Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM) Konstantin Beznosov Laboratory for Education and Research in Secure.

Slides:



Advertisements
Similar presentations
An Adaptive Policy-Based Framework for Network Service Management Leonidas Lymberopoulos Emil Lupu Morris Sloman Department of Computing Imperial College.
Advertisements

802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
1 VIRTUAL MACHINES By: Sai Siddharth Kumar Dantu.
Unmodified Device Driver Reuse and Improved System Dependability via Virtual Machines J. LeVasseur V. Uhlig J. Stoess S. G¨otz University of Karlsruhe,
PlanetLab Architecture Larry Peterson Princeton University.
Challenges and Opportunities for System Software in the Multi-Core Era or The Sky is Falling, The Sky is Falling!
The Spensa File System Douglas Santry Computer Laboratory University of Cambridge.
DISTRIBUTED CONSISTENCY MANAGEMENT IN A SINGLE ADDRESS SPACE DISTRIBUTED OPERATING SYSTEM Sombrero.
1 Lecture 26: Storage Systems Topics: Storage Systems (Chapter 6), other innovations Final exam stats:  Highest: 95  Mean: 70, Median: 73  Toughest.
1  1998 Morgan Kaufmann Publishers Chapter 9 Multiprocessors.
WPDRTS ’05 1 Workshop on Parallel and Distributed Real-Time Systems 2005 April 4th and 5th, 2005, Denver, Colorado Challenge Problem Session Detection.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Legion Worldwide virtual computer. About Legion Made in University of Virginia Object-based metasystems software project middleware that connects computer.
Copyright ©2009 Opher Etzion Event Processing Course Engineering and implementation considerations (related to chapter 10)
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Distributed Data Management for Compute Grid Presented by Michael Di Stefano Founder of Author of Meeting: Tuesday, September 13 th, 2005.
Slide 3-1 Copyright © 2004 Pearson Education, Inc. Operating Systems: A Modern Perspective, Chapter 3.
Measuring zSeries System Performance Dr. Chu J. Jong School of Information Technology Illinois State University 06/11/2012 Sponsored in part by Deer &
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
SMART SECURITY ON DEMAND NETWORK ACCESS CONTROL Control Who And What Is On Your Network Larry Fermi Sr. Systems Engineer, NAC Subject Matter Expert.
Word Wide Cache Distributed Caching for the Distributed Enterprise.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
CS533 Concepts of Operating Systems Jonathan Walpole.
N. GSU Slide 1 Chapter 02 Cloud Computing Systems N. Xiong Georgia State University.
1 Configurable Security for Scavenged Storage Systems NetSysLab The University of British Columbia Abdullah Gharaibeh with: Samer Al-Kiswany, Matei Ripeanu.
© Copyright 2009 Sysgem AG, 8002 Zurich, Switzerland Sysgem Products Sysgem Enterprise Manager (SEM)  Identity & Access Management  System Management.
WEIRD Hot Topic: Wireless Chris Burke WEIRD Working Group
1 CloudVS: Enabling Version Control for Virtual Machines in an Open- Source Cloud under Commodity Settings Chung-Pan Tang, Tsz-Yeung Wong, Patrick P. C.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
Operating Systems Objective n The historic background n What the OS means? n Characteristics and types of OS n General Concept of Computer System.
Digital Preservation across the technologies, strategies, open standards & interoperability aspects including the legal issues Pratik Shrivastava Scientist.
Plumbing the Computing Platforms of Big Data Dilma Da Silva Professor & Department Head Computer Science & Engineering Texas A&M University.
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Named Function Networking
3/14/2016 © Crown Copyright. All rights reserved. Risk Managed Cloud Computing HMG IA Approach Ian McCormack TD IA Policy and Risk CESG.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
ECE 259 / CPS 221 Advanced Computer Architecture II (Parallel Computer Architecture) Interactions with Microarchitectures and I/O Copyright 2004 Daniel.
Introduction to Computers - Hardware
CHAPTER 11: Modern Computer Systems
Use of Cloud Computing for Implementation of e-Governance Services
Plan for Intro to Cloud Databases
Hadoop Aakash Kag What Why How 1.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
R SE to the challenges of ntelligent systems
Operating System Structure
Buses.
Software Engineering Introduction to Apache Hadoop Map Reduce
Download dumps - Microsoft Real Exam Questions Dumps4download
Architecture of Parallel Computers CSC / ECE 506 Summer 2006 Scalable Programming Models Lecture 11 6/19/2006 Dr Steve Hunter.
ETSI Multi-access Edge Computing:
CMPT 886: Computer Architecture Primer
Distributed Peer-to-peer Name Resolution
Developing a Baseline On Cloud Security Jim Reavis, Executive Director
Lecture 28: Reliability Today’s topics: GPU wrap-up Disk basics RAID
LAB 01 Installation of VIRTUAL MACHINE and LINUX
O.S Lecture 14 File Management.
Chapter 1: How are computers organized?
Specialized Cloud Architectures
Ron Carovano Manager, Business Development F5 Networks
Operating Systems: A Modern Perspective, Chapter 3
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Introduction to SOA Part II: SOA in the enterprise
Harrison Howell CSCE 824 Dr. Farkas
5G Technology Enablers, Regulatory Environment and Business Models
Presentation transcript:

Recycling Authorizations: Toward Secondary and Approximate Authorizations Model (SAAM) Konstantin Beznosov Laboratory for Education and Research in Secure Systems Engineering lersse.ece.ubc.ca Copyright © 2005 Konstantin Beznosov

outline the problem the approach summary context target environment limitations of point-to-point architectures the approach summary

Copyright © 2005 Konstantin Beznosov the problem Copyright © 2005 Konstantin Beznosov

context processor time virtually free human time/attention expensive commodity computing most cost-effective

target environments with 0.5M of commodity computing systems 0.5--1.5M application instances with MTTF of 1 year 1,300--4,000 fail every day with availability of 99.9% 500--1,500 unavailable at any given moment

request-response paradigm Application space Application Object Decision Function Enforcement Function “Middleware” Space Security Subsystem Enforcement Function Access Request

enables decision function reuse EF EF EF EF DF EF EF EF EF

results in point-to-point architectures EF EF EF EF policy engine EF EF policy engine EF policy engine policy engine EF policy engine EF EF fragile policy engine EF EF policy engine DF EF EF EF EF policy engine policy engine EF policy engine EF policy engine policy engine EF policy engine EF policy engine EF policy engine DF EF inefficient EF EF EF EF policy engine policy engine EF EF policy engine EF policy engine EF policy engine policy engine policy engine EF EF DF EF

the problem addressed point-to-point authorization architectures at massive scale become too fragile, requiring costly human attention, and fail to reduce latency by exploiting the virtually free CPU resources and high network bandwidth

Copyright © 2005 Konstantin Beznosov the approach Copyright © 2005 Konstantin Beznosov

ideas for addressing the problem decouple EF from DF with publish-subscribe architecture(s) recycle policy decisions

publish-subscribe for policy decisions policy engine policy engine policy engine policy engine policy engine policy engine policy engine DF policy engine policy engine Two-way request/response bus policy engine policy engine policy engine policy engine policy engine policy engine DF policy engine less fragile more resilient to failures allows speculative authorizations promotes authorization recycling policy engine policy engine policy engine policy engine policy engine policy engine DF

requests and authorizations request r = <s, o, p, e, i> s -- subject o -- object p -- permission e -- environment i -- request identity authorization a = <r, d> r -- request d -- decision

recycling authorizations secondary authorizations re-using decisions made for other, but equivalent, requests example <s1,o1, p1, e1, i1> <s1,o1, p1, e1, i2> approximate authorizations re-using decisions made for other, but similar, requests examples <s1,o1, p1, e1, i1> <s3,o1, p1, e1, i2> s1 ≥ s2 <s1,o1, p1, e1, i1> <s2,o2, p1, e1, i2> o1 ≤ o2 <s1,o1, p1, e1, i1> <s2,o1, p2, e1, i2> p1 ≤ p2

summary problem approach context and assumptions target environments human time/attention is too expensive CPU resources are virtually free commodity computing is most cost effective target environments massive-scale enterprises with 105 machines limitations of point-to-point architectures too fragile and high latency approach decouple EF and DF with publish-subscribe authorization (flooding and) recycling secondary and approximate authorization model (SAAM)