Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle.

Slides:



Advertisements
Similar presentations
Chapter 14 – Authentication Applications
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
CSE331: Introduction to Networks and Security Lecture 22 Fall 2002.
Page 1 Policy-Driven Systems for Enterprise-Wide Security Using PKI and Policies to build Trusted Distributed Authorization Systems Joe Pato Marco Casassa.
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 3.3: Fair Exchange.
TAPASDelivMarch04 1 TAPAS Deliverables for March 04 (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Understanding WebLogic Security
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
6/4/2015Page 1 Enterprise Service Bus (ESB) B. Ramamurthy.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Trusted Coordination ADAPT Workshop, December 03 1 Building Blocks for Trusted Coordination (a status report from the TAPAS project) Santosh Shrivastava.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Understanding Active Directory
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Key Management Guidelines. 1. Introduction 2. Glossary of Terms and Acronyms 3. Cryptographic Algorithms, Keys and Other Keying Material 4. Key Management.
UN Economic Commission for Europe 23rd UN/CEFACT FORUM 7-11 April rd UN/CEFACT FORUM – Geneva Tahseen A. Khan Project Proposal : Trusted Third Party.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Client/Server Software Architectures Yonglei Tao.
CSCI 6962: Server-side Design and Programming
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Chapter 10: Authentication Guide to Computer Network Security.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
E-Science Meeting March Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Information Security Conference (ISC 2015) On the Efficiency of Multi-Party Contract Signing Protocols Gerard Draper-Gil, Josep-Lluis Ferrer Gomila, M.
Secure Messaging Workshop The Open Group Messaging Forum February 6, 2003.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
Engineering Essential Characteristics Security Engineering Process Overview.
Rob Smith April 21, /18 GOLD Project Update Meeting GOLD an infrastructural approach to virtual organisations.
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
GLOBE DISTRIBUTED SHARED OBJECT. INTRODUCTION  Globe stands for GLobal Object Based Environment.  Globe is different from CORBA and DCOM that it supports.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Copyright © 2003 Jorgen Thelin / Cape Clear Software 1 A Web Services Security Framework Jorgen Thelin Chief Scientist Cape Clear Software Inc.
Long-term Archive Service Requirements November 9, 2004.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
1 An abstract model for run-time monitoring and enforcement of contracts. Carlos Molina-Jimenez TAPAS.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
B2BObjectsDSN, Washington, June Distributed Object Middleware to Support Dependable Information Sharing between Organisations Nick Cook, Santosh.
IAB-Feb 04 1 TAPAS Progress Report (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
Training for developers of X-Road interfaces
Cryptography and Network Security
Distribution and components
Ch > 28.4.
Providing Secure Storage on the Internet
X-Road as a Platform to Exchange MyData
Appropriate Access InCommon Identity Assurance Profiles
Quality-aware Middleware
Presentation transcript:

Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle

Trusted CoordinationTAPAS Workshop, 25-26/09/032 Trusted Coordination  Two aspects: Higher level mechanisms for policy specification and enforcement –Contract representation and monitoring Lower level mechanisms for non- repudiable interaction - the scope of this presentation

Trusted CoordinationTAPAS Workshop, 25-26/09/033 Outline  Building blocks for trusted coordination Non-repudiable service invocation Non-repudiable information sharing  Infrastructure requirements  Implementations  References

Trusted CoordinationTAPAS Workshop, 25-26/09/034 Building blocks for trusted coordination  Trusted coordination addresses VE requirement to regulate interactions (service access, update to shared information, etc.)  Regulation implies an audit trail to monitor interaction and for dispute resolution  Evidence generated is of little value unless irrefutably attributable to its source (non-repudiable)  Implies two building blocks for trusted coordination: Non-repudiable service invocation Non-repudiable information sharing

Trusted CoordinationTAPAS Workshop, 25-26/09/035 Service invocation  2-party, client-server interaction  Server needs evidence that: The request originated at the client: non-repudiation of origin (NRO) of the request The response was received by the client: non-repudiation of receipt (NRR) of the response  Client needs evidence that: The request was received by the server (NRR req.) The response originated at the server (NRO resp.) Client request response Server

Trusted CoordinationTAPAS Workshop, 25-26/09/036 Non-repudiable service invocation req Client Interceptor req, NROreq resp, NRRreq, NROresp NRRresp Interceptor Server resp req

Trusted CoordinationTAPAS Workshop, 25-26/09/037 Observations  To guarantee protocol compliance, interceptors must be trusted  Degenerate case is that the interceptors are a trusted third party (or parties) protocol resembles fair exchange as discussed in the literature  Interceptors can be configured to execute any non-repudiation protocol For example: to meet different evidentiary requirements req Client Interceptor req, NROreq resp, NRRreq, NROresp NRRresp Interceptor Server resp req

Trusted CoordinationTAPAS Workshop, 25-26/09/038 Evidence for non-repudiable service invocation  Request evidence includes the service invoked and any parameters to the invocation  Response evidence is the result of the invocation  3 different types to consider: 1.Values: require the state of the value at invocation time (or at response time for result). Before evidence generation, must resolve references to local values to an agreed representation of their state. 2.Service references: require a globally resolvable name for the service, e.g. URL (not the state of the service) 3.Shared information references: require the state of the information at invocation time (or at response time for result) and a reference to the shared information that is resolvable by the remote party

Trusted CoordinationTAPAS Workshop, 25-26/09/039 Access and update to shared information  Multi-party, peer-peer interaction  For an update proposed by A: B and C need evidence that update originated at A (NRO update) A needs evidence that B and C received the update (NRR update) A, B and C need evidence that, after update, the information will be in a consistent, agreed state (NRO agreement, NRR agreement) A update i B C

Trusted CoordinationTAPAS Workshop, 25-26/09/0310 upd (5) Evidence required:  State transition proposed by A (propose: step 2)  Decisions on validity of transition from B and C (respond: step 3)  Collective decision (resolve: step 4) Shared information is only updated if the collective decision is that A’s proposal is valid Incentives to good behaviour stronger than for one-off service invocation Non-repudiable information sharing upd (1) C B prop (2) resp (3) reslv (4) prop (2) resp (3) A i reslv (4)

Trusted CoordinationTAPAS Workshop, 25-26/09/0311 Infrastructure Requirements  Cryptographic primitives Digital signatures, secure message digest (hash), secure random number generation  Credential (certificate) management  Access control services Intra-organisation: map user to role Inter-organisation: map credential to role  Non-repudiation log protocol-specific include signed hash of state in evidence  State store map hash of state to persistent representation of state

Trusted CoordinationTAPAS Workshop, 25-26/09/0312 Infrastructure contd.  Coordination service to execute NR protocols (configurable to specific protocol)  Membership service (for information sharing only) Maintain group membership information (mapping members to credentials) Membership is coordinated using NR protocols executed by coordination service  Communication subsystem  Trusted time-stamping service To verify a signing key was not compromised at time of use (evidence generation) Recent results from Zhou et al may make this unnecessary  Trusted Third Parties for strong fairness guarantees

Trusted CoordinationTAPAS Workshop, 25-26/09/0313 Implementations  NR service invocation Wichert et al’s CORBA service –Lacks protocol detail, (naturally) only addresses value types Paul Robinson is working on J2EE implementation  NR information sharing B2BObjects –Realise shared information as object replicas at each member of coordinating group –Regulate access to and update of object state –Group membership and object state only change if all parties agree –Implemented in Java using RMI (also have initial version running on JBOSS)

Trusted CoordinationTAPAS Workshop, 25-26/09/0314 References  M. Wichert, D. Ingham, S. Caughey. Non-repudiation Evidence Generation for CORBA using XML, In Proc. IEEE Annual Comp. Security Applications Conf., Phoenix, US,  N. Cook, S. Shrivastava, S. Wheater. Distributed Object Middleware to Support Dependable Information Sharing between Organisations, In Proc. IEEE DSN02, Washington, US, Jun  N. Cook, S. Shrivastava, S. Wheater. Middleware Support for Non- repudiable Transactional Information Sharing between Enterprises, To appear as Work in Progress in: Proc. 4 th IFIP DAIS, Paris, France, Nov  J. Zhou, F. Bao, R. Deng. Validating Digital Signatures without TTPs Time-stamping and Certificate Revocation, To appear in Proc Inf. Security Conf., Bristol, UK, Oct  Jianying Zhou’s non-repudiation bibliography: