SGFS: Secure, Efficient and Policy-based Global File Sharing
|
|
|
- Delphia Hensley
- 9 years ago
- Views:
Transcription
1 SGFS: Secure, Efficient and Policy-based Global File Sharing Vishal Kher Cory Leach Eric Seppanen Yongdae Kim Abstract This paper presents SGFS - a secure global file sharing system. SGFS is designed based on important design requirements that include: efficiency for high performance data access, flexibility of cross-domain file sharing without administrative interference, support for flexible policies and off-the-shelf policy managers, ability to be deployed in diverse environments, ease of management and low administrative overheads. Unlike existing systems that satisfy a proper subset of these requirements, SGFS is designed to satisfy all of these requirements. In this paper, we present the architecture and design of SGFS. We illustrate how these requirements have influenced our design and present the implementation of the SGFS user-space prototype. 1. Introduction There is a rising trend of collaboration and global sharing of information across multiple domains. For example, consider a group of faculty members in a certain University that want to collaborate with a group of faculty members from another University and share their project s source code repository and experimental results. As another example, consider a group of scientists who want to share files generated by their simulation applications with scientists from a different organization to allow them to analyze their data and share the knowledge gathered through those results. In both of these examples, local users need to freely share data and collaborate with remote users. In addition, in the second example, users need high performance data access. Existing cross-domain file sharing systems [4, 20, 25] are not tailored for high performance data access. These systems assume that users have to share a small number of files (e.g., class project files or photos) and also assume that these files are stored on traditional centralized servers. Recently, network-attached intelligent storage devices [17, 21, 23, 27, 28] have gained importance in industry and academia. These devices enable low-latency data transfers directly between the client and the storage device to provide high performance data access. They utilize the available embedded processing power, which is typically less than general purpose servers, to perform activities such as block management [17, 27], remote execution [2, 29], search and indexing [18], and light-weight security operations [16,30]. One can envision a network of heterogeneous storage servers 1 composed of traditional storage servers as well as special purpose storage devices providing fast global data access to its clients. As a result, cross-domain file sharing systems should be designed to work efficiently, not only in the presence of traditional storage servers, but also in the presence of such intelligent storage devices. As can be seen from these aforementioned examples, collaboration can be performed between two independent parties that may not have any pre-established administrative relationships. Therefore, existing solutions such as Kerberos [22,26] do not work in these settings as in order to use Kerberos the administrators of the two domains should collaborate in order to setup their systems for cross-domain authentication, which is known to be tiresome and may not be always feasible. In practice, very few independent organizations actually setup joined Kerberos realms. If the collaborating users realms are not joined, then the only way to collaborate is to set-up accounts for remote collaborators. Therefore, user-to-user delegation, that is delegation of access from one user to another is important to increase flexibility of file sharing and reduce administrative burden. Typically, delegation of access rights from one user to another is performed using X.509 certificate chains [1]. In order to access files, users present a signed request and en- 1 A storage server can be any entity that serves data, for example, traditional file servers, network-attached disks, etc. 101
2 tire chain of certificates to the storage servers [4,20,25]. In this case, the storage servers verify the chain of certificates before granting access to users. Verifying certificate chains involve traversing trust hierarchies to find common ancestors. During this process, the storage server has to verify multiple public-key signatures, which is a computationally expensive process and may require accessing remote databases. This verification process will increase access latencies since all these operations have to be performed during data-path. The whole purpose of storage devices is to allow fast and direct access to data. Therefore, verification of certificate chains on these devices should be avoided, which will allow them to utilize their CPU without any disruption to perform assigned tasks, such as search and indexing, high-performance data delivery, versioning, etc. Further, verification of certificate chains can introduce access latencies even when used on traditional storage servers. Therefore, a light-weight authorization mechanism is always desirable. The main contribution of this paper is to present a complete system that is designed to provide efficient global file sharing without any administrative interference. It is designed to work with existing policy managers [7, 8] so that system administrators can set appropriate local policies. The system ensures that users behave according to these policies. SGFS offers great flexibility, low administrative overhead, and can be used in diverse environments. The authentication protocols are designed to be efficient and resilient to central point of failures. These protocols are carefully tailored for network-attached storage devices (they also work efficiently on traditional servers). SGFS uses symmetric-key certificates (SKC) that resemble X.509 attribute certificates. SKCs achieve the nice properties of X.509 certificates, but are light-weight as compared to X.509 certificates. As a result, SGFS can support different access control models and can utilize existing policy languages that are designed with X.509 certificates in mind. In SGFS, user-to-user delegation is performed using SKC, which includes all the necessary information required by the file server to verify user credentials. To ensure traceability of delegation, the authentication protocols are designed to leave audit trails that can be used by the system administrators to selectively revoke users. Further, the use of SKC obviates the need to map remote group names to local identifiers and greatly reduces the administrative burden. 2. System Design 2.1. The SGFS Symmetric Key Certificates In SGFS, the authentication server grants every user symmetric key certificates (SKC) that are used by the user to authenticate herself with the storage server and share keys with them. The SGFS SKCs are designed to mimic the X.509 attribute certificates [1], but in a symmetric key setting. A SKC is generated by an entity T for a user U to be verified by a verifier V as follows: SKC U T,V ={P U T, pr f KTV (P U T )} (1) Where, pr f is a pseudo-random function (HMAC [5] in practice). K TV is the key shared between the verifier V and the certificate generation entity T. PT U is the public information of user U defined by T, and KT U = pr f K TV (PT U) is the secret key for U. If PT U is made available to V, then V can generate KT U, and, thus, share a key with U. Using KU T, U can authenticate with V and assert the privileges listed in PT U. A similar but restrictive type of symmetric key certificate was used in [28]. Properties A symmetric key certificate binds PT U to the holder of the corresponding KT U and the certificate has a designated verifier V, but the verifier does not need to contact T each time to generate KT U. Similar to X.509 attribute certificates, SKCs bind information such as identity, privileges, roles to the holder of the key KT U. They can be longlived and one can apply policies similar to that applied to X.509 attribute certificates. Further, the verifier does not have to contact any other online entity to verify the certificate. However, since they are based on symmetric key techniques, SKCs differ from public key certificates - they can be verified by a single designated party, they can be used by the user to establish a shared key only with a single verifier (and vice-versa), they do not provide non-repudiation, and SKCs cannot be entirely stored in a public database (KT U is secret). A different (and commonly known) notion of symmetric key certificates was used in [3, 10]. In these approaches, a SKC for a user B is of the form E KT (K BT,B). Where, K T is the key known only to a central trusted entity T and K BT is the key shared by a user B with T. Any user A (that has E KT (K AT,A)) who wants to send an authentic message (or a key) to B should encrypt the message with K AT and send the encrypted message, and B s SKC to T. T then translates the message from A to B by decrypting B s SKC and reencrypting A s message to B. The main drawback of this approach is that T has to be online to translate messages between any two entities. The Contents of a SKC A symmetric key certificate is comprised of a public part PT U (see eq. 1) and a secret part KT U. The public part contains the following information: a unique identifier of this SKC unique identification of the holder unique identification of the issuing server 102
3 issuing servers DNS/IP address, if applicable list of privileges granted to the holder validity period of this SKC delegator constraints The holder and the issuer can be identified by local user name, address, or reference to public key. If the issuer is a server, then the identifier can be servers global identifier, such as DNS name or reference to public key. Privileges can be a list of roles, list of groups, list of file groups, etc. Constraints can restrict certain type of access. For example, they can specify if access granted to the holder is read-only or the time duration during which a user can access files. Constraints can also specify whether the holder can delegate a subset of her privileges to other users Design Rationale In this section we explain the factors that have influenced the design of SGFS. Low cryptographic overhead on storage servers In order to achieve our first goal of designing authentication protocols that impose minimal cryptographic overhead on the storage servers, we decided to avoid performing public key operations on the storage servers. SGFS is designed to be used for high performance data access in the presence of network attached storage devices. Therefore, we do not perform any public key operations on the storage servers and the authentication protocols are based on symmetric key operations. User-to-user delegation is also performed without using certificate chains. This allows the storage servers to perform their assigned task (indexing, self-securing, high performance data provisioning etc.) without any disruption. Resilience to central point of failures To make our system resilient to central point of failures, we attempted to reduce interactions between the user and any online entity (except storage servers), especially between the users and the authentication server. If the user has to frequently contact the authentication server to get access credentials, then if the authentication server is down or overloaded with authentication requests, the user will not be able to access files even if the storage server is available. Therefore, we desire a solution in which files could be unavailable to the user only when the storage server is unavailable. To achieve this goal, users are granted long-term access keys. We believe that in most of the cases, changes to user credentials are infrequent. For example, in Role-based Access Control (RBAC) [14], users roles are usually associated with their job in the organization, which do not change frequently [11,13]. Similarly in UNIX environments, a particular user s group membership does not change daily. One common tradeoff of long-lived access key is revocation. SGFS design includes revocation servers which periodically publish appropriate new revocation lists to the storage servers. The revocation server can also perform emergency updates if immediate revocation is required. Flexible file sharing with minimal system administrative interference In SGFS if a local user Alice wants to share files with an external user Bob, Alice can delegate a subset of her access rights to Bob (if the policies allow her to do so). If Alice s organization policies allow Bob to delegate to other users (e.g., his group members), then Bob can further delegate the access rights acquired from Alice. User-to-user delegation does not require any system administrative interference, increases flexibility of sharing, and also reduces the management burden. Traceable delegation and audit trails In practice, even if Alice is allowed to delegate to Bob, the delegation should be traceable. Audit logs should be maintained to clearly indicate the delegator-delegatee relationships. This information can be used for auditing as well as revocation. The SGFS delegation protocol is designed in such a way that Bob has to perform one time set-up with the Alice s authentication server (AS) to receive a SKC from the AS. During this process the AS can verify polices and create audit logs. Flexible policy support Organizations use different policies in different settings. Many of the existing policy languages, such as PolicyManager [8], KeyNote [7], and SPKI [12], offer the ability to formally express policies making it possible to automate enforcement. These systems were designed with X.509 certificates in mind. To exploit the flexibility of X.509 certificates in a non-public key setting and at the same time use the existing policy languages, SGFS uses symmetric key certificates that contain similar information as that contained in the X.509 certificates. 3. System Architecture Figure 1 depicts the SGFS architecture. It consists of five entities: authentication server (AS), policy manager (PM), storage servers, clients 2 (or end users), and revocation servers. The AS is trusted by all other entities. It is responsible to authenticate users and give them appropriate credentials. The AS shares a unique symmetric key with every storage server and is responsible for securely managing these keys. 2 User and Client refer to the end user of the system and are used interchangeably. 103
4 Local User Auth. Only the AS is trusted by the storage servers. Therefore, if Alice wants to access files stored on S, Alice should acquire a SKC for S from AS. This is denoted by step 1 in figure 1. After receiving Alice s request, AS authenticates Alice and acquires necessary information, such as Alice s group membership list, policies, and constraints. It can also consult with the PM to perform some initial policy verification. Using this information, AS issues a symmetric key certificate for Alice as follows. SKC A AS,S ={P A AS,K A AS = MAC K (P A AS)} Figure 1. The SGFS Architecture. It also maintains a database of local users and their associated privileges and group memberships. We assume that the AS can communicate securely with all entities. The PM is trusted to set appropriate policies. The revocation server is responsible to store and publish revocation lists. It periodically publishes the appropriate new revocation lists to the storage servers. It can also send emergency revocation messages to storage servers, if immediate revocation is required. It is assumed that the revocation server can securely communicate with the storage servers and the AS. Clients are not trusted. They can launch various active and passive attacks. Communication links between the clients and the storage servers are assumed to be insecure. Since in a global file sharing system a client can access files from any computer (e.g., home computer, remote domains etc.), we do not assume any time synchronization between the clients and the storage servers. Storage servers are trusted to perform their part of authentication and authorization securely. The data stored on these servers is not encrypted. In the future, this can be performed using existing file encryptors [6, 19, 24] Usage Overview Let us denote the key shared between the AS and a SGFS storage server S as K. Let Alice be a local user belonging to group genomics and Bob be an external user (belonging to a different organization). Let user Alice be denoted as A and let user Bob be denoted as B. Alice securely stores SKCAS,S A and uses KA AS to initiate a mutual authentication protocol (during step 2 of figure 1) with S. The storage server knows K, and, hence can generate KAS A using PA AS sent by Alice during the authentication process. Using KAS A Alice and S can authenticate each other and securely communicate with each other. After successful completion of the mutual authentication phase (step 2 of figure 1), S asserts the policies and constraints listed by AS in PAS A. Finally, the storage server extracts the group membership information or role-privilege information (depending upon the access control model) and performs access control using the ACLs stored locally along with the files. Delegation Now let us see how a local user Alice and her genomics group can share files with an external user Bob. Alice first generates a symmetric key certificate for Bob SKCA,AS B = {PB A,KB A = MAC KAS A (PB A )} and sends SKCB A,AS along with her PAS A securely to Bob (step 3 of figure 1). Alice includes necessary information in PA B and includes her genomics group in the group membership list in PA B. The SKCA,AS B is a notification that tells AS that Alice wants to add Bob to the genomics group. After receiving SKCA,AS B, Bob can go to the AS and authenticate himself using K B (step 4 of figure 1). Using PA AS the AS can re-generate KAS A and verify SKCB A,AS. AS then performs policy checks, for example it verifies if Alice is allowed to delegate. If all checks succeed, AS then generates a new SKCAS,S B for Bob and sends it securely to Bob. Bob has thus become a local user with rights to access files belonging to group genomics. As in the case of Alice, Bob uses SKCAS,S B to authenticate with S and access files stored on S. The file server does not need know that Bob is an external user (although this information is included in PAS B for auditing). It only verifies that Bob has a valid SKC from the AS and grants access based on the information embedded in SKC. Further, the file server does not need to map any remote group-ids as all the necessary local group information is already in SKC. If Bob needs to acquire a key for a different storage server, Bob can use SKCAS,S B again to get a new SKC from the AS. Transparency It is important to note that step 1,2,4, and 104
5 5 are done transparently and the user is not aware of these operations. All SKCs are automatically stored securely at the client. Once the SKC for the storage server is available, the SGFS client initiates the authentication protocol with the server whenever necessary Summary of Protocols In this section we present a brief summary of our authentication protocols. The details of the authentication protocols are omitted due to space restrictions 3. The clientserver mutual authentication protocol (during step 2 of figure 1) prevents replay attacks and does not require any time synchronization between the clients and the storage servers. During mutual authentication, the server has to maintain two random numbers. After mutual authentication, if secure data transfer is desired, then the storage server has to maintain one session key for the duration of the data transfer. Only symmetric key operations are performed on the storage servers, which are computationally inexpensive. Administrators of collaborating domains do not have to perform any manual co-operation. A user can securely delegate access rights to another user without any administrative intervention. If necessary, Administrators can set appropriate policies to ensure that users do not misuse their delegation powers. SKC certificates gives us the flexibility to use SGFS in various access control models and with existing policy managers. SKCs are long-lived and can be transferred in an offline manner to local users, e.g., via . Users do not have to frequently contact AS; therefore, users can keep accessing the data without any disruption even when the AS is down or overloaded. Further, users can securely transfer SKCs from one machine to another and access files seamlessly from any machine. SGFS authentication protocols do not require to maintain any long-term state on the storage servers. Using SKCs storage servers can make on-spot authorization decisions without having to contact any remote server. Therefore, SGFS allows secure, flexible, failure resistant and efficient global file sharing without any administrative interference. 4. Current Status and Future Directions We have implemented all of the authentication protocols briefly described in section 3.1. In addition, we have implemented easy to use tools that assist users to acquire SKCs and delegate SKCs to other users. Figure 2 represents the SGFS system. The SGFS client runs in user space and is layered on the top of FSFS [9], a user space file system 3 A full version of this paper will be available at umn.edu/publications/publications.php Figure 2. The SGFS system components designed to be mounted through an interface provided by FUSE [15]. The SGFS server is layered on top of the FSFS server, which is a multi-threaded user space daemon that accepts clients requests on a TCP socket. We chose FUSE because it allowed us to implement our concepts in user space without having to manipulate kernel code. We chose FSFS because it is already a distributed file systems that allows users to access files stored on a remote server. The original FSFS code is embedded with its own security layer. We stripped-down the FSFS (bfsfs) code and used the bare version that allowed multiple users to access files stored on the remote server. The SGFS client and server code is not specifically tied to FSFS and can be layered on top of any file system. Our ideal goal is to integrate SGFS into more general purpose file systems, such as NFS. Hence, we decided to build the SGFS system in a modular fashion without tying it to any particular file system. The SGFS system is in a preliminary implementation stage. Even though the authentication protocols are in place, there are several challenges that need to be addressed. Currently FSFS client can mount only one file server, which has to be specified while running the FSFS client. It allows multiple users on the same machine to access the mounted file server. However, since one FSFS client can access only one server, the SGFS users can access only one server through one SGFS client. To eliminate this problem, the next version of SGFS system will include two new features: global naming and auto mounting. The current implementation does not include revocation servers and policy managers. One of the main challenges related to policy verification is choosing the appropriate policy manager. To the best of our knowledge all of the existing policy managers are tailored for public key certificates. Therefore, to exploit the existing policy managers and give us the flexibility of public key certificates we defined SKC that mimic public key certificates. We are investigating appropriate policy languages that are easy to 105
6 customize and flexible enough to be used in various access control models. 5. Conclusion In this paper, we have presented the architecture and design of SGFS, a secure global file sharing system tailored for efficient data access. We have discussed the important requirements for a global file sharing system that have influenced our design. SGFS provides secure, efficient, and flexible global file sharing with minimal administrative interference. Users can delegate access permissions to remote users based on the local policies. Further, SGFS supports off-the-shelf policy engines that can be used by the system administrators to control user delegations. Due to its minimal cryptographic overhead on the storage servers, SGFS is suitable for emerging intelligent storage devices. We have developed a easy to use user-space prototype that features our authentication protocols and simple tools that assist users to create keys and delegate access rights to remote users. All symmetric key certificates are stored securely and can be moved from one machine to another to access in a seamless manner. SGFS offers great flexibility, low administrative overhead, and can be used in diverse environments. 6. Acknowledgements This work was supported in part by the National Science Foundation (NSF) under Grant CNS and by the Intelligent Storage Consortium at the Digital Technology Center (DTC), University of Minnesota. We would like to thank Mark Shaneck and Anjali Joshi for their helpful discussions and comments on earlier drafts. References [1] Internet X.509 Public Key Infrastructure Certificate and CRL Profile. IETF RFC 2459, January [2] A. Acharya, M. Uysal, and J. Saltz. Active disks: programming model, algorithms and evaluation. In ASPLOS, [3] G. Ateniese and S. Mangard. A new approach to DNS security (DNSSEC). In ACM CCS, [4] E. Belani, A. Vahdat, T. Anderson, and M. Dahlin. The crisis wide area security architecture. In Proceedings of the 7th USENIX Security Symposium, [5] M. Bellare, R. Canetti, and H. Krawczyk. Keying hash function for message authentication. CRYPTO, [6] M. Blaze. A cryptographic file system for UNIX. In Proceedings of the ACM CCS, [7] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. The keynote trust management system version 2. [8] M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In IEEE Security and Privacy, [9] N. Cocchiaro. FSFS - the Fast Secure File System. http: //fsfs.sourceforge.net/. [10] D. Davis and R. Swick. Network security via private-key certificates. ACM Operating System Review, [11] D. G. D.F. Ferraiolo and N. Lynch. An examination of federal and commercial access control policy needs. In NIST- NCSC National Computer Security Conference, [12] C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. IETF RFC [13] D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role- Based Access Control. Artech House, Inc., [14] D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role based access control. ACM TISSEC, August [15] FUSE: Filesystem in Userspace. sourceforge.net/. [16] G. R. Ganger and D. Nagle. Better security via smarter devices. In HotOS, pages , [17] G. Gibson, D. Nagle, K. Amiri, F. Chang, E. Feinberg, H. Gobioff, C. Lee, B. Ozceri, E. Riedel, D. Rochberg, and J. Zelenk. File server scaling with network-attached secure disk. In SIGMETRICS, June [18] L. Huston, R. Sukthankar, R. Wickremesinghe, M. Satyanarayanan, G. Ganger, E. Riedel, and A. Ailamaki. Diamond: A storage architecture for early discard in interactive search. In USENIX FAST, [19] C. F. J. Hughes. Architecture of the secure file system. In IEEE Symposium on Mass Storage Systems, April [20] M. Kaminsky, G. Savvides, D. Mazieŕes, and M. F. Kaashoek. Decentralized user authentication in a global file system. In ACM SOSP, October [21] K. Keeton, D. A. Patterson, and J. M. Hellerstein. A case for intelligent disks (IDISKs). ACM SIGMOD Rec., 27(3):42 52, [22] J. Linn. The kerberos version 5 GSS-API mechanism. RFC 1964, June [23] R. V. Meter, S. Hotz, and G. Finn. Derived virtual devices: A secure distributed file system mechanism. In IEEE Mass Storage Systems and Technologies, September [24] E. Miller, D. Long, W. Freeman, and B. Reed. Strong security for distributed file systems. In FAST, January [25] S. Miltchev, V. Prevelakis, S. Ioannidis, J. Ioannidis, A. Keromytis, and J. Smith. Secure and flexible global file sharing. In Freenix, [26] B. C. Neumann and T. Ts o. Kerberos: An authentication service for computer networks. IEEE Communications, 32(9):33 38, September [27] Information technology - SCSI Object-Based Storage Device Commands -2 (OSD-2). T10 Working Draft, October osd2/osd2r00.pdf. [28] B. C. Reed, M. A. Smith, and D. Diklic. Security considerations when designing a distributed file system using object storage devices. In SISW, December [29] E. Riedel, G. A. Gibson, and C. Faloutsos. Active storage for large-scale data mining and multimedia. In Proceedings of the 24th Conference on Very Large Data Bases, [30] J. D. Strunk, G. R. Goodson, M. L. Scheinholtz, C. A. N. Soules, and G. R. Ganger. Self-Securing storage: Protecting data in compromised systems. In OSDI, October
How To Create A Secure Global File System
SGFS: Secure, Efficient and Policy-based Global File Sharing Vishal Kher, Eric Seppanen, Cory Leach, and Yongdae Kim Computer Science and Engineering University of Minnesota Minneapolis, MN 55455 {vkher,seppanen,leach,kyd}@cs.umn.edu
SGFS: Secure, Flexible, and Policy-based Global File Sharing
SGFS: Secure, Flexible, and Policy-based Global File Sharing Vishal Kher Eric Seppanen Cory Leach Yongdae Kim {vkher,seppanen,leach,kyd}@cs.umn.edu University of Minnesota Motivation for Network attached
Strong Security for Distributed File Systems
Strong Security for Distributed File Systems Ethan Miller Darrell Long William Freeman Benjamin Reed University of California, Santa CruzTRW IBM Research Abstract We have developed a scheme to secure networkattached
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution.
Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 14 Key Management and Distribution. 1 Opening quote. 2 The topics of cryptographic key management
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service
Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service Sazzad Masud and Ram Krishnan University of Texas at San Antonio [email protected], [email protected] Abstract Cloud
OpenHRE Security Architecture. (DRAFT v0.5)
OpenHRE Security Architecture (DRAFT v0.5) Table of Contents Introduction -----------------------------------------------------------------------------------------------------------------------2 Assumptions----------------------------------------------------------------------------------------------------------------------2
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Module 7 Security CS655! 7-1!
Module 7 Security CS655! 7-1! Issues Separation of! Security policies! Precise definition of which entities in the system can take what actions! Security mechanism! Means of enforcing that policy! Distributed
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
AUTHENTICATING NETWORK-ATTACHED STORAGE
AUTHENTICATING NETWORK-ATTACHED STORAGE WE PRESENT AN ARCHITECTURE FOR NETWORK-AUTHENTICATED DISKS THAT IMPLEMENTS DISTRIBUTED FILE SYSTEMS WITHOUT FILE SERVERS OR ENCRYPTION. OUR SYSTEM PROVIDES NETWORK
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
WebDAVA: An Administrator-Free Approach To Web File-Sharing
WebDAVA: An Administrator-Free Approach To Web File-Sharing Alexander Levine [email protected] Drexel University Vassilis Prevelakis [email protected] Drexel University John Ioannidis Sotiris Ioannidis
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1
KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE Mihir Bellare UCSD 1 The public key setting Alice M D sk[a] (C) Bob pk[a] C C $ E pk[a] (M) σ $ S sk[a] (M) M, σ Vpk[A] (M, σ) Bob can: send encrypted data
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Secure Access Mechanism for Cloud Storage
Secure Access Mechanism for Cloud Storage Danny Harnik, Elliot K. Kolodner, Shahar Ronen, Julian Satran, Alexandra Shulman-Peleg, Sivan Tal IBM Haifa Research Lab Haifa, Israel 31905 email: {dannyh,kolodner,shaharr,julian_satran,shulmana,sivant}@il.ibm.com
7 Key Management and PKIs
CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 7 Key Management and PKIs 7.1 Key Management Key Management For any use of cryptography, keys must be handled correctly. Symmetric keys must be kept secret.
Lecture VII : Public Key Infrastructure (PKI)
Lecture VII : Public Key Infrastructure (PKI) Internet Security: Principles & Practices John K. Zao, PhD (Harvard) SMIEEE Computer Science Department, National Chiao Tung University 2 Problems with Public
Web Security Considerations
CEN 448 Security and Internet Protocols Chapter 17 Web Security Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Network Security Protocols
Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Introduction to Network Security Key Management and Distribution
Introduction to Network Security Key Management and Distribution Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science and Technology [email protected] http://web.mst.edu/~cetinkayae/teaching/cpe5420fall2015
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Key Management and Distribution
Key Management and Distribution Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] udio/video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
File System Encryption with Integrated User Management
File System Encryption with Integrated User Management Stefan Ludwig Corporate Technology Siemens AG, Munich [email protected] Prof. Dr. Winfried Kalfa Operating Systems Group Chemnitz University of
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
Overview of CSS SSL. SSL Cryptography Overview CHAPTER
CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
How To Use Kerberos
KERBEROS 1 Kerberos Authentication Service Developed at MIT under Project Athena in mid 1980s Versions 1-3 were for internal use; versions 4 and 5 are being used externally Version 4 has a larger installed
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1
Chapter 15 Key Management Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 15.1 Symmetric-key Distribution Symmetric-key cryptography is more efficient than asymmetric-key
Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket
IT 4823 Information Security Administration Public Key Encryption Revisited April 5 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
OPENID AUTHENTICATION SECURITY
OPENID AUTHENTICATION SECURITY Erik Lagercrantz and Patrik Sternudd Uppsala, May 17 2009 1 ABSTRACT This documents gives an introduction to OpenID, which is a system for centralised online authentication.
Security in Storage Networks A Current Perspective
Security in Storage Networks A Current Perspective Christian Cachin ZISC Colloquium www.zurich.ibm.com Overview Networked storage systems NAS, SAN, OBS Design options for security
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA
A Secure & Efficient Data Integrity Model to establish trust in cloud computing using TPA Mr.Mahesh S.Giri Department of Computer Science & Engineering Technocrats Institute of Technology Bhopal, India
DRAFT Standard Statement Encryption
DRAFT Standard Statement Encryption Title: Encryption Standard Document Number: SS-70-006 Effective Date: x/x/2010 Published by: Department of Information Systems 1. Purpose Sensitive information held
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Key Management and Distribution
Key Management and Distribution Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
Introduction to Cryptography
Introduction to Cryptography Part 3: real world applications Jean-Sébastien Coron January 2007 Public-key encryption BOB ALICE Insecure M E C C D channel M Alice s public-key Alice s private-key Authentication
SSL Protect your users, start with yourself
SSL Protect your users, start with yourself Kulsysmn 14 december 2006 Philip Brusten Overview Introduction Cryptographic algorithms Secure Socket Layer Certificate signing service
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
CRYPTOGRAPHY IN NETWORK SECURITY
ELE548 Research Essays CRYPTOGRAPHY IN NETWORK SECURITY AUTHOR: SHENGLI LI INSTRUCTOR: DR. JIEN-CHUNG LO Date: March 5, 1999 Computer network brings lots of great benefits and convenience to us. We can
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Lecture 9 - Network Security TDTS41-2006 (ht1)
Lecture 9 - Network Security TDTS41-2006 (ht1) Prof. Dr. Christoph Schuba Linköpings University/IDA [email protected] Reading: Office hours: [Hal05] 10.1-10.2.3; 10.2.5-10.7.1; 10.8.1 9-10am on Oct. 4+5,
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Application Security: Threats and Architecture
Application Security: Threats and Architecture Steven M. Bellovin [email protected] http://www.cs.columbia.edu/ smb Steven M. Bellovin August 4, 2005 1 We re from the Security Area, and We re Here to
A Model for Access Control Management in Distributed Networks
A Model for Access Control Management in Distributed Networks Master of Science Thesis Azadeh Bararsani Supervisor/Examiner: Dr. Johan Montelius Royal Institute of Technology (KTH), Stockholm, Sweden,
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Dr. Cunsheng DING HKUST, Hong Kong. Security Protocols. Security Protocols. Cunsheng Ding, HKUST COMP685C
Cunsheng Ding, HKUST Lecture 06: Public-Key Infrastructure Main Topics of this Lecture 1. Digital certificate 2. Certificate authority (CA) 3. Public key infrastructure (PKI) Page 1 Part I: Digital Certificates
SSL/TLS: The Ugly Truth
SSL/TLS: The Ugly Truth Examining the flaws in SSL/TLS protocols, and the use of certificate authorities. Adrian Hayter CNS Hut 3 Team [email protected] Contents Introduction to SSL/TLS Cryptography
Architecture Guidelines Application Security
Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation
Wireless ATA: A New Data Transport Protocol for Wireless Storage
Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
Key Management Interoperability Protocol (KMIP)
(KMIP) Addressing the Need for Standardization in Enterprise Key Management Version 1.0, May 20, 2009 Copyright 2009 by the Organization for the Advancement of Structured Information Standards (OASIS).
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
Certificates. Noah Zani, Tim Strasser, Andrés Baumeler
Certificates Noah Zani, Tim Strasser, Andrés Baumeler Overview Motivation Introduction Public Key Infrastructure (PKI) Economic Aspects Motivation Need for secure, trusted communication Growing certificate
Lightweight Security using Identity-Based Encryption Guido Appenzeller
Lightweight Security using Identity-Based Encryption Guido Appenzeller Chief Technology Officer Voltage Security Inc. Identity-Based Encryption (IBE) IBE is a new public key encryption algorithm A number
A PKI case study: Implementing the Server-based Certificate Validation Protocol
54 ISBN: 978-960-474-048-2 A PKI case study: Implementing the Server-based Certificate Validation Protocol MARIUS MARIAN University of Craiova Department of Automation ROMANIA [email protected] EUGEN
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Chapter 15 User Authentication
Chapter 15 User Authentication 2015. 04. 06 Jae Woong Joo SeoulTech ([email protected]) Table of Contents 15.1 Remote User-Authentication Principles 15.2 Remote User-Authentication Using Symmetric
TOPIC HIERARCHY. Distributed Environment. Security. Kerberos
KERBEROS TOPIC HIERARCHY Distributed Environment Security Privacy Authentication Authorization Non Repudiation Kerberos ORIGIN MIT developed Kerberos to protect network services. Developed under the Project
Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software
Introduction. Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi
Introduction Haroula Zouridaki Mohammed Bin Abdullah Waheed Qureshi Introduction Comparing Secure Hypertext protocol (S-HTTP) to Secure Socket Layer (SSL) Agenda Waheed opens the presentation introduces
