Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman.

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Chapter 11: Cryptography
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Lecture 2: Security Rachana Ananthakrishnan Argonne National Lab.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Lecture 23 Internet Authentication Applications
Grid Security. Typical Grid Scenario Users Resources.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Lesson 12 Cryptography for E-Commerce. Approaches to Network Security Separate Security Protocol--SSL Application-Specific Security--SHTTP Security with.
Mar 12, 2002Mårten Trolin1 This lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities SSL/TLS.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Principles of Information Security, 2nd edition1 Cryptography.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
 Authorization via symmetric crypto  Key exchange o Using asymmetric crypto o Using symmetric crypto with KDC  KDC shares a key with every participant.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
8-1 What is network security? Confidentiality: only sender, intended receiver should “understand” message contents m sender encrypts message m receiver.
Cryptographic Technologies
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Part Two Network Security Applications Chapter 4 Key Distribution and User Authentication.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Security Issues in Grid Computing Presented by: Nisarg Gandhi Aritra Mukherjee Anirudh Sethi.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
HPC lab Current Practices on Security Technologies Clifford Neuman Book chapter 16(Security, Accounting, and Assurance in “The GRID: Blueprint for.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Chapter 21 Distributed System Security Copyright © 2008.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Chapter 8 – Network Security Two main topics Cryptographic algorithms and mechanisms Firewalls Chapter may be hard to understand if you don’t have some.
CS 4244: Internet Programming Security 1.0. Introduction Client identification and cookies Basic Authentication Digest Authentication Secure HTTP.
Security, Accounting, and Assurance Mahdi N. Bojnordi 2004
Security Many secure IT systems are like a house with a locked front door but with a side window open -somebody.
1 Normal executable Infected executable Sequence of program instructions Entry Original program Entry Jump Replication and payload Viruses.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Computer and Network Security - Message Digests, Kerberos, PKI –
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
1 Grid School Module 4: Grid Security. 2 Typical Grid Scenario Users Resources.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
1 Authentication Celia Li Computer Science and Engineering York University.
1 Network Security. 2 Security Services Confidentiality: protection of any information from being exposed to unintended entities. –Information content.
Web Applications Security Cryptography 1
Grid Security.
Computer Communication & Networks
Presentation transcript:

Security Issues in Grid Computing Reading: Grid Book, Chapter 16: “Security, Accounting and Assurance” By Clifford Neuman

Security Issues Traditional systems: l Protect a system from its users l Protect data of one user from compromise In Grid systems: l Protect applications and data from system where computation executes l Stronger authentication needed (for users and code) l Protect local execution from remote systems l Different admin domains/security policies

Organization l Authentication  Password-based  Kerberos authentication  SSL authentication  Certification authorities l Authorization l Integrity and Confidentiality  Symmetric and asymmetric cryptography  PGP (Pretty Good Privacy)  SSL

Organization (cont.) l More Security Issues  Assurance  Accounting  Audit l More Security Technologies  IPSec and IPv6  VPN (Virtual Private Networks)  Firewalls  GSS-API

Authentication l Process of verifying identity of a participant to an operation or request l Principal: entity whose identity is verified  local user OR user logged into remote system l Traditional systems: authenticate client to protect server l Grid systems: mutual authentication required  Ensure that resources and data not provided by an attacker

Authentication Methods: Password-based Authentication l Send unencrypted passwords: only suitable when messages can’t be read by untrusted processes while on network l Instead: Prove knowledge of a password:  Don’t send password over network  Use password as an encryption key  Encrypt a known but non-repeating value  Send encrypted value to party verifying authentication  Both parties must know password or trust a third-party to distribute it

Authentication Systems: Kerberos l Authentication and key distribution protocol  Used with symmetric encryption systems (both sides must share same key)  Better performance than systems using public key or asymmetric cryptography l Well-suited to frequent authentication l Centrally administered l Requires trusted, on-line certification authority: Key Distribution Center (KDC)

Using Kerberos to authenticate a client and a server 1. Each client and server register their keys in advance with Kerberos authentication server 2. Client wants to communicate with service provider: sends client and service provider names to Kerberos authentication server 3. Kerberos server randomly generates a session key that will be used for symmetric encryption between client and server 4. Kerberos server sends session key to client as well as a ticket that contains client’s name and session key, all encrypted with server’s key

Kerberos Authentication (cont.) 5. Client caches encrypted session key and ticket, which are valid for some period  Reduces number of authentication requests to server 6. Client forwards ticket to service provider AND sends server a timestamp encrypted using the session key 7. Server decrypts ticket and extracts session key 8. Server uses session key to decrypt timestamp and checks that timestamp is recent 9. If client needs to authenticate server, server encrypts the timestamp with the session key and sends it back to client

Authentication Systems: Secure Sockets Layer (SSL) l Widely-deployed: every web browser! l Client authenticates identity of the server l Send a session key from client to server to set up an encrypted communication l Server has a certificate that contains its public key l If client has a certificate, can authenticate itself to the server

Using SSL to authenticate a server 1. Client web browser with SSL contacts web server with SSL 2. Server sends public-key certificate to client 3. Client uses public key of a trusted Certificate Authority (CA) to verify server’s certificate is valid 4. Client verifies that hostname embedded in certificate is hostname of intended server 5. Client extracts server’s public key from certificate 6. Client uses server’s public key to encrypt a session key for a symmetric cryptosystem 7. Client sends encrypted session key to server 8. Server uses its private key to decrypt session key 9. Client and server communicate using symmetric cryptosystem with session key

Certificates and Certification Authorities (CA) l Certification mechanism provides binding between encryption key and authenticated identity l Certification authority (CA) is a third party that certifies or validates the binding l CA issues a certificate and signs it l Certificate is a data object that contains:  Distinguished name of a principal  In asymmetric cryptographic systems: the public key of the principal  Optional attributes: authorizations, group memeberships, addresses, alternate names

Certification (cont.) l X.509 certificates:most widely used format  Web browsers  Secure services  Public-key-based electronic payment systems l Validating the binding  Verifier must know the CA’s public key  Uses CA’s public key to validate CA’s signature l Hierarchy of CAs: each CA certified by higher-level CA except for root CA(s) l Applications and servers must know public key of trusted root CAs

Data Origin Authentication l Provides assurance that a particular message, data item or executable originated with a particular principal  Determines whether program was modified or sent by attacker

Delegation of Identity l Process that grants one principal the authority to act as another individual l Assume another’s identity to perform certain functions l E.g., in Globus: use the gridmap file on a particular resource to map authenticated user onto another’s account, with corresponding privileges

Reminder: Organization l Authentication  Password-based  Kerberos authentication  SSL authentication  Certification authorities l Authorization l Integrity and Confidentiality  Symmetric and asymmetric cryptography  PGP (Pretty Good Privacy)  SSL

Authorization l Process that determines whether a particular operation is allowed l Traditionally: based on authenticated identity of requester and local information  Access Control Lists (ACLs) l Grids: determine whether access to resource is allowed  Might have access control lists associated with resources, principals or authorized programs  User-provided code must also be authenticated

Distributed Authorization l E.g., Distributed Computing Environment l Systems still being developed l Distributed maintenance of authorization information:  Group membership  Access control lists l Need to verify the authenticity of authorization (and assurance) information l One approach: Embed these attributes in certificates  Signed by trusted third-party  “Privilege attribute certificates”

Distributed Authorization (cont.) l Restricted proxy: authorization certificate that grants authority to perform operation on behalf of grantor  Restricted for access to particular objects  Only when specified restrictions are satisfied l Alternative: separate authorization server l Party providing a service checks with server whether a named principal is authorized

Delegation of Authority l User or process that is authorized to perform an operation can grant authroity to perform the operation to another process l More restricted than identity delegation l In Grids:  Used for tasks that run remotely on grid that must read or write data stored across the network  E.g., resource manager allocates a node to a job and delegates to job’s initator authority to use that node

Integrity and Confidentiality l Protect data during transmission on network  Anyone connected to an open network may observe, insert or possibly remove messages l Cryptography  Encryption: scrambles data in a way that varies based on a secret encryption key  Decryption: unscramble data using corresponding decryption key  Ciphertext: scrambled data  Plaintext: original or unscrambled data

Encrypted messages provide integrity and confidentiality l Protect data from eavesdroppers  data encrypted before transmission and decrypted afterward l Checksums protect data integrity  Attach a checksum to data before enryption  After decryption, receiver verifies checksum  Detect modifications of data by someone who doesn’t know encryption key

Symmetric Cryptosystems l Examples:DES (data encryption standard), triple-DES, idea, blowfish, RC4, RC5 l Uses same key for encryption & decryption l Both parties must share same key l With static keys:  User needs different key for every other user or service provider  Service provider maintains key for every user l Or, use mutually-trusted intermediary to generate and distribute session key to both parties  E.g., Kerberos Key Distribution Center

Symmetric Encryption Key Distribution Using Kerberos 1. Each client and server register their keys with Kerberos authentication server in advance 2. Client wants to communicate with service provider: sends client and service provider names to Kerberos authentication server 3. Kerberos server randomly generates a session key that will be used for symmetric encryption between client and server 4. Kerberos server sends session key to client as well as a ticket that contains client’s name and session key, all encrypted with server’s key

Key Distribution Using Kerberos (cont.) 5. Client caches encrypted session key and ticket, which are valid for some period  Reduces number of authentication requests to server 6. Client forwards ticket to service provider AND sends server a timestamp encrypted using the session key 7. Server decrypts ticket and extracts session key 8. Server uses session key to decrypt timestamp, checks that it is recent 9. If client needs to authenticate server, server encrypts the timestamp with the session key and sends to client

Asymmetric Cryptography l Also Public Key cryptography (PKI) l E.g., RSA or DSA (digital signature algorithm) l Uses a pair of keys for encryption and decryption  Knowledge of one key does not reveal the other l Public key: published and available to anyone l Private key: secret, known to only one party l Advantage: can disseminate public key freely l Disadvantage: significantly worse performance than symmetric encryption  Because of performance, rarely used in isolation  Used in combination with symmetric encryption

Using Asymmetric Encryption to Exchange a Symmetric Key 1. Sender generates a symmetric session key and an associated checksum 2. Sender encrypts key and checksum using recipient’s public key and sends them to recipient 3. Recipient decrypts key and checksum using its private key 4. Recipient verifies checksum is correct and extracts session key 5. Communication proceeds using symmetric encryption with the session key

Using Asymmetric Encryption to Exchange Symmetric Key (cont.) l Pay asymmetric performance penalty at startup but not on every block transferred l Relies on each party knowing public keys or relying on trusted third party (CA) to verify public keys l Otherwise, attacker could replace public key with different public key that has a private key known by attacker

Encryption with PGP (Pretty Good Privacy) l Provides integrity, authentication and confidentiality for and data files l Sender:  Computes a message digest (similar to a checksum)  Encrypts original message using symmetric cryptography with a message key  Encrypts the message digest with asymmetric cryptography using the private key of the sender  Provides a digital signature (integrity)  Encrypts the message key with asymmetric cryptography using recipient’s public key

PGP (Pretty Good Privacy) (cont.) l Recipient:  Decrypts message digest using public key of sender  Decrypts message key using its own private key  Uses message key to decrypt original message  Verifies the correctness of message using digest

Digital Signatures l Does not require encryption of original message l Message digest  Computationally infeasible for another message to produce the same digest  Encrypted  Attached to message  Can detect if message was altered during transmission l Provides a digital signature

Reminder: Organization l More Security Issues  Assurance  Accounting  Audit l More Security Technologies  IPSec and IPv6  VPN (Virtual Private Networks)  Firewalls  GSS-API

More Security Issues: Assurance l Service requester has requirements for:  performance, security, reliability l Does candidate service provider meet these requirements? l Form of authorization (“accreditation”) used to validate service provider l Grid example: check assurance credentials when selecting nodes for computation:  Do they meet performance, reliability, or security requirements? l Assurance schemes: not widely deployed

More Security Issues: Accounting l Means of tracking, limiting or charging for consumption of resources l Critical for fair allocation of resources l Tied in with authorization l In the grid: accounting is critical  Need a means of payment  Correctly charge user at time a resource is consumed  Need an incentive to make resources available l Grids require a distributed mechanism to maintain quotas across systems  Prevent users from exceeding resource limits by spreading use across machines l Grid accounting schemes still being developed

More Security Issues: Audit l Record operations performed by a system and associate actions with principals  Problems: Find out what went wrong  Security breaches: Intrusion detection l In a grid: audit mechanism must be distributed l Intrusion Detection  Need log of events for later or concurrent analysis  Protect confidentiality of audit data  Vulnerable to modification, deletion or denial of service l Grid applications will affect intrusion detection algorithms  Normal grid activities may look similar to certain network attacks

More Security Technologies: IPSec and IPv6 l Transport layer protection for confidentiality and integrity l When communication established between two network hosts:  Use key distribution to exchange key for symmetric encryption l Key distribution may use Kerberos, PKI, … l Keys are associated with hosts, not with applications or users

More Security Technologies: Virtual Private Networks (VPNs) l Use transport-layer confidentiality and integrity l Share physical infrastructure of internet l Communication only between participating nodes l Protected from disclosure to/modification by nodes that are not participants l Used when impractical to integrate security at application layer l Since they operate at tranport layer, cannot:  Authenticate end users  Understand application-level objects that need protection  Support security policies that distinguish users & application objects

More Security Technologies: Firewalls l Provide a barrier at boundary of organization’s network  Only specifically authorized communication may pass through  Prevent many attacks on hosts within organization l In grids: less useful  Grid applications will often require communication through firewall l Need to integrate IPSec and VPN technologies at network boundaries with firewalls  Messages on internal network remain unprotected  Encrypt/decrypt messages as they leave/enter VPN at the firewall

More Security Technologies: GSS-API l Generic Security Services Application Programming Interface l Facilitates integration of security at application layer l Applications make calls to authentication, confidentiality and integrity services  Calls are independent of underlying security services