Working Set-Based Access Control for Network File Systems Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science.

Slides:



Advertisements
Similar presentations
Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Advertisements

Symantec 2010 Windows 7 Migration Global Results.
AGVISE Laboratories %Zone or Grid Samples – Northwood laboratory
Design and Evaluation of an Autonomic Workflow Engine Thomas Heinis, Cesare Pautasso, Gustavo Alsonso Dept. of Computer Science Swiss Federal Institute.
COMP 110: Introduction to Programming Tyler Johnson Feb 18, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Feb 25, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Mar 16, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 20, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 13, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson January 12, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Mar 25, 2009 MWF 11:00AM-12:15PM Sitterson 014.
COMP 110: Introduction to Programming Tyler Johnson Apr 27, 2009 MWF 11:00AM-12:15PM Sitterson 014.
Covert Barcodes handle on-the-spot Brand and Document Authentication Information Management Institute Conference on Security Printing 11/18/2009 Read what.
2010 Tax Class1 Day 3 Class Participation Class Exercise – Paul Austin Publ W Exercise page 98 Advanced Section.
Tax Year TYPES OF PAYMENTS 1040 PG 2 Line & 68 Federal income tax withheld from W-2s, 1099s Estimated payments & $ applied from prior year.
Process Description and Control
1
Processes and Operating Systems
Large Scale Integration of Senses for the Semantic Web Jorge Gracia, Mathieu dAquin, Eduardo Mena Computer Science and Systems Engineering Department (DIIS)
Towards Automating the Configuration of a Distributed Storage System Lauro B. Costa Matei Ripeanu {lauroc, NetSysLab University of British.
MobiClique: Middleware for Mobile Social Networking Anna-Kaisa Pietilainen (Thomson), with Earl Oliver (University of Waterloo), Jason LeBrun (UC Davis),
CALENDAR.
1 Chapter 12 File Management Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Photo Slideshow Instructions (delete before presenting or this page will show when slideshow loops) 1.Set PowerPoint to work in Outline. View/Normal click.
Distributed Information System December 7, 20091Alvin MACCHIONE - Rémy JAVELLE.
A Fractional Order (Proportional and Derivative) Motion Controller Design for A Class of Second-order Systems Center for Self-Organizing Intelligent.
Wouter Noordkamp The assessment of new platforms on operational performance and manning concepts.
Privately Querying Location-based Services with SybilQuery Pravin Shankar, Vinod Ganapathy, and Liviu Iftode Department of Computer Science Rutgers University.
Break Time Remaining 10:00.
The basics for simulations
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Ziehm Academy - User Guide for online registration portal Nuremberg, February 2009.
PP Test Review Sections 6-1 to 6-6
Automation Solutions for Ladle Gate Applications
Efficient Solutions For Water Supply Helix High-Pressure Vertical Multistage Pump.
Speed Limit Finder CS 410 Fall 2009 Personal Presentation September 21, 2009 Sept. 21,
1 Cathay Life Insurance Ltd. (Vietnam) 27/11/20091.
25 July, 2014 Hailiang Mei, TU/e Computer Science, System Architecture and Networking 1 Hailiang Mei Remote Terminal Management.
Operating Systems Operating Systems - Winter 2012 Chapter 2 - Processes Vrije Universiteit Amsterdam.
Operating Systems Operating Systems - Winter 2010 Chapter 3 – Input/Output Vrije Universiteit Amsterdam.
Dynamic Access Control the file server, reimagined Presented by Mark on twitter 1 contents copyright 2013 Mark Minasi.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Combining Thread Level Speculation, Helper Threads, and Runahead Execution Polychronis Xekalakis, Nikolas Ioannou and Marcelo Cintra University of Edinburgh.
ATUG Roundtable – November 2009 NBN Architecture Reference Model.
CSE 6007 Mobile Ad Hoc Wireless Networks
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
MaK_Full ahead loaded 1 Alarm Page Directory (F11)
1 Processes and Threads Chapter Processes 2.2 Threads 2.3 Interprocess communication 2.4 Classical IPC problems 2.5 Scheduling.
Artificial Intelligence
KAIST Computer Architecture Lab. The Effect of Multi-core on HPC Applications in Virtualized Systems Jaeung Han¹, Jeongseob Ahn¹, Changdae Kim¹, Youngjin.
Before Between After.
7/16/08 1 New Mexico’s Indicator-based Information System for Public Health Data (NM-IBIS) Community Health Assessment Training July 16, 2008.
Vault 9 Project Update 9 th September 2009 Paul Pointon – Site Project Delivery Manager LLW Repository Ltd.
: 3 00.
5 minutes.
30 min Scratch July min intro to Scratch A Quick-and-Dirty approach Leaving lots of exploration for the future. (5 hour lesson plan available)
Chapter 12 Working with Forms Principles of Web Design, 4 th Edition.
Clock will move after 1 minute
The DDS Benchmarking Environment James Edmondson Vanderbilt University Nashville, TN.
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Introduction Peter Dolog dolog [at] cs [dot] aau [dot] dk Intelligent Web and Information Systems September 9, 2010.
A Data Warehouse Mining Tool Stephen Turner Chris Frala
Flexible Scheduling of Software with Logical Execution Time Constraints* Stefan Resmerita and Patricia Derler University of Salzburg, Austria *UC Berkeley,
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
FileWall : Implementing File Access Policies Using Dynamic Access Context Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode DiscoLab Department of Computer.
Implementing Network File System Policies with FileWall Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode Department.
FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.
Presentation transcript:

Working Set-Based Access Control for Network File Systems Stephen Smaldone, Vinod Ganapathy, and Liviu Iftode DiscoLab - Department of Computer Science Rutgers, The State University of New Jersey { smaldone, vinodg, iftode

June 5, 2009SACMAT Mobile Access to Network File Systems Increasing Network File Servers Personal Device Corporate Intranet VPN Server Firewall Internet VPN File Accesses

June 5, 2009SACMAT The Working Set Concept The working set of a process is the collection of information referenced by the process during a time interval. [Denning 1968] –Temporal locality of a process memory accesses –Memory pages to keep resident in memory to optimize performance now and in the near future –Informs memory page replacement algorithms to avoid thrashing

June 5, 2009SACMAT WSBAC: Working Set-Based Access Control Setting –Trusted Devices vs. Untrusted Devices Applies the working set principle to network file system security (access control) –Learn working set during trusted accesses –Enforce working set during untrusted accesses

June 5, 2009SACMAT 20095Contributions Working Set-Based Access Control (WSBAC) –Novel access control technique that estimates per-user file access working sets and enforces during access from untrusted devices Prototype Implementation of WSBAC for Network File Systems –POLEX: Working set policy extraction –POLEN: Working set policy enforcement Evaluation using Real-World Network File System Traces –Experimental evaluation of WSBAC using real-world NFS traces, which suggests that WSBAC is feasible and highly-effective

June 5, 2009SACMAT 20096Outline Introduction WSBAC Architecture FileWall WSBAC Design and Implementation Evaluation and Results Related Work Conclusions and Future Work

June 5, 2009SACMAT WSBAC Architecture Overview POLEX POLEN File Server Untrusted Devices Working Sets Trusted Network Domain (Corporate Intranet) POLEN Vault Area Trusted Devices

June 5, 2009SACMAT Working Sets Switch POLEX: POLicy EXtraction for Network File Systems File Server Policy View Namespace (PVN) POLEX Administrator Trusted Devices

June 5, 2009SACMAT POLEN: POLicy ENforcement for Network File Systems Working Sets File Server POLEN Untrusted Devices Reliable Secondary Authentication Mechanism WSBAC Virtual Namespace POLEN Vault Area

June 5, 2009SACMAT Implementation using FileWall Network File Server FileWall Network File System Client Network File System Accesses Network File System Protocols –Composed of client/server messages –Requests sent by client –Responses sent by server FileWall: An NFS Middlebox –Interposed on client/server path –External to client/server path

June 5, 2009SACMAT FileWall Architecture FileWall: A Firewall for Network File System, S. Smaldone, A. Bohra, and L. Iftode. In the Proceedings of the 3rd IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC'07). Scheduler Forwarder Access Context FileWall Policy Request Handler File Server … FS Client Response Handler

June 5, 2009SACMAT The POLEX Implementation The POLEX Implementation Forwarder Access Context POLEX Extraction Handler Scheduler Network File System Stream Administrator View Handlers Working Set Summaries (Bloom Filters)

June 5, 2009SACMAT The POLEN Implementation Forwarder Access Context POLEN Enforcement Handler Scheduler Network File System Stream Speculation Handler File Server Client or Vault Area Working Set Summaries (Bloom Filters)

June 5, 2009SACMAT Outline Introduction WSBAC Architecture FileWall WSBAC Design and Implementation Evaluation and Results Related Work Conclusions

June 5, 2009SACMAT Evaluation Goals –What are the working set estimation costs (space and time)? –How accurate is working set estimation? –How time sensitive are working set estimates? –How much does speculation reconciliation impact users? –What are the network file system performance overheads? Setup –Systems: Dual 2.4 GHz CPUs, 3 GB RAM, Linux 2.6 –Perform offline analysis using Harvard File System Traces [Ellard03] –Custom NFS fine-grained file access generation utility –OpenSSH compilation as application performance benchmark

June 5, 2009SACMAT POLEX Time and Storage Requirements Size of TraceTime to AnalyzeState Size 1 Day (~3.3 GB - 6,308,023 Req/Res Pairs)52 min154MB 1 Hour (~140 MB - 262,834 Req/Res Pairs)2.49 min154MB

June 5, 2009SACMAT POLEX Accuracy Average Error RateOver-Estimation Rate Run 11.08%31.6% Run 20.76%41.2% Run 31.02%42.5% Run 40.79%36.5% Run 50.97%42.9% Average0.92%38.9%

June 5, 2009SACMAT POLEX Sensitivity Day 1Day 2Day 3Day 4Day 5 User 10.26%0.03%0.02%0.01% User 20.31%4.4%0.0%3.3%0.27% User 30.37%0.36%0.82%2.5%0.61% User 40.48%1.8%0.55%0.66%0.11% User 50.18%0.28%0.18%0.34%0.27% Average0.32%1.4%0.31%1.4%0.27%

June 5, 2009SACMAT Speculation Rates AverageMaxMin 1.4%2.4%0.028% AverageMaxMin 7 speculative rqst/day12 speculative rqst/day>1 speculative rqst/day For Heavy Users (~500 rqst/day):

June 5, 2009SACMAT POLEN Operating Costs

June 5, 2009SACMAT POLEN Application Performance

June 5, 2009SACMAT Related Work Policy Extraction and Inference –RBAC Role Mining [Kuhlmann03, Schlegelmilch05] –XACML AC Property Inference [Anderson04, Martin06] –Firewall Policy Inference [Golnabi06, Tongaonkar07] –Gray-Box Systems [Arpaci-Dusseau01] Context-Aware Access Control –Secure Collaborations in Mobile Computing [Toninelli06] –Ubiquitous Services [Corradi04, Yokotama06] –Ad-Hoc Networks [Saidane07] –Web Services [Bhatti05, Kapsalis06]

June 5, 2009SACMAT Conclusions and Future Work WSBAC: Working Set-Based Access Control for Network File Systems –Access control technique that estimates per-user working sets to formulate access control policy for accesses from untrusted devices –Prototype design and implementation of POLEX and POLEN –Experimental evaluation suggests that WSBAC is highly effective, exhibiting low error rates Future Work: Real-World Deployment and User Study –Study qualitative impact on users (usability) –Produce better network file system traces for future access control studies

Thank You!

June 5, 2009SACMAT What is a Network File System? Network File Server Network File System Client Network File System Accesses Network File System Protocols –Composed of client/server messages –Requests sent by client –Responses sent by server NFS (UNIX), CIFS/Samba (Windows), etc.

June 5, 2009SACMAT Policy View Namespace (PVN) PVN Root PVN1 Control Shadow Mirrored FS Namespace FILE METADATA EFFECTIVE AC Shadow File Contents Start / Stop Collection Modify Collection Parameters Modify View Parameters

June 5, 2009SACMAT Alices Working Set Accuracy: Errors and Over-Estimations What does over-estimation mean? Alices Working Set What does an error mean? X X X O O O