PORTIA Robert Grimm New York University Security Challenges for Rich-Media Educational Environments.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

October 27, 2008 DCIA P2P and Video Conference Robert Levitan, CEO Can You Afford NOT to Use The Cloud?
Dynamic Replica Placement for Scalable Content Delivery Yan Chen, Randy H. Katz, John D. Kubiatowicz {yanchen, randy, EECS Department.
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
Barracuda Web Application Firewall
Company Confidential 1 © 2005 Nokia V1-Filename.ppt / yyyy-mm-dd / Initials Towards a mobile content delivery network with a P2P architecture Carlos Quiroz.
1 Bringing P2P to the Web: Security and Privacy in the Firecoral Network Jeff Terrace Harold Laidlaw Hao Eric Liu Sean Stern Michael Freedman.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
An Analysis of Internet Content Delivery Systems Stefan Saroiu, Krishna P. Gommadi, Richard J. Dunn, Steven D. Gribble, and Henry M. Levy Proceedings of.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Anycast Jennifer Rexford Advanced Computer Networks Tuesdays/Thursdays 1:30pm-2:50pm.
Library Automation and Digital Libraries Class #5 LBSC 690 Information Technology.
Web Caching and CDNs March 3, Content Distribution Motivation –Network path from server to client is slow/congested –Web server is overloaded Web.
Internet Real Time (IRT) Lab at Columbia University Professor: Henning Schulzrinne Columbia University Presenter: Suman Srinivasan, PhD student
Content Networking - CON Content Overlay Network Vishal Kumar Singh Eilon Yardeni April, 28 th 2005.
DotSlash: Providing Dynamic Scalability to Web Applications Weibin Zhao and Henning Schulzrinne Department of Computer Science, Columbia University More.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
Microsoft Exchange Exchange is more than just Electronic Mail The server that embraces Internet standards and extends rich messaging and collaboration.
Department of Veterans Affairs VLER Core Vendor Days 1/24, 1/25.
Interposed Request Routing for Scalable Network Storage Darrell Anderson, Jeff Chase, and Amin Vahdat Department of Computer Science Duke University.
SharePoint 2010 Business Intelligence Module 2: Business Intelligence.
Na Kika: Secure Service Execution and Composition in an Open Edge-Side Computing Network Robert Grimm, Guy Lichtman, Nikolaos Michalakis Amos Elliston,
Ao-Jan Su, David R. Choffnes, Fabián E. Bustamante and Aleksandar Kuzmanovic Department of EECS Northwestern University Relative Network Positioning via.
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
On the Scale and Performance of Cooperative Web Proxy Caching University of Washington Alec Wolman, Geoff Voelker, Nitin Sharma, Neal Cardwell, Anna Karlin,
® IBM Software Group © 2007 IBM Corporation J2EE Web Component Introduction
Deploying XenApp and XenDesktop with BIG-IP Brent Imhoff – Field Systems Engineer Gary Zaleski – Solutions Architect Michael Koyfman – Solutions Architect.
Maximize Return on Engagement via Scalable Omni-Channel Online Services in the Cloud COMPANY PROFILE: XOMNI, INC. Founded in 2011 and headquartered in.
Architectures of distributed systems Fundamental Models
Peer-to-Peer Distributed Shared Memory? Gabriel Antoniu, Luc Bougé, Mathieu Jan IRISA / INRIA & ENS Cachan/Bretagne France Dagstuhl seminar, October 2003.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
1 Emergency Alerts as RSS Feeds with Interdomain Authorization Filippo Gioachin 1, Ravinder Shankesi 1, Michael J. May 1,2, Carl A. Gunter 1, Wook Shin.
Copyright © 2002 Intel Corporation. Intel Labs Towards Balanced Computing Weaving Peer-to-Peer Technologies into the Fabric of Computing over the Net Presented.
“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Presented by Scientific Annotation Middleware Software infrastructure to support rich scientific records and the processes that produce them Jens Schwidder.
Towards a Platform for Intelligent Activity at the Edge Hilarie Orman Advanced Development Group Novell, Inc.
Presented by Jens Schwidder Tara D. Gibson James D. Myers Computing & Computational Sciences Directorate Oak Ridge National Laboratory Scientific Annotation.
S imple O bject A ccess P rotocol Karthikeyan Chandrasekaran & Nandakumar Padmanabhan.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Decentralized authorization and data security in web content delivery * Danfeng Yao (Brown University, USA) Yunhua Koglin (Purdue University, USA) Elisa.
Advanced Web Technologies By: Faraz Ahmed. Contents 0 Course Outline 0 Architectures 0 HTTP.
Copyright © Clifford Neuman and Dongho Kim - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE Advanced Operating Systems Lecture.
The User Perspective Michelle Osmond. The Research Challenge Molecular biology, biochemistry, plant biology, genetics, toxicology, chemistry, and more.
Globally Distributed Content Delivery Presenter: Baoning Wu 03/25/2003.
Development of a Web-Based Groupwork Assessment Tool Groupwork and Assessment Methods Demonstration of Software Discussion Hannah Whaley David Walker
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Peer-to-Peer Systems: An Overview Hongyu Li. Outline  Introduction  Characteristics of P2P  Algorithms  P2P Applications  Conclusion.
第 1 讲 分布式系统概述 §1.1 分布式系统的定义 §1.2 分布式系统分类 §1.3 分布式系统体系结构.
Ocean Observatories Initiative Serving Ocean Model Data on the Cloud M. Meisinger, C. Farcas, E. Farcas, C. Alexander, M. Arrott, J. de La Beaujardière,
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
/ Fast Web Content Delivery An Introduction to Related Techniques by Paper Survey B Li, Chien-chang R Sung, Chih-kuei.
WHAT WE OFFER Go-To-Market Services MICROSOFT AZURE APP BUILDER PROFILE: MxHero MxHero, launched in 2012 in New York, is a cloud-based application that.
Our Place in the Cloud DCIA P2P & Cloud Market Conference March 9, 2010.
John S. Otto Mario A. Sánchez John P. Rula Fabián E. Bustamante Northwestern, EECS.
Multicast in Information-Centric Networking March 2012.
Presentation on Distributed Web Based Systems Submitted by WWW
Web Application Protection Against Hackers and Vulnerabilities
CIIT-Human Computer Interaction-CSC456-Fall-2015-Mr
Principles of Network Applications
Utilization of Azure CDN for the large file distribution
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Cloud Computing: Concepts
EE 122: Lecture 22 (Overlay Networks)
Advanced Computer Networks
Scaling Businesses on the Cloud
Presentation transcript:

PORTIA Robert Grimm New York University Security Challenges for Rich-Media Educational Environments

The Chasm in Medicine  Scientific knowledge  Rapid advances in molecular biology  Medical practice  Reduced lengths-of-stay in hospitals  Increased compartmentalization  Chasm is self-widening  Specialization helps keep up with sciences, costs down  Existing solutions do not work  Outpatient care for education, PCPs for practice ÜResult: Ever harder to train “good” physicians

Crossing the Chasm: The IRMEE Project at NYU  NYU-wide collaboration  Medicine, computer science, libraries, center for teaching excellence, center for advanced technology, IT  Goal: Integration  Across specializations  Between theory and practice  Across geographical boundaries and time  Chosen approach: Web-based rich-media environment  Provides lifelong access to educational & scientific content  Structures content along narrative lines  Fosters community of students and practitioners

Prototypes in Use, Have Impact  Complemented by guided discussion on bulletin board

Where Do We Go from Here?  Content  Better evaluations through script concordance tests  More modules  Authoring is labor- and resource-intensive, does not scale  Focus on exchanging content with other authors  XML schema being co-developed with University of Pittsburgh  Delivery infrastructure  Existing multi-tier architecture does not scale  We need a scalable and affordable solution  Focus for the rest of this talk, but keep IRMEE in mind

Building a Scalable & Affordable Implementation Platform  Active CDN (Content Distribution Network)  Interposes on client/server interactions (DNS redirection)  Authoritative content remains on server  Caches static content  Executes application-specific scripts  For dynamic content creation as well as transformation  Why another edge-side computing platform?  Familiar programming model for web developers  As added benefit, easier to provide resource controls, security  General structured overlay: Distributed Hash Table  Easier to leverage advances in peer-to-peer technologies

Integrity and Privacy Issues for Active CDNs  Nodes in peer-to-peer overlay generally untrusted  Though, local nodes may be trusted  Connection-oriented security (SSL) inappropriate  End-to-end negates CDN, hop-by-hop negates security  Resource-oriented security required  Servers sign or encrypt content  Trusted proxy verifies signatures, decrypts content  What about dynamically generated/transformed content?  Scripts still may execute on any node (for p2p load balancing)  But trusted proxy probabilistically verifies dynamic content and adjusts reputation based on results

What’s Missing?  Reputation-based security model  Selection of content to verify  Scoring and accumulation of results  Exchange of results  Centralized blacklists vs. web of trust  HTTP extensions for resource-based security  Beware of interaction with caching  E.g., sign only headers but not body, include hash of body  Experiences from real deployment  On the Wild Wild Web, surprising things may happen  E.g., see Pai et al., The Dark Side of the Web, HotNets ‘03

The Larger Issue  Securely placing functionality (computations & storage) on untrusted nodes placed between clients and servers