage area for trace in-
formation must be provided.
• Access Control: Covers all targets that play an es-
sential role for access control. Here a target that is
of crucial importance is the data integrity, as this
ensures that objects cannot be changed uncontrol-
lably and therefore guarantee that only subjects al-
lowed to make changes will be able to access this
data. Furthermore, the confidentiality of informa-
tion must be ensured in order to hide information
from subjects who may not be allowed to read this
information.
• Process Control: Covers all targets that influence
the processing of data. This includes acceptance
of computation environments which are going to
process the data. Assuming a distributed environ-
ment, this protection target defines the computa-
tion nodes the data might be processed on. Be-
sides this, also data extent is of importance, i.e.,
to define the amount of data that is available at
one time instant for data processing. By limiting
the data extent a limited view of the current data
window is provided.
• Granularity Control: Granularity control cov-
ers targets which play a role in obfuscating the
original data (object) in order to, e.g., prevent
conclusions to the subject the data originates
from with techniques such as anonymization and
pseudonymisation. Other techniques which be-
long to this protection target class are methods
that add some fuzziness to data in order to hide
detailed information on e.g., the current position,
or aggregate a certain amount of data elements be-
fore delivering it to subsequent operations.
These protection targets build the basis for the
comparison of related work in the following section.
The protection targets also define the main functional-
ities of our security framework which is the basis of
our system implementation, as shown in Section 5.
3 RELATED WORK
This section introduces some well-known security
concepts in the context of data stream processing sys-
tems (DSPS) and provides a comparison according to
the protection targets raised in Section 2.2. A DSPS is
characterized by an asynchronous and distributed exe-
cution of long running queries. This represents a ma-
jor challenge since, e.g., access policies might change
at runtime which require the use of appropriate mea-
sures in order to ensure changed security policies be-
ing enforced. These changes on the one hand should
not influence ongoing operations as this would affect
currently running queries negatively. On the other
hand the new policies must be enforced as quickly as
possible while avoiding centralized structures as they
constitute a single point of failure. Table 1 provides a
comparison of well-known concepts in this area w.r.t.
the protection targets presented in Section 2.2. These
concepts are described in detail below.
In the year 2005, Secure Borealis (Lindner, W. et
al., 2005)—which extended Borealis (Abadi, D. J. et
al., 2005)—was one of the first DSPS which had an in-
tegrated security concept to control data access. The
security concept is based on a general DSPS architec-
ture out of which additional components that enable
access control were derived. The query processing
in Secure Borealis is performed in a distributed fash-
ion. Communication between the single computation
nodes is encrypted to ensure data integrity and to pre-
vent it from being read by third parties. In contrast to
the query processing, the security concept of Secure
Borealis is based on a centralized structure to enforce
NexusDSS:ASystemforSecurityCompliantProcessingofDataStreams
177