An Architecture for a Secure Service Discovery Service Steven Czerwinski, Todd Hodes, Ben Zhao, Anthony Joseph, Randy Katz UC Berkeley Internet Scale Research.

Slides:



Advertisements
Similar presentations
Giggle: A Framework for Constructing Scalable Replica Location Services Ann Chervenak, Ewa Deelman, Ian Foster, Leanne Guy, Wolfgang Hoschekk, Adriana.
Advertisements

Tapestry: Decentralized Routing and Location SPAM Summer 2001 Ben Y. Zhao CS Division, U. C. Berkeley.
Naming Computer Engineering Department Distributed Systems Course Asst. Prof. Dr. Ahmet Sayar Kocaeli University - Fall 2014.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
The Oceanstore Regenerative Wide-area Location Mechanism Ben Zhao John Kubiatowicz Anthony Joseph Endeavor Retreat, June 2000.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
Name Services Jessie Crane CPSC 550. History ARPAnet – experimental computer network (late 1960s) hosts.txt – a file that contained all the information.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
Discovery Robert Grimm New York University. The Problem: Naming (Or, How to Start a Religious War)  The Internet today  IP addresses  Strict location.
Object Naming & Content based Object Search 2/3/2003.
1 Personal Activity Coordinator (PAC) Xia Hong UC Berkeley ISRG retreat 1/11/2000.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 7: Planning a DNS Strategy.
Or, Providing Scalable, Decentralized Location and Routing Network Services Tapestry: Fault-tolerant Wide-area Application Infrastructure Motivation and.
Distributed Publish/Subscribe Network Presented by: Yu-Ling Chang.
Key Management in Cryptography
SSH Secure Login Connections over the Internet
Distributed Computing COEN 317 DC2: Naming, part 1.
Device (Addressing &) Discovery Prasun Dewan Department of Computer Science University of North Carolina
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
4/11/06Tuesday Seminar1 The State of Service Discovery Jeff Pang.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
1 Locating Application Data Across Service Discovery Domains MobiCom’01.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
Company LOGO mDNS (ICM3400) Proposal for Hierarchical Multicast Session Directory Architecture Piyush Harsh & Richard Newman.
SANE: A Protection Architecture for Enterprise Networks
每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.
Distributed Computing COEN 317 DC2: Naming, part 1.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 Databases, Controls, and Security.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
The Replica Location Service The Globus Project™ And The DataGrid Project Copyright (c) 2002 University of Chicago and The University of Southern California.
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Freenet “…an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
LDAP- Protocol and Applications. Role of LDAP Allow clients to access a directory service Directories hold hierarchical structured information Clients.
NINJA. Project of UC Berkeley Computer Science Division Paper : The Ninja Architecture for Robust Internet-Scale Systems and Services
Introduction to Active Directory
Design and implementation of an intentional naming system William Adjie-WinotoElliot Schwartz Hari BalakrishnanJeremy Lilley MIT Laboratory for Computer.
Freenet: Anonymous Storage and Retrieval of Information
CPS Computer Security Tutorial on Creating Certificates SSH Kerberos CPS 290Page 1.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Bigtable: A Distributed Storage System for Structured Data
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Fall 2006CS 395: Computer Security1 Key Management.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
The Ninja Architecture for Robust Internet-Scale Systems and Services UC Berkeley Computer Science Division 2002 년 10 월 9 일 박준호.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Magdalena Balazinska, Hari Balakrishnan, and David Karger
MIT – Laboratory for Computer Science
Tutorial on Creating Certificates SSH Kerberos
Tutorial on Creating Certificates SSH Kerberos
An Architecture for Secure Wide-Area Service Discovery
Presentation transcript:

An Architecture for a Secure Service Discovery Service Steven Czerwinski, Todd Hodes, Ben Zhao, Anthony Joseph, Randy Katz UC Berkeley Internet Scale Research Group

Outline Intro Architecture Security Wide Area Conclusion

Supporting Ubiquitous Computing Ubiquitous Computing envisions… –Billions of computers and devices available to users –Devices seamlessly interact with all others –Networks and computers as an unobtrusive utility One problem: Locating servers and devices –How can you locate a light bulb among billions? –Solution must be scalable, fault-tolerant, self- configuring, secure, and support wide-area Existing solutions don’t adequately address needs

A Secure Service Discovery Service Services are applications/devices running in the network One piece of the puzzle –Helps manage explosive growth of services –Aids in configuration by providing indirection –Aids in protecting user and services by providing security The Idea: A secure directory tool which tracks services in the network and allows authenticated users to locate them through expressive queries

Berkeley Service Discovery Service 443 Phaser io.printer Soda/443 yes rmi://batman.cs Where is a color printer? The SDS 443 Phaser “443 Phaser” io.printer yes XML Query Service Description

Discovery Services Discovery/Directory services are not new –Provide a mapping of attribute values to domain specific addresses –Examples: Telephone book, card catalogs, etc.. Computer network discovery services –DNS –NIS –SAP –Globe –LDAP –Jini LookUp service

Differentiating Discovery Services Query Routing –Implicitly specified by the query (DNS, globe) Queries –Query grammar complexity (LDAP vs. DNS) Push (advertisements) versus pull (queries) –Pull only (DNS) vs. Push Only (SAP modulo caching) Update rate –Short for mobility vs. long for efficient caching

Discovery Services Cont. Bootstrapping –“Well-known” local name (“ –List of unicast addresses (DNS) –Well-known global/local multicast address (SAP, SLP) Soft state vs. hard state –Implicit recovery vs. guaranteed persistence Service data –Reference (globe) vs. content (SAP+SDP) Security –Privacy and authentication

Features of the Berkeley SDS Hierarchical network of servers –Multiple hierarchies based on query types Queries –Use XML for service descriptions and queries Bootstrapping via Multicast announcements –Listen on well-known global channel for all parameters Soft-state approach –State rebuilt by listening to periodic announcements Secure –Use certificates/capabilities to authenticate

The Berkeley SDS Architecture Printer Converter Jukebox Printer Services Certificate Authority Capability Manager UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Servers SDS Server Client

The Berkeley SDS Architecture Printer Converter Jukebox Printer Services Certificate Authority Capability Manager UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Server SDS Servers Create hierarchy for query routing Store service information and process requests Advertise existence for bootstrapping Client SDS Servers

The Berkeley SDS Architecture Printer Converter Jukebox Printer Certificate Authority Capability Manager UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Server Services Responsible for creating and propagating XML service description Client SDS Servers

The Berkeley SDS Architecture Printer Converter Jukebox Printer Services Certificate Authority Capability Manager UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Server Clients The users of the system Perform look up requests via SDS server Client SDS Servers

The Berkeley SDS Architecture Printer Converter Jukebox Printer Services Capability Manager UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Server Certificate Authority Certificate Authority Provides a tool for authentication Distributes certificates to other components Client SDS Servers

The Berkeley SDS Architecture Printer Converter Jukebox Printer Services Certificate Authority UC Berkeley Soda Hall Room 466 Room 464 Cory Hall SDS Server Capability Manager Capability Manager Maintains access control rights for users Distributes capabilities to other components Client SDS Servers

How the Pieces Interact... SDS Server Client Printer Music Server Backup SDS Server Server Announcements: Global multicast address Periodic for fault detection Provides all parameters Service Announcements: Multicast address from server Periodic for soft state Contains description Client Queries: SDS address from server Sends service specification Gets service description and URL

Security Goals Access control Authentication of all components Encrypted communication

Security Goals Access control –Services specify which users may “discover” them Authentication of all components –Protects against masquerading –Holds components accountable for false information Encrypted communication –Authentication meaningless without encryption –Hides sensitive information (service announcements) No protection against denial of service attacks

Security Hazards SDS Server Client Printer Music Server Backup SDS Server Clients: Encryption for 2-way communication Have to prove rights Authenticated RMI Server Announcements: Have to sign information No privacy needed Signed broadcasts Service Announcements: Only intended server can decrypt Signed descriptions to validate Secure One-Way Broadcasts All components: Use certificates for authentication

Secure One-Way Broadcasts Service K Private Signing (DSA) Asymmetric Encryption (RSA) Symmetric Encryption (Blowfish) Service Description Server EK Public K Session K Session {Signed Description}EK Public {Session Key} Key idea: Use asymmetric algorithm to encrypt symmetric key

Secure One-Way Broadcasts Asymmetric Encryption (RSA) Symmetric Encryption (Blowfish) Signed Service Description Server EK Private K Session K Session {Signed Description}EK Public {Session Key} (Cache it) To decode, only intended server can decrypt session key Use session to retrieve service description Cache session key to skip later asymmetric operations

Wide Area Room 443 ISRG Kinko’s UCB Physics IRAM UC Berkeley UCB CS Stanford U Kinko’s #123 CS Physics Mobile People Root Hierarchy motivation: Divide responsibility among servers for scalability The big question: How are queries routed between servers?

The Wide Area Strategy Build hierarchies based upon query criteria –Administrative domain –Network topology –Physical location Aggregate service descriptions (lossy) Route queries based on aggregation tables  Parent Based Forwarding (PBF)

Service Description Aggregation Hash values of tag subsets of service description used as description summary Hash list compressed with Bloom Filter [Bloom70] Fixed-size aggregation tables prevent explosion at roots Guarantees no false negatives Can have false positives, probability affected by table size Algorithm: –To add service, compute description tag subsets, insert into Bloom Filter table –To query, compute query tag subsets, examine corresponding entries in Bloom Filter table for possible matches

Multiple Hierarchies Room 443 ISRG Kinko’s UCB Physics IRAM UC Berkeley UCB CS Stanford U Kinko’s #123 CS Physics Mobile People Root Administrative Hierarchy

Multiple Hierarchies Room 443 ISRG Kinko’s UCB Physics IRAM UC Berkeley Soda Hall Stanford U Kinko’s #123 CS Physics Mobile People Root Physical Location Hierarchy Stanford, USBerkeley, US Hearst St Northern California

Query Routing in Action Room 443 ISRG UCB Physics IRAM UC Berkeley Soda Hall Kinko’s #123 Berkeley, US Hearst St SDS servers Services Clients Color Fax fax yes ?

Query Routing in Action Room 443 ISRG UCB Physics IRAM UC Berkeley Soda Hall Kinko’s #123 Berkeley, US Hearst St SDS servers Services Clients Color Fax fax yes ? Room 443 Room 443 server examines its data and tables, routes to parent

Query Routing in Action Room 443 ISRG UCB Physics IRAM UC Berkeley Soda Hall Kinko’s #123 Berkeley, US Hearst St SDS servers Services Clients Color Fax fax yes ? Each server checks aggregation tables, Hearst sees possible hit

Query Routing in Action Room 443 ISRG UCB Physics IRAM UC Berkeley Soda Hall Kinko’s #123 Berkeley, US Hearst St SDS servers Services Clients Color Fax fax yes ? Kinko’s #123 finds match, returns service description

Conclusion A tool for other applications –Provides a listing of services in the network –XML descriptions allow for flexibility –Well defined security model –Fault tolerant, scalable –Releasing local area implementation as part of Ninja Ongoing work –Experimenting with wide area strategy and caching For more information