The role of trusted computing in Internet-scale DRM Geoffrey Strongin AMD Fellow Platform Security Architect

Slides:



Advertisements
Similar presentations
© ITU Telecommunication Development Bureau (BDT) – E-Strategy Unit.. Page - 1 Seminar on Standardization and ICT Development for the Information.
Advertisements

Federated Digital Rights Management Mairéad Martin The University of Tennessee TERENA General Assembly Meeting Prague, CZ October 24, 2002.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 32 Slide 1 Aspect-oriented Software Development.
Sponsored by the U.S. Department of Defense © 2005 by Carnegie Mellon University 1 Pittsburgh, PA Dennis Smith, David Carney and Ed Morris DEAS.
The ABA’s Digital Signature Guidelines: An Imperfect Solution to Digital Signatures on the Internet By: Edward D. Kania.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Minding Your Own Business The Platform for Privacy Preferences Project and Privacy Minder Lorrie Faith Cranor AT&T Labs-Research
Systems Engineering in a System of Systems Context
OASIS Reference Model for Service Oriented Architecture 1.0
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
On Privacy-aware Information Lifecycle Management (ILM) in Enterprises: Setting the Context Marco Casassa Mont Hewlett-Packard.
Building Enterprise Applications Using Visual Studio ®.NET Enterprise Architect.
Understanding Active Directory
UKOLN is supported by: OAI-ORE a perspective on compound information objects ( Defining Image Access.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Creating Architectural Descriptions. Outline Standardizing architectural descriptions: The IEEE has published, “Recommended Practice for Architectural.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Web Service Architecture Part I- Overview and Models (based on W3C Working Group Note Frank.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
SOA Reference Model Generic Presentation DRAFT: Not approved by the OASIS SOA RM TC.
Know More. Do More. Spend Less. January 24, 2006 Monica Loomis, Senior Sales Consultant Oracle Contract Management.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
XML AND THE LEGAL FOUNDATIONS FOR ELECTRONIC COMMERCE: Making XML Pay: Revising Existing Electronic Payments Law to Accommodate Innovation Copyright (c)
Clouds on IT horizon Faculty of Maritime Studies University of Rijeka Sanja Mohorovičić INFuture 2009, Zagreb, 5 November 2009.
Connect. Transact. Profit. Lessons Learned: 5 Reasons Cloud is CFO Friendly.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Legislation, Regulation, Guidelines
The XDI Graph: An Overview of the Proposed XDI Schema XDI TC Face-to-Face Meeting OASIS Symposium April 29, 2004 Drummond Reed CTO, Cordance Corporation.
EbXML Overview Dick Raman CEO - TIE Holding NV Chairman CEN/ISSS eBES Vice Chair EEMA and HoD in UN/CEFACT Former ebXML Steering Group.
Copyright 2006 Archistry Limited. All Rights Reserved. SOA Federated Identity Management How much do you really need? Andrew S. Townley Founder and Managing.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government.
[ §3 : 1 ] 2. Life-Cycle Perspective Overview 2.1 Motivation 2.2 Waterfall Model 2.3 Requirements in Context.
EMI INFSO-RI SA2 - Quality Assurance Alberto Aimar (CERN) SA2 Leader EMI First EC Review 22 June 2011, Brussels.
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Copyright © 2004 by The Web Services Interoperability Organization (WS-I). All Rights Reserved 1 Interoperability: Ensuring the Success of Web Services.
OASIS Week of ebXML Standards Webinars June 4 – June 7, 2007.
Interfacing Registry Systems December 2000.
Brian Matthews, DeFINE, Pisa 26/11/02 Trust and the Semantic Web Brian Matthews, Business & Information Technology Dept, CLRC
PKI Survey Chet Ensign OASIS Individual Member Chet Ensign OASIS Individual Member Study on the Use of PKI in OASIS Standards March 26th, 2008.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Organizational and Legal Issues -- Developing organization and governance models for HIE Day 2 -Track 5 – SECOND SESSION – PRIVACY AND SECURITY CONNECTING.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
Grid Middleware Tutorial / Grid Technologies IntroSlide 1 /14 Grid Technologies Intro Ivan Degtyarenko ivan.degtyarenko dog csc dot fi CSC – The Finnish.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
TRUST, Washington, D.C. Meeting January 9–10, 2006 The TRUST Agenda: Convergence of Technical and Policy Issues Fred B. Schneider Chief Scientist.
16/11/ Semantic Web Services Language Requirements Presenter: Emilia Cimpian
1 Web Services Policy Management Greg Pavlik Web Services Architect Oracle Corporation May 11, 2005.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Chapter6: E-Commerce Web Sites HNDIT11062 – Web Development 1.
Shibboleth & Federated Identity A Change of Mindset University of Texas Health Science Center at Houston Barry Ribbeck
© Drexel University Software Engineering Research Group (SERG) 1 The OASIS SOA Reference Model Brian Mitchell.
What’s Happening at Internet2 Renee Woodten Frost Associate Director Middleware and Security 8 March 2005.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
The Semantic Web. What is the Semantic Web? The Semantic Web is an extension of the current Web in which information is given well-defined meaning, enabling.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
 Copyright 2005 Digital Enterprise Research Institute. All rights reserved. SOA-RM Overview and relation with SEE Adrian Mocan
Building Enterprise Applications Using Visual Studio®
CompSci 280 S Introduction to Software Development
2nd GEO Data Providers workshop (20-21 April 2017, Florence, Italy)
Chapter 5 – Requirements Engineering
Chapter 18 MobileApp Design
UNIT 13: FINANCIAL REPORTING
Internet Interconnection
Legislation, Regulation, Guidelines
WIS Strategy – WIS 2.0 Submitted by: Matteo Dell’Acqua(CBS) (Doc 5b)
Introduction to Cloud Computing
InfiNET Solutions 5/21/
Presentation transcript:

The role of trusted computing in Internet-scale DRM Geoffrey Strongin AMD Fellow Platform Security Architect

2 Overview of this talk Personal background Brief introduction of XRI and XDI XDI link contracts Standardized contracts Trusted computing and barriers to trusted computing Trusted computing and link contracts How Internet-scale DRM may evolve

3 Personal background ISTPA – Privacy Framework XNS  XRI, XDI Trusted Computing Group AMD’s Presidio Technology DRM has been a controversial topic in Trusted Computing circles but … a rising tide lifts all boats. DRM is a big boat! Important Data - policy binding work Bringing Trusted Computing to the PC

4 Introduction of XRI and XDI Both XRI and XDI trace back to XNS XRI (eXtensible Resource Identifier) XRI: A URI compatible scheme for abstract identifiers with lots of 3 rd generation features –XRI is being developed at OASIS (XRI TC)  See  XDI (XRI Data Interchange)  XDI: is a general extensible service for sharing, linking, and synchronizing data over the internet using XRI’s and XML documents

5 The primary goals of XDI To develop a standardized data interchange schema and protocol based on Extensible Resource Identifiers (XRIs) and XML  This format can do for machine-readable data what HTML did for human-readable content To enable “link contracts” – machine-readable data sharing agreements that bind shared data to policies governing its use  Not immediatly a “standarized” DRM, but the plumbing for “general purpose” DRM

6 The XDI “Dataweb” model Applies the Web model to machine-readable data sharing  XDI documents are XRI-addressable the same way HTML documents are URI-addressable  URI addressing/linking goes down only to the document fragment level; XRI addressing/linking goes all the way down to the atomic element level  XDI addressing can reference and link elements across XDI documents just like HTML hyperlinks  XDI addressing also supports persistent XRIs, so all nodes can be persistently referenced

7 Core Dataweb Concept

8 XDI link contracts A link contract is an XDI document governing an XDI data sharing relationship between two XDI data authorities  It “binds” XRI-addressable data to XRI-addressable policies governing its use Link contracts can cover any type of XDI data (including other link contracts) Link contracts can associate any type of data sharing policy

9 Link contracts can include policies for: Identification Authentication Authorization and access control Privacy and usage control Synchronization Termination Recourse

10 Policy elements Every policy referenced by a link contract has its own XRI (or set of XRI synonyms) The policy itself need not be an XDI document; it might be:  Human-readable text document (e.g., Creative Commons licenses,  A document in machine-readable policy expression language (XACML, WS-Policy, etc.)  Any other XRI-addressable resource to which the parties can agree

11 Meaningful link contracts Unless the party relying on a link contract can reasonably expect the referenced policy to be honored it is valueless  There are already lots of “implied” and “explicit” contracts that operate within the Internet –Many have marginal value since enforcement can be difficult  click-through licensees are enforceable under specific conditions, but the overall story is murky and varies from one polity to another –Policy-containing contracts are not often bound to the data exchanged in a persistent way  XDI helps with some of these issues and trusted computing can help with enforcement –Enforcement from trusted computing implies a policy engine capable of enforcement

12 Standardized link contracts (referenced policies) Custom contracts are possible with XDI but like all custom legal work they will be expensive  Enforceability is at least a question  Real computer-to-computer negotiation of such contracts remains a challenge  In brief, this won’t scale The use of standardized and pro forma contracts appears to be the way to scale the use of link-contracts The Internet has already spawned lots of standard contracts that are widely referenced  The most obvious example of this are open source licenses XDI will likely spawn a whole range of new standardized contracts that will come into broad usage  The availability of a pool of such contracts will enable “automatic” contract negotiation where parties are able to identify acceptable contracts in advance

13 What is “Trusted Computing” A simplified definition of trusted or trustworthy computing: The combination of:  A self protecting trusted computing base (TCB)  Reliable measurement agents  Reliable attestation or reporting capability The foundation blocks for this are in place today, and we are waiting for the whole structure to be built  Some of the reasons that this is slow to emerge are worth noting…

14 Barriers to the adoption of trusted computing are falling (if slowly!)  Cost – no longer a significant barrier  Availability of the building blocks – mostly solved now –Software TCB elements lagging  Secure Hypervisors and –Credentials still lagging (a chicken and egg game)  Ease of use  Liability issues  Scalability (surprise!)– why we are here  Clear understanding of delivered value

15 Ease of use as a barrier Attestation information as originally defined by TCG is difficult to consume  The abstraction level of the elements in the “stored measurement log” has to be raised –The hashes of software objects are “brittle”  More fundamentally – identification and validation don’t directly predict behavior –Attestation needs to move beyond “code signatures” into the behavioral (semantic) realm  We need a standardized language or metrics to express the intersection of the robustness of implementation of a TCB in a platform and the nature of the policies enforced by the TCB  Common Criteria can address the former (at high cost)  We are still lacking a good solution for the latter We need the equivilent of a credit score for trustworthy platforms

16 Liability issues as a barrier Bad things happen! No one wants to be left holding the bag when they do Providing attestation data, credentials and other infrastructure components that support trusted computing could result in increased liability on the part of the “supply chain” providers We may need regulatory relief to foster the growth of trusted computing (PKI) We may also be able to manage the risk by using XDI link contracts within the attestation infrastructure to establish and allocate liability

17 XDI and trusted computing XDI benefits from trusted computing: Policy enforcement Authentication Non repudiation Trusted Computing benefits from XDI: Establishes value in attestation XDI plumbing for attestation information with “liability” management Revocation push/pull

18 Trusted computing as part of the link contract Attestation of the recipients computing environment and DRM engine can be a data-exchange prerequisite  DRM systems are based on the assumption that the DRM engine has not been hacked  Reliable assessment of the enforcement capabilities of remote platforms becomes possible with trusted computing technology  Participation remains voluntary, but there are public policy implications as this becomes ubiquitous –Powerful tools can always be misused –The link-contracts can work both ways  Assessment for the data provider, and limitations on the use of the attestation information for the data recipient –Privacy principles can become part of the lexicon of standardized link contracts where law and regulation don’t suffice

19 Link contracts and trusted computing Some of the factors that come into play:  The level of knowledge about the other party  The value of the transaction  The level of automation involved –How much direct human involvement is present? –Already a factor in lots of transactions (funny text tests) Tools outside of trusted computing that enable data interchange  Reputation services (expected XDI global services)  Law and policy context  Insurance and recourse

20 How Internet scale DRM may evolve A little prognostication… Initial use of XDI will have to depend on established trust relationships  Most data today flows using this kind of model –Consumer “knows” provider –Commercial partners “know” each other  Standardized link contracts will be developed to serve the existing models of data exchange As XDI evolves it will start to leverage trusted computing where it does exist –This will open the door to some more spontaneous data sharing and will in turn help validate the benefits of trusted computing Over time a virtuous cycle may emerge where XDI link contracts increasingly use trusted computing and where trusted computing relies more and more on XDI

21 Our challenge Break down the remaining barriers to trusted computing adoption  Foster the development and deployment of the technology building blocks (if we build it…)  Focus significant corporate and academic resources on the “ease of use” problem My request: Keep an eye on XRI and XDI as they develop Share your critical views on this work with the OASIS XRI and XDI TC’s My hope is that you will leverage these technologies to foster the scale-out of trusted computing

22 Links for more information on XDI Google for the XDI FAQ