Trusted Coordination ADAPT Workshop, 11-12 December 03 1 Building Blocks for Trusted Coordination (a status report from the TAPAS project) Santosh Shrivastava.

Slides:



Advertisements
Similar presentations
CONFIDENTIAL 1 Preparing for & Maintaining PCI Compliance.
Advertisements

Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Operating System Security
Contracts, Service Level Agreements and Virtual Enterprises in Composite Services Carlos Molina-Jimenez (
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
TAPASDelivMarch04 1 TAPAS Deliverables for March 04 (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Understanding WebLogic Security
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
6/1/20151 Digital Signature and Public Key Infrastructure Course:COSC Instructor:Professor Anvari Student ID: Name:Xin Wen Date:11/25/00.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
David L. Wasley Information Resources & Communications Office of the President University of California Directories and PKI Basic Components of Middleware.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Quality Objects: Advanced Middleware for Wide Area Distributed Applications Rick Schantz Quality Objects: Advanced Middleware for Large Scale Wide Area.
Applied Cryptography for Network Security
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Pay As You Go – Associating Costs with Jini Leases By: Peer Hasselmeyer and Markus Schumacher Presented By: Nathan Balon.
Understanding Active Directory
Source: George Colouris, Jean Dollimore, Tim Kinderberg & Gordon Blair (2012). Distributed Systems: Concepts & Design (5 th Ed.). Essex: Addison-Wesley.
1 Authentication Protocols Celia Li Computer Science and Engineering York University.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Client/Server Software Architectures Yonglei Tao.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Securing Legacy Software SoBeNet User group meeting 25/06/2004.
Chapter 10: Authentication Guide to Computer Network Security.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Cryptography and Network Security
Introduction to Secure Messaging The Open Group Messaging Forum April 30, 2003.
E-Science Meeting April Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Trusted Systems Laboratory Hewlett-Packard Laboratories Bristol, UK InfraSec 2002 InfraSec 2002 Bristol, October 2002 Marco Casassa Mont Richard.
E-Science Meeting March Trusted Coordination in Dynamic Virtual Organisations Santosh Shrivastava School of Computing Science Newcastle University,
Demonstration of the Software Prototypes PRIME PROJECT 17 December 2004.
X-Road – Estonian Interoperability Platform
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Chapter 21 Distributed System Security Copyright © 2008.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
1 General Supervision. 2 General Supervision (and Continuous Improvement) 1.What are the minimum Components for General Supervision ? 2.How do the Components.
Rob Smith April 21, /18 GOLD Project Update Meeting GOLD an infrastructural approach to virtual organisations.
A Secure JBoss Platform Nicola Mezzetti Acknowledgments: F. Panzieri.
COEN 351 Non-Repudiation. A non-repudiation service provides assurance of the origin or delivery of data in order to protect the sender against false.
Electronic PostMark (EPM) Project Overview May, 2003 Copyright Postal Technology Centre.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Formalising a protocol for recording provenance in Grids Paul Groth – University of Southampton.
Security Patterns for Web Services 02/03/05 Nelly A. Delessy.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Long-term Archive Service Requirements November 9, 2004.
Chapt. 10 – Key Management Dr. Wayne Summers Department of Computer Science Columbus State University
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
1 An abstract model for run-time monitoring and enforcement of contracts. Carlos Molina-Jimenez TAPAS.
April 20023CSG11 Electronic Commerce Authentication John Wordsworth Department of Computer Science The University of Reading Room.
B2BObjectsDSN, Washington, June Distributed Object Middleware to Support Dependable Information Sharing between Organisations Nick Cook, Santosh.
Contracts, SLAs and Virtual Enterprises Carlos Molina-Jimenez ( Meeting of TAPAS partners at University.
Trusted CoordinationTAPAS Workshop, 25-26/09/031 Building Blocks for Trusted Coordination Nick Cook University of Newcastle.
IAB-Feb 04 1 TAPAS Progress Report (Trusted and QoS-Aware Provision of Application Services) Santosh Shrivastava Newcastle University.
Cryptography and Network Security
Distribution and components
X-Road as a Platform to Exchange MyData
Appropriate Access InCommon Identity Assurance Profiles
Presentation transcript:

Trusted Coordination ADAPT Workshop, December 03 1 Building Blocks for Trusted Coordination (a status report from the TAPAS project) Santosh Shrivastava University of Newcastle

Trusted Coordination ADAPT Workshop, December 03 2 Need for Trust  Organisations increasingly use the Internet both to offer services and to use the services of others  This extends to formation of virtual enterprises (VE) for delivery of goods or services  Organisations forming a VE are expected to trust each other to some extent to enable business However, we assume that organisations forming a VE cannot simply rely on the trust they have in one another To be of practical use, trust relationships must be managed and observed How?

Trusted Coordination ADAPT Workshop, December 03 3 Need for Trust  Trust is achieved through regulation: Interacting parties are given mechanisms that guarantee the rights and obligations that each interacting entity promises to honour. In the worst case, violations of agreed interactions are detected and notified to all interested parties –an audit trail of all interactions needs to be maintained We refer to this form of regulated interaction as “trusted coordination”

Trusted Coordination ADAPT Workshop, December 03 4 Trusted Coordination  Two aspects: Higher level mechanisms for VE policy specification and enforcement –Contract representation and monitoring –Role based access control Middleware mechanisms for non- repudiable interaction - the scope of this presentation

Trusted Coordination ADAPT Workshop, December 03 5 Building blocks for trusted coordination  Regulation implies an audit trail to monitor interaction and for dispute resolution  Evidence generated is of little value unless irrefutably attributable to its source (non- repudiable)  Implies two building blocks for trusted coordination: Non-repudiable service invocation Non-repudiable information sharing

Trusted Coordination ADAPT Workshop, December 03 6 Service invocation  2-party, client-server interaction  Server needs evidence that: The request originated at the client: non-repudiation of origin (NRO) of the request The response was received by the client: non-repudiation of receipt (NRR) of the response  Client needs evidence that: The request was received by the server (NRR req.) The response originated at the server (NRO resp.) Client request response Server

Trusted Coordination ADAPT Workshop, December 03 7 Non-repudiable service invocation req Client Interceptor req, NROreq resp, NRRreq, NROresp NRRresp Interceptor Server resp req

Trusted Coordination ADAPT Workshop, December 03 8 Observations  To guarantee protocol compliance, interceptors must be trusted  Degenerate case is that the interceptors are a trusted third party (or parties) protocol resembles fair exchange as discussed in the literature  Interceptors can be configured to execute any non-repudiation protocol For example: to meet different evidentiary requirements req Client Interceptor req, NROreq resp, NRRreq, NROresp NRRresp Interceptor Server resp req

Trusted Coordination ADAPT Workshop, December 03 9 Evidence for non-repudiable service invocation  Request evidence includes the service invoked and any parameters to the invocation  Response evidence is the result of the invocation  3 different types to consider: 1.Values: require the state of the value at invocation time (or at response time for result). Before evidence generation, must resolve references to local values to an agreed representation of their state. 2.Service references: require a globally resolvable name for the service, e.g. URL (not the state of the service) 3.Shared information references: require the state of the information at invocation time (or at response time for result) and a reference to the shared information that is resolvable by the remote party

Trusted Coordination ADAPT Workshop, December Access and update to shared information  Multi-party, peer-peer interaction  For an update proposed by A: B and C need evidence that update originated at A (NRO update) A needs evidence that B and C received the update (NRR update) A, B and C need evidence that, after update, the information will be in a consistent, agreed state (NRO agreement, NRR agreement) A update i B C

Trusted Coordination ADAPT Workshop, December upd (5) Evidence required:  State transition proposed by A (propose: step 2)  Decisions on validity of transition from B and C (respond: step 3)  Collective decision (resolve: step 4) Shared information is only updated if the collective decision is that A’s proposal is valid Incentives to good behaviour stronger than for one-off service invocation Non-repudiable information sharing upd (1) C B prop (2) resp (3) reslv (4) prop (2) resp (3) A i reslv (4)

Trusted Coordination ADAPT Workshop, December Infrastructure Requirements  Cryptographic primitives Digital signatures, secure message digest (hash), secure random number generation  Credential (certificate) management  Access control services Intra-organisation: map user to role Inter-organisation: map credential to role  Non-repudiation log protocol-specific include signed hash of state in evidence  State store map hash of state to persistent representation of state

Trusted Coordination ADAPT Workshop, December Infrastructure contd.  Coordination service to execute NR protocols (configurable to specific protocol)  Membership service (for information sharing only) Maintain group membership information (mapping members to credentials) Membership is coordinated using NR protocols executed by coordination service  Communication subsystem  Trusted time-stamping service To verify a signing key was not compromised at time of use (evidence generation)

Trusted Coordination ADAPT Workshop, December Implementations  NR service invocation J2EE prototype implementation (JBoss) nearing completion  NR information sharing B2BObjects –Realise shared information as object replicas at each member of coordinating group –Regulate access to and update of object state –Group membership and object state only change if all parties agree –Implemented in Java using RMI J2EE prototype implementation (JBoss) nearing completion

Trusted Coordination ADAPT Workshop, December References  M. Wichert, D. Ingham, S. Caughey. Non-repudiation Evidence Generation for CORBA using XML, In Proc. IEEE Annual Comp. Security Applications Conf., Phoenix, US,  N. Cook, S. Shrivastava, S. Wheater. Distributed Object Middleware to Support Dependable Information Sharing between Organisations, In Proc. IEEE DSN02, Washington, US, Jun  N. Cook, S. Shrivastava, S. Wheater. Middleware Support for Non- repudiable Transactional Information Sharing between Enterprises, To appear as Work in Progress in: Proc. 4 th IFIP DAIS, Paris, France, Nov  C. Molina-Jimenez, S.K. Shrivastava, E. Solaiman and J. Warne. Contract Representation for Run-time Monitoring and Enforcement, IEEE Conference on Electronic Commerce (CEC’03), Newport Beach, CA, June 2003, pp  Paul D Ezhilchelvan and Santosh K Shrivastava. Systematic Development of a Family of Fair Exchange Protocols, Seventeenth Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Estes Park, Colorado, August  Ellis Solaiman, Carlos Molina-Jimenez, and Santosh Shrivastava. Model Checking Correctness Properties of Electronic Contracts, International Conference on Service Oriented Computing, Trento, November 2003  Recent work using component middleware is being written up….