A Security Architecture Based on Trust Management for Pervasive Computing Systems Lalana Kagal, Jeffrey Undercoffer, Filip Perich, Anupam Joshi, Tim Finin.

Slides:



Advertisements
Similar presentations
ROWLBAC – Representing Role Based Access Control in OWL
Advertisements

0 McLean, VA August 8, 2006 SOA, Semantics and Security.
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Lecture 23 Internet Authentication Applications
Public Key Infrastructure Ben Sangster February 23, 2006.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
WAP Public Key Infrastructure CSCI – Independent Study Fall 2002 Jaleel Syed Presentation No 5.
Sentry: A Scalable Solution Margie Cashwell Senior Sales Engineer Sept 2000 Margie Cashwell Senior Sales Engineer
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Web Services Security Multimedia Information Engineering Lab. Yoon-Sik Yoo.
W3C Finland Seminar: Semantic Web & Web Services© Kimmo RaatikainenMay 6, 2003 XML in Wireless World Kimmo Raatikainen University of Helsinki, Department.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
CN1276 Server Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Copyright, 1996 © Dale Carnegie & Associates, Inc. Digital Certificates Presented by Sunit Chauhan.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation Mike Smorul, Joseph JaJa, Yang Wang, and Fritz McCall.
Security Management.
Distributed Computer Security 8.2 Discretionary Access Control Models - Sai Phalgun Tatavarthy.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CORDRA Philip V.W. Dodds March The “Problem Space” The SCORM framework specifies how to develop and deploy content objects that can be shared and.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Public Key Infrastructure from the Most Trusted Name in e-Security.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
©Copyrights 2011 Eom, Hyeonsang All Rights Reserved Distributed Information Processing 20 th Lecture Eom, Hyeonsang ( 엄현상 ) Department of Computer Science.
ECE454/599 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2012.
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Software Architecture Framework for Ubiquitous Computing Divya ChanneGowda Athrey Joshi.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
SECURITY MANAGEMENT Key Management in the case of public-key cryptosystems, we assumed that a sender of a message had the public key of the receiver at.
SAML CCOW Work Item HL7 Working Group Meeting San Antonio - January 2008 Presented by: David Staggs, JD CISSP VHA Office of Information Standards.
SWIM-SUIT Information Models & Services
CERTIFICATES. What is a Digital Certificate? Electronic counterpart to a drive licenses or a passport. Enable individuals and organizations to secure.
Module 9: Fundamentals of Securing Network Communication.
1 Schema Registries Steven Hughes, Lou Reich, Dan Crichton NASA 21 October 2015.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
Integrating security services with the automatic processing of content TERENA 2001 Antalya, May 2001 Francesco Gennai, Marina Buzzi Istituto.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
A Policy Based Approach to Security for the Semantic Web Lalana Kagal, Tim Finin and Anupam Joshi.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Creating and Managing Digital Certificates Chapter Eleven.
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Task Force CoRD Meeting / XML Security for Statistical Data Exchange Gregory Farmakis Agilis SA.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
NSF Cyber Trust Annual Principal Investigator Meeting September 2005 Newport Beach, California UMBC an Honors University in Maryland Trust and Security.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Chapter 4 Access Control. Access Control Principles RFC 4949 defines computer security as: “Measures that implement and assure security services in a.
Configuring and Troubleshooting Routing and Remote Access
نمايش زمينه توسط وب معنايي براي محيط‌هاي محاسبات فراگير
Public Key Infrastructure from the Most Trusted Name in e-Security
Presentation transcript:

A Security Architecture Based on Trust Management for Pervasive Computing Systems Lalana Kagal, Jeffrey Undercoffer, Filip Perich, Anupam Joshi, Tim Finin Computer Science and Electrical Engineering Department University of Baltimore County

Ordinary Computing and Pervasive Computing! What is pervasive computing? Solution based on distributed trust management – create security policies, assign credentials, revoking it and even reasoning them. Solution complements PKI and RBAC. Smart Spaces – NIST Sponsored Project. Many other attempts were already made but none used distributed trust as a way to secure the system and the policies. Attempts : 1. Smart Homes by Unisys ( uses WAP and PDA ), 2. Centaurus infrastructure system, 3. UCB’s Ninja and its problem 4. Policy Maker The proposed solution drew good points from all the above systems and uses PKI to enforce policies and security features. INTRODUCTION

Policy in this context contains what? Or what exactly does it mean about rules and rights? What do they actually propose or what does it have? Vigil is the proposed system. Can be used in wireless and wired – main point is that security has to be dynamic. Vigil uses PKI and RBAC – but not totally like RBAC which uses only role heirarchies. Uses its own set of properties and constraints expressed in a XML based language. There are six components : Service Manager, Communication Manager, Certificate, Controller, Security Agent, Role Assignment Manager, and Clients (users and services). Service Manager – broker between clients and services. Communication Manager – communication gateway between the service managers and the different spaces.

Certificate Controller - responsible for generating x.509 digital certificates [5] for entities in the system and for responding to certificate validation queries. Role Assignment Manager maintains a role list for known entities in the system and a set of rules for role assignment. It responds to initial requests for role assignment in a particular Space. Security Agent, manages the trust in the Space, receives information about new access rights that are conferred on a user and rights that are revoked, and reasons about the current rights of a user. Clients – services and users. All messages between the various entities in the Vigil system are in Centaurus Capability Markup Language.

Service Manager The Service Manager acts as a mediator between the Services and the users. All clients of the system, whether they are services or users, have to register with a Service Manager in the SmartSpace. The Service Manager is responsible for processing Client Registration/De- Registration requests, responding to registered Client requests for a listing of available services, for brokering Subscribe/Un-Subscribe and Command requests from users to services, and for sending service updates to all subscribed users whenever the state of a particular service is modified. Service Managers are arranged in a tree like hierarchy and messages are routed through to other SM’s through this tree. This tree like structure forms the core of the vigil system. Each client establishes trust with its SM, and SM’s across the hierarchy establish trust among them, hence trust now is a concept that is transparent between all clients in the system.

CLIENT During registration, the client transmits its digital certificate, a list of roles which can access it. Client Flag – Visibility Concept. A service can inform SM about the requested security level. The SM updates its knowledge by querying the Security Agent. The client and SM exchange certificates with the SA as the coordinator, and hence a trust web is formed. Client then gets roles and associated rights from the RAM and receives a list of services that it can access. Client requests for service from another space through the SM, which in turn receives help from the SA.

CERTIFICATE CONTROLLER To get a certificate, an entity sends a certificate request to the Certificate Controller. The entity is sent back a x.509 certificate, signed by the Certificate Controller and the Certificate Controller’s self signed certificate, which is used to validate other entities’ certificates. These certificates are stored and protected on a client’s smartcard. An entity could enter a Space with a certificate from another Certificate Authority. ROLE ASSIGNMENT MANAGER The Role Assignment Manager maintains a list of roles associating entities with roles, and a set of rules for role assignment. These rules specify the credentials required to be in a certain role. When queried with the certificate of an entity, the Role Assignment Manager checks the access control list and the rules for assignment to find the roles of the entity. An entity could have more than one role at a time. For example, an entity could be both a graduate student and a research assistant. The role of an entity could change over time. Its access rights could also change without any change in role through the delegations of rights.

When the Role Assignment Manager is initialized, it reads its x.509 digital certificate and its PKCS#11 [11] wrapped private key from a secure file and stores it into local memory. It also reads and indexes the ACL file, which contains the roles of all entities within the system, and stores the time stamp of the file. When the Role Assignment Manager receives a query for an entity’s role, it compares the current time stamp on the capability file with the time stamp of the last file read, if they are not equal it re-reads the ACL file. This feature allows roles of entities to change continuously and dynamically. SECURITY AGENT The Security Agent uses a knowledge base and sophisticated reasoning techniques for security. On initialization, it reads the policy and stores it in a Prolog knowledge base. All requests are translated into Prolog, and the knowledge base is queried. The policy contains permissions which are access rights associated with roles, and prohibitions which are interpreted as negative access rights. A positive or negative result is produced.

When a user needs to access a service that it does not have the right to access, it requests another user, who has the right, or the service itself, for the permission to access the Service. If the entity requested does have the permission to delegate the access to the Service, the entity sends a delegate message, signed by its own private key, along with its certificate, to the Security Agent and the requester. The Security Agent checks the roles of the delegator and the delegatee and ensures that the delegator has the right to delegate, and that the delegation follows the security policy. A user can also revoke rights that it has delegated by sending the appropriate message to the Security Agent. The Security Agent removes the permission for the delegated entity, and when a Service Manager asks about the delegated entity, it is informed of the revoked right. This causes revocations to progress rapidly through the system.

SIMPLIFIED PKI In a PKI system, certificates are made available in an on-line repository. Consequently, when a user needs an entity’s digital certificate it can be retrieved from such a repository and is valid as long as the certificate chain to the top level CA is verifiable. Similarly, in a typical PKI, the Certificate Authority also provides an on-line Certificate Revocation List (CRL). On registration, all entities have to send their certificate to the Security Agent, which sends back its own certificate. They can verify the exchanged certificates themselves or send it to the local Certificate Controller. In a similar manner, communication between any two entities in Vigil can be handled securely, by attaching their certificates to the initial message.

REFERENCES [1] DAML specification. [2] Orange and Unisys build the house that listens. [3] George Candea and Armando Fox. Using Dynamic Mediation to Integrate COTS Entities in a Ubiquitous Computing Environment. In Second International Symposium on Handheld and Ubiquitous Computing 2000, [4] Mike Esler, Jeffrey Hightower, Tom Anderson, and Gaetano Borriello. Next Century Challenges: Data-Centric Networking for Invisible Computing. In Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom-99), [5] The Internet Engineering Task Force. Public-Key Infrastructure (X.509) (pkix) [6] Ian Goldberg, Steven D. Gribble, David Wagner, and Eric A. Brewer. The Ninja Jukebox. In Proceedings of the 2 nd USENIX Symposium on Internet Technologies and Systems (USITS-99), [7] Steven D. Gribble et al. The Ninja architecture for robust Internet-scale systems and services. Computer Networks (Amsterdam, Netherlands: 1999), [

8] IETF. Simple Public Key Infrastructure (spki) Charter. [9] Lalana Kagal, Tim Finin, and Yun Peng. A Framework for Distributed Trust Management. In Proceedings of IJCAI-01 Workshop on Autonomy, Delegation and Control, [10] Lalana Kagal, Vladimir Korolev, Sasikanth Avancha, Anupam Joshi, Timothy Finin, and Yelena Yesha. Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing. To appear in ACM Wireless Networks (WINET) journal, [11] RSA Laboratories. PKCS 11-Cryptographic Token Interface Standard [12] E. Lupu and M. Sloman. A Policy Based Role Object Model. 1st IEEE International Enterprise Distributed Object Computing Workshop (EDOC’97), [13] M.Blaze, J.Feigenbaum, and J.Lacy. Decentralized trust management. IEEE Proceedings of the 17th Symposium, [14] W. Polk D. Solo R. Housley, W. Ford. RFC 2459 Internet X.509 Public Key Infrastructure Certificate and CRL Profile

[15] RDF. Resource Description Framework (RDF) Schema Specification. W3C Proposed Recommendation, March 1999, [16] Jefferey Undercoffer, Andrej Cedilnik, Filip Perich, Lalana Kagal, and Anupam Joshi. A Secure Infrastructure for Service Discovery and Management in Pervasive Computing. ACM MONET : The Journal of Special Issues on Mobility of Systems, Users, Data and Computing, [17] W3C. Extensible Markup Language. [18] Philip R. Zimmermann. The Official PGP User’s Guide. MIT Press, Cambridge, MA, USA, 1995.