National Data Storage 2 Secure sharing, publishing and exchanging data



Similar documents
National Data Storage data replication in the network

Michał Jankowski Maciej Brzeźniak PSNC

Popular backup/archival service and its application for the archival of the network traffic in the academic network PIONIER

Polish National Data Storage. Norbert Meyer, Maciej Brzeźniak, Maciej Stroiński PSNC

National Data Store 2 crypto-clients - demonstration

NDS2 Secure storage, sharing and publishing of data in the NDS

ETERNUS CS High End Unified Data Protection

Introduction to Hadoop. New York Oracle User Group Vikas Sawhney

Hadoop Distributed File System. T Seminar On Multimedia Eero Kurkela

Building Storage Service in a Private Cloud

DSS. High performance storage pools for LHC. Data & Storage Services. Łukasz Janyst. on behalf of the CERN IT-DSS group

Sector vs. Hadoop. A Brief Comparison Between the Two Systems

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

Diagram 1: Islands of storage across a digital broadcast workflow

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

MANAGEMENT METHODS IN SLA-AWARE DISTRIBUTED STORAGE SYSTEMS

The Data Grid: Towards an Architecture for Distributed Management and Analysis of Large Scientific Datasets

In Memory Accelerator for MongoDB

File Sharing and Network Marketing

Alliance Key Manager Solution Brief

Scale out NAS on the outside, Object storage on the inside

Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006

Alliance Key Manager A Solution Brief for Technical Implementers

Microsoft SQL Server Security and Auditing Clay Risenhoover ISACA North Texas April 14,

SOA REFERENCE ARCHITECTURE: WEB TIER

How To Encrypt Data On A Network With Cisco Storage Media Encryption (Sme) For Disk And Tape (Smine)

Long term retention and archiving the challenges and the solution

Advancements in Storage QoS Management in National Data Storage

High Availability with Postgres Plus Advanced Server. An EnterpriseDB White Paper

Deploying a distributed data storage system on the UK National Grid Service using federated SRB

IBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM

LTO4 Hardware Encryption Best Practices. By Vic Ludlam Distributed by Dynamic Solutions International

Integrated Infrastructure for Secure and Efficient Long-Term Data Management

DataCentred Cloud Storage

2011 FileTek, Inc. All rights reserved. 1 QUESTION

IT Architecture Review. ISACA Conference Fall 2003

Advanced Service Platform for e-science. Robert Pękal, Maciej Stroiński, Jan Węglarz (PSNC PL)

Appendix A Core Concepts in SQL Server High Availability and Replication

Oracle Collaboration Suite

SQL Server 2012/2014 AlwaysOn Availability Group

A SURVEY OF POPULAR CLUSTERING TECHNOLOGIES

Jitterbit Technical Overview : Microsoft Dynamics CRM

ZFS Backup Platform. ZFS Backup Platform. Senior Systems Analyst TalkTalk Group. Robert Milkowski.

No.1 IT Online training institute from Hyderabad URL: sriramtechnologies.com

Data Sheet Fujitsu ETERNUS CS High End V5.1 Data Protection Appliance

Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007

A Strategic Approach to Enterprise Key Management

Apache Hadoop new way for the company to store and analyze big data

HDFS Architecture Guide

Profiling as a Service

XML and Content Management

MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper

Data Lab System Architecture

Archive Data Retention & Compliance. Solutions Integrated Storage Appliances. Management Optimized Storage & Migration

Distributed File System. MCSN N. Tonellotto Complements of Distributed Enabling Platforms

XenData Video Edition. Product Brief:

TIBCO Spotfire Platform IT Brief

Floating on a Hybrid Cloud: SQL Server 2012 & Microsoft Azure. Timothy P. McAliley Microsoft Premier Field Engineer SQL Server

Cloud Storage and Backup

Cisco TelePresence Manager

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

Alliance Key Manager Cloud HSM Frequently Asked Questions

XtreemFS - a distributed and replicated cloud file system

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Backup with synchronization/ replication

Peer-to-peer Cooperative Backup System

The IBM Archive Cloud Project: Compliant Archiving into the Cloud

Cisco and EMC Solutions for Application Acceleration and Branch Office Infrastructure Consolidation

ZooKeeper. Table of contents

NAS 259 Protecting Your Data with Remote Sync (Rsync)

FAN An Architecture for Scalable, Service-Oriented Data Management

One Solution for Real-Time Data protection, Disaster Recovery & Migration

Hitachi NAS Platform and Hitachi Content Platform with ESRI Image

NETWORK ATTACHED STORAGE DIFFERENT FROM TRADITIONAL FILE SERVERS & IMPLEMENTATION OF WINDOWS BASED NAS

Overview of Luna High Availability and Load Balancing

PKI Made Easy: Managing Certificates with Dogtag. Ade Lee Sr. Software Engineer Red Hat, Inc

XpoLog Competitive Comparison Sheet

(Scale Out NAS System)

Module 14: Scalability and High Availability

Designing a Cloud Storage System

HDFS Users Guide. Table of contents

Deployment Topologies

Take An Internal Look at Hadoop. Hairong Kuang Grid Team, Yahoo! Inc

Qlik Sense Enabling the New Enterprise

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Top 10 Reasons why MySQL Experts Switch to SchoonerSQL - Solving the common problems users face with MySQL

solution brief solution brief storserver.com STORServer, Inc. U.S. (800) : STORServer, Europe 0031 (0)

Prepared By : Manoj Kumar Joshi & Vikas Sawhney

Cloud Gateway. Agenda. Cloud concepts Gateway concepts My work. Monica Stebbins

How To Secure Your Data Center From Hackers

ovirt and Gluster Hyperconvergence

Things to Consider When Planning for Cloud-Based Data Protection

XenData Archive Series Software Technical Overview

Design and Evolution of the Apache Hadoop File System(HDFS)

FROM RELATIONAL TO OBJECT DATABASE MANAGEMENT SYSTEMS

Managing and Maintaining Windows Server 2008 Servers

Fedora Directory Server FUDCon III London, 2005

Transcription:

National Data Storage Secure sharing, publishing and exchanging data Maciej Brzeźniak, Norbert Meyer, Michał Jankowski, Gracjan Jankowski Supercomputing Department, PSNC This work is funded under National Data Storage project (011-013), Project number NR0-005-10/011. http://nds.psnc.pl Full Polish name of the project: System bezpiecznego przechowywania i współdzielenia danych oraz składowania kopii zapasowych i archiwalnych w Krajowym Magazynie Danych

Agenda Context: NDS1 & PLATON Popular Archive Service Why version of NDS needed? NDS: New functionality: secure sharing, publishing and exchanging files versioning, point in time recovery New features: enhanced security, performance scalability, multi-user readiness Some observations / open issues

Projects where we are? 007 008 009 010 011 01 013 R&D: NDS Design & implementation POPULAR ARCHIVE SERVICE Deployment of NDS in the infrastructure & the service operation Tenders... Internal tests of NDS system Tests with users Production R&D: NDS Design & implementation

NDS1 aims and focus High-level aim: To support scientific and academic community in protecting and archiving the data Detailed aims: Adressing secondary storage applications: Long-term data archival Short-term backup Assumptions: people do have their own primary storage people use another tools for data exchange and CM Local storage User Network NDS system CMS black box Data exchange tools

NDS1 Design assumptions Focus on specific system features and functionality: Long-term data durability and consistency: Physical protection of the data Replication + safe storage Keeping consistency of the data Confidentiality and safety of the data To be supported (not able to solve all issues) Easy usage: standard access methods possible integration with existing tools Transparent data replication Stable & reliable product and service! HA, Trust...

NDS1 Features & challenges HA: Geographically distributed system Synchronous and asynchronous replication (reliability vs performance) Scalability: performance, storage capacity, number of users Challenges: fault tolerance Consistency vs high performance =?

NDS1 - Architecture NDS1 user application DB Database Access Methods Servers (SSH, HTTPs, WebDAV...) Virtual filesystem for data and meta-data (FUSE) NDS system logic Access Users DB Accounting & limits DB Replica access methods servers Storage file system Replication Storage Storage HSM System HSM System Slave DB

NDS system Architecture comments Data durability and service availability Sync & async replication Multiple data access & storage sites Monitoring & faults detection Limits: no data consistency checking inside the system at the moment User Access Storage Meta-data durability and consistency: Multiple meta-data databases instances Semi-synchronous replication of meta-data Synchronous operation logs replication NDS mechanisms Master DB Asynchronous transaction replication Slave DB

NDS Architecture comments/limits Data confidentiality Dedicated name spaces Data sharing possible among designated users, limited to a given institution/profile Limit: No support for sercure data sharing among institutions User1 User DB1 DB Logical or physical separation NDS1 uses encryption where possible; means: not everywhere! Data access: Scp/Sftp, https, WebDAV over https Storage: Encryption-enabled tapes (in fact external to system) Encryption outside the system: supported by client application (details later) System-side encryption & data consistency checks to be considered to increase the security of data not encrypted by user

NDS Architecture comments/limits Client side encryption & automation User side B/A application that supports security and automation User data NDS B/A application (on-the-fly encryption and checksums) User s data copy NDS/PLATON-U4 service Limits: user side encryption is CPU intensive Some hardware-aid solutions might be necessary for users having a lot of data Additional tools needed: Management features for keys Automation of security-related features

NDS Architecture comments/limits (3) Scalability: performance: Many ANs, SNs Many storage devices Data access optimisation: Load balancing Monitoring User Access Storage Limits: handling is... centralised for a given logical name space! Consistency vs performance... Storage capacity: Many SNs Many storage devices Cost-effective approach: HSM as the storage backend HSM System

NDS Architecture comments/limits (4) Scalability: Number of users We can configure multiple system instances when the single system limit is reached Architecture is virtualization-ready Limits: The more users, the more metadata and more complicated user management No real experince from the production system yet Some level of the user management de-centralisation is needed

NDS Architecture comments/limits (5) Ease of integration / usage: Standard user interfaces: We support: SCP, HTTP/WebDAV, GridFTP Integration with existing tools easy NDS logic details hidden from the user Limitations: No special features for users through standard interfaces (except meta-data fs) NDS system logic Extra features are to be provided by additional tool / interface: Client backup/archive applicaiton Web/GUI Interface E.g. No advanced tools to manage ACLs and sharing User User backup/archive software Access Methods Servers (SSH, HTTPs, WebDAV...) Virtual filesystem for data and meta-data (FUSE) User data Access Single sign-on: Based on X.509 certificates stored in LDAP Keys and certificates distributed automatically to access methods servers (sshd, apache, gridftp) and converted to appropriate format on-the-fly by KeyFS solution Access KeyFS X.509

NDS - summary of issues to address In NDS we need to address (functionalities): Advanced features for long-term B/A: Versioning point in time recovery Security and data safety related: Data consistency checks Strong and efficient encryption: on the client side (hardware aid, automated + tools) Sharing: Inside NDS (some trust to users assumed) NDS <-> external world (one side of sharing not trusted) Publishing data using our infrastructure: e.g. for Digital Libraries they store archives in the in NDS already Extra functionalities to be offered by extended (non-standard) interface e.g. versions management We still keep standard interfaces working

NDS - summary of issues to address We need to address (features): Scalability: Deal with metadata handling scalability but keep consistency untouched! common logical view is needed for all users going to share data => De-centralise logical name space management: De-centralise users management: hierarchical management (not covered in this presentation)

NDS1 Scalability improvements De-centralised logical name space management: Step 1: divide the namespace into parts distributed across multiple metadata DBs (dcache-like approach?) / DBA DBB DBC DB Database Users DB Accounting & limits DB ++ load distribution ++ consistency -- single point of failure

NDS1 Scalability improvements De-centralised logical name space management: Step : combine distribution with replication / DBA instance 1 DBB instance 1 DBC instance 1 DB Database Users DB Accounting & limits DB SSR DBB instance SSR DB instance ++ load distribution ++ consistency ++ no single point of failure SSR Semi Synchronous Replication of meta-data

NDS1 Scalability improvements De-centralised logical name space management: Step 3: combine distribution with replication + provide automated failover / DBA instance 1 DBB instance 1 DBC instance 1 DB Database Users DB Accounting & limits DB SSR DBB instance SSR DB instance ++ load distribution ++ consistency ++ no single point of failure ++ automated failover SSR Semi Synchronous Replication of meta-data

NDS New functionalities In NDS we need to address (functionalities): Advanced features for long-term B/A: Versioning point in time recovery Security and data safety related: Data consistency checks Strong and efficient encryption: on the client side (hardware aid, automated, + tools) Sharing: Inside NDS (some trust to users assumed) NDS <-> external world (one side of sharing not trusted) Publishing data using our infrastructure: e.g. for Digital Libraries they store archives in the in NDS already Extra functionalities to be offered by extended (non-standard) interface e.g. versions management We still keep standard interfaces working

NDS Versioning + Point-in-time recovery / open (...,..., O_RDWR) / A B A B C D C D E F G H a b c d e f g h E F G H a b c d e f g h H d NDS virtual filesystem structure NDS virtual filesystem structure Versioning is: Transparent to users they may access to old versions through a special directory or mountpoint; similarly (protocol, access point) as the current replica Efficient: We can use one of many existing replicas to handle current operations immediately

NDS Security and data safety functions Data consistency checks: Cryptographics shortcuts calculated for replicas and put to DB Can be presented to users (to be compared manually or automatically) Background checks made periodically (at least while storing and retrieving the file) Shortcuts calculated close to data (on the storage nodes) Redundany coding to be considered NDS user application ` DB Database Access Methods Servers (SSH, HTTPs, WebDAV...) Virtual filesystem for data and meta-data (FUSE) NDS system logic CC control Access Users DB Accounting & limits DB Replica access methods servers Storage file system Replication CC deamon Storage CC deamon Storage HSM System HSM System

NDS Security and data safety functions Strong and efficient encryption on the client side Software-based application for individual users User data NDS B/A application (on-the-fly encryption and checksums) User s data encrypted copy SSH, HTTPs, WebDAV... NDS service Sardware-aid appliance for those having really huge amounts data User data DATA EXPORTING METHOD (say CIFS/NFS) NDS B/A APPLIANCE (on-the-fly encryption and checksums aided by hardware) Safe key storage User s data encrypted copy Both approaches automated + tools provided SSH, HTTPs, WebDAV... NDS service

NDS Secure sharing and publishing Secure sharing the data inside the NDS system Maciej trusted NDS user Jan trusted NDS user C A /home/maciej B D E F G H a b c d e f g h NDS virtual filesystem structure SHARING d Copy (or link) the file + set the ACL C A /home/jan B + setting the ACLs enables the other user to SEE the file D SHARING + key exchange needed to really READ its contents + again, we can use multiple replicas to handle modifications d

NDS Secure sharing and publishing Secure sharing the data with the external World (FileSender-like use case) A Maciej trusted NDS user /home/maciej B ( secured or NOT) URL provided to Brian + some additional info: user/login key for the file... Brian... UNTRUSTED user Brian can access the file Sandboxed part of the system C D E F G H a b c d e f g h Copy the file to the publishing sandbox system side replication and decryption user not involved! d Simplified NDS logic NDS virtual filesystem structure + sharing effective - Maciej discloses the file vs the system + Maciej s secret key still not disclosed

NDS Secure sharing and publishing Secure publishing... (a special case of sharing) Anonymous UNTRUSTED users Maciej trusted NDS user /home/maciej Public URL generated and published People can access the file A B Sandboxed part of the system C D E F G H a b c d e f g h Copy the file to the publishing sandbox system side replication and decryption user not involved! d Simplified NDS logic NDS virtual filesystem structure + publishing effective + mulitple replicas can be effectively served by multiple servers (e.g. Apache) to many users - Maciej discloses the file vs the system

NDS Secure sharing and publishing Secure publishing... (practical use case for digital libraries) MASTER data MASTER versions STORAGE/ARCHIVAL Presentation versions storage Data source d CMS HR LR NDS services User / CMS operator LR Regular (low-res) presentation versions + link to high-res presentation version put to library portal High-res presentation versions publication A NDS sandbox End user (publication reader) HR B HR

NDS Secure sharing and publishing Some observations: Proper key management mechanisms needed: User (e.g. Maciej) owns the private/public master key pair Each stored file is encrypted using the a separate file s symmetric key Symmetric keys are safely stored in NDS DB (encrypted by master key known only to the user) Sharing steps: Sharing file physically (ACL...) enables to see the file Retrieving the symmetric file key from the system Decrypting the file s key (on the user side) Passing the decrypted file s key to the target user Decrypting the file on the user s side enabling to understand the file contents Publishing steps: Retrieving the file s symmetric key from the system Passing the decrypted key back to the system The system copies the file to sandbox (and decrypts it) The others can see the file and understand it Sharing mgmt. and key handling tools should be provided to users

NDS New features vs scalability Further observations / open issues: Improving system scalability is necessary to implement new features internal sharing require single logical view of the shared structure additional metadata processing Two versions of NDS logic: Regular for trusted part of the system, feature-full Light for the sandbox hack-proof, non feature-full, simple! Q: are we going to end-up with two completely different products? We have to consider new interfaces: Sanbox s public interface for downloading/uploading data What about reusing part of Filesender project findings? New features require going beyond standard interfaces: Web GUI (Java?) client-side application

NDS Summary In NDS we try to: Address more sophisticated B/A related needs Provide transparent versioning Increased security (encryption) and performance (hardware-aided) Improve overall system scalability Provide sharing facilities: Internal sharing lines of defence ACLs on file access + keys for contents File-Sender-like features for NDS users Support publishing: Private publishing use case Massive publishing use case

THANK YOU! More information: nds.psnc.pl Note: most of the pictures used in the presentation come from sxc.hu service