Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.

Slides:



Advertisements
Similar presentations
Secure Naming structure and p2p application interaction IETF - PPSP WG July 2010 Christian Dannewitz, Teemu Rautio and Ove Strandberg.
Advertisements

Internet Protocol Security (IP Sec)
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Global MP3 Geoffrey Beers Deborah Ford Mike Quinn Mark Ridao.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
Vpn-info.com.
Hardware Cryptographic Coprocessor Peter R. Wihl Security in Software.
Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
SIM403. Claims Provider Trust Relying Party x Relying Party Trust Claims Provider Trust Your ADFS STS Partner ADFS STS & IP Relying Party Trust Partner.
1 Jeremy Wyant W3C DRM Workshop 23 January 2001 Establishing Security Requirements For DRM Enabled Systems.
Building and Deploying Safe and Secure Android Apps for Enterprise Presented by Technology Consulting Group at Endeavour Software Technologies.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Using Digital Credentials On The World-Wide Web M. Winslett.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Andrew Schroeder Networking Aspects of Cloud Computing.
outline Purpose Design Implementation Market Conclusion presentation Outline.
Cloud Usability Framework
Mobile Data Sharing over Cloud Group No. 8 - Akshay Kantak - Swapnil Chavan - Harish Singh.
SIM402. Kerberos, NTLM, Basic, Digest, Forms?
Slingshot: Deploying Stateful Services in Wireless Hotspots Ya-Yunn Su Jason Flinn University of Michigan.
Energy Efficiency and Storage Flexibility in the Blue File System Edmund B Nightingale Jason Flinn University of Michigan.
Microsoft ® Official Course Module 9 Configuring Applications.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
A Security-Aware Routing Protocol for Wireless Ad Hoc Networks
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Data Staging on Untrusted Surrogates Jason Flinn Shafeeq Sinnamohideen Niraj Tolia Mahadev Satyanarayanan Intel Research Pittsburgh, University of Michigan,
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Lecture 10 Single Sign-On systems. What is Single Sign-on? Lets users authenticate themselves once and access different applications without re-authentication.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Agenda Introduction. Design. Trust and Threat Model. Key-Encrypting Keys. Token Vulnerabilities. Token-Laptop Interaction. Assigning File keys & Handling.
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Security Protection on Trust Delegated Medical Data in Public Mobile Networks Dasun Weerasinghe, Muttukrishnan Rajarajan and Veselin Rakocevic Mobile Networks.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
AVL Automatic Vehicle Locating Presented by WTH Technology, Inc.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
FRAC: Implementing Role-Based Access Control for Network File Systems Aniruddha Bohra, Stephen Smaldone, and Liviu Iftode Department of Computer Science.
Olga Ratsimor Vladimir Korolev Anupam Joshi Timothy Finin Department of Computer Science and Electrical Engineering University of Maryland Baltimore County.
EnsemBlue: Integrating Distributed Storage and Consumer Electronics Daniel Peek and Jason Flinn University of Michigan.
Data Integrity Proofs in Cloud Storage Author: Sravan Kumar R and Ashutosh Saxena. Source: The Third International Conference on Communication Systems.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
György Kálmán, Josef Noll Mobile and Wireless Communications Summit, th IST 1-5, July 2007 Speaker : 黃韋綸 Right Management Infrastructure for Home.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
CMSC 818J: Privacy enhancing technologies Lecture 2.
Presented by Edith Ngai MPhil Term 3 Presentation
Hardware-rooted Trust for Secure Key Management & Transient Trust
Enterprise Town Hall solution
NETWORK SECURITY Cryptography By: Abdulmalik Kohaji.
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Hardware Cryptographic Coprocessor
Slingshot: Deploying Stateful Services in Wireless Hotspots
Outline What does the OS protect? Authentication for operating systems
Security in SDR & cognitive radio
Presentation transcript:

Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan

2 Accessing protected content is hard! Many opportunities to use ad hoc clients –Client I don’t own or regularly use –Play my songs at a friend’s party To access content from an ad hoc client, I –locate content –fetch content –DRM: do I trust the ad hoc client? Simplify access without sacrificing security

University of Michigan3

4 What makes protected content special? User goal –Display content to friends and family –Pervasive – access content anytime, anywhere! Provider goal –Restrict access to paying users Users and content providers have opposing goals!

University of Michigan5 Problem with current systems Provider authorizes clients for playback Model breaks down for ad hoc clients –User: privacy loss, login credential abuse –Provider: revocation, impersonation Provider

University of Michigan6 What should we authorize instead? Provider should authorize people not clients Hard: how can we detect and authorize people? –Leverage small, personal mobile devices: cell, PDA Provider

University of Michigan7 Provider Cobalt: proximity-based access Physical proximity-based access: client on wireless network –We build on ideas introduced in ZIA [Corner ‘02] Challenge/response heartbeat ensures proximity When user departs, playback stops

University of Michigan8 Cobalt goals Better usability Improved privacy Improved content protection

University of Michigan9 Separate distribution from authorization User goal: pervasive access to content –Store content in distributed storage Provider goal: Restrict access to paying users –Encrypt content –Release key to phone –Playback requires phone Separate distribution & authorization channels

University of Michigan10 Store content in distributed storage Implemented on Blue File System –Ensemblue [Peek ‘06] Usable with other distributed storage BlueFS Server

University of Michigan11 Cobalt trust model What does the provider need to trust? –User’s cell phone and the ad hoc media player Rely on Trusted Computing to verify trust

University of Michigan12 Trusted Platform Module (TPM) Tamper resistant chip w/ crypto support Software attestation –Signed hash of loaded software –Verify against policy Sealed storage –Protects data –Detect tampering Entities can leverage TPM to verify client

University of Michigan13 Outline Motivation Background Implementation Evaluation Conclusion

University of Michigan14 Implementation Acquisition –Provider sends encrypted content to user –Phone approved as a proxy after verification Playback –Media player discovery –Provide access to selected content –Phone authorizes player after verification

University of Michigan15 Content Acquisition Provider BlueFS Server Content Request Policy H{Policy} Phone delegated authorization responsibility

University of Michigan16 File system layout Policy stored separately Encrypted with content key Encrypted with Phone’s KEK

University of Michigan17 Restrict playback to trusted clients Verify media player before sharing content Media Player 2 Media Player 1

University of Michigan18 Provide access to selected content Improve usability: semantically specify content Query result updated dynamically as content changes Phone restricts playback to specified content BlueFS Server Query: *.mp3 Song_1.mp3 Song_2.mp3 … Media Player 1 Song_1.mp3 Song_2.mp3 … BlueFS IP address

University of Michigan19 H{Policy} Playback Authorization succeeds if phone is in proximity Policy match ensures player won’t leak content Song_1.mp3 Song_2.mp3 … Media Player 1 BlueFS Server BlueFS IP address Policy H{Policy} Policy

University of Michigan20 Outline Motivation Background Implementation Evaluation Conclusion

University of Michigan21 Evaluation goals Overhead of Cobalt for content acquisition Overhead of Cobalt for content playback Can Cobalt enable new applications?

University of Michigan22 Evaluation setup Token: Motorola E680i cell phone BlueFS server: Dell GX620 desktop Acquisition –Provider: IBM X40 laptop Playback –Ad hoc client: IBM X40 laptop

University of Michigan23 Content acquisition time 10.1 seconds to acquire 1.8MB mp3 Cobalt adds less than 9 seconds of overhead –STS on cell phone: 7.56sec, laptop: 0.51sec

University of Michigan24 Playback startup time One time cost: 12.4 seconds Query creation, path resolution: 4sec (1500 mp3s)

University of Michigan25 Context-sensitive: adaptive playlist Cobalt enables new context-sensitive apps Playlist adapts as users leave player’s vicinity 1500 mp3s, 650 matches: adds 1 second Media Player Song_2.mp3 Song_3.mp3 Song_4.mp3 Song_1.mp3 Song_2.mp3 Song_3.mp3 Adaptive Playlist Song_2.mp3 Song_3.mp3

University of Michigan26 Conclusion Cobalt: authorize people not clients –Better usability –Improved privacy –Improved content protection Reasonable overhead Enables new applications Questions?