11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin.

Slides:



Advertisements
Similar presentations
INSTITUTE FOR CYBER SECURITY 1 Trusted Computing Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University.
Advertisements

INSTITUTE FOR CYBER SECURITY 1 The ASCAA * Principles Applied to Usage Control Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
INSTITUTE FOR CYBER SECURITY April Access Control and Semantic Web Technologies Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber.
Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University.
Institute for Cyber Security
Institute for Cyber Security ASCAA Principles for Next-Generation Role-Based Access Control Ravi Sandhu Executive Director and Endowed Chair Institute.
Institute for Cyber Security
Adopting Provenance-based Access Control in OpenStack Cloud IaaS October, 2014 NSS Presentation Institute for Cyber Security University of Texas at San.
1 Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud Dissertation Defense Xin Jin Advisor: Dr. Ravi Sandhu Co-Advisor:
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Executive Director, ICS April 30,
1 A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC Prof. Ravi Sandhu Executive Director and Endowed Chair DBSEC July 11, 2012.
Institute for Cyber Security Extending OpenStack Access Control with Domain Trust World-Leading Research with Real-World Impact! 1 Bo Tang and Ravi Sandhu.
Attribute-Based Access Control Models and Beyond
11 World-Leading Research with Real-World Impact! Constraints Specification for Virtual Resource Orchestration in Cloud IaaS Constraints Specification.
11 World-Leading Research with Real-World Impact! RT-Based Administrative Models for Community Cyber Security Information Sharing Ravi Sandhu, Khalid Zaman.
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
Cloud Usability Framework
Secure Information and Resource Sharing in CloudSecure Information and Resource Sharing in Cloud References OSAC-SID Model [1]K. Harrison and G. White.
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
1 A Role Based Administration Model For Attribute Xin Jin, Ram Krishnan, Ravi Sandhu SRAS, Sep 19, 2012 World-Leading Research with Real-World Impact!
1 World-Leading Research with Real-World Impact! Authorization Federation in IaaS Multi Cloud Navid Pustchi, Ram Krishnan and Ravi Sandhu SCC 2015.
Institute for Cyber Security A Multi-Tenant RBAC Model for Collaborative Cloud Services Bo Tang, Qi Li and Ravi Sandhu Presented by Bo Tang at The 11 th.
INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security.
UTSA Amy(Yun) Zhang, Ram Krishnan, Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio San Antonio, TX Nov 03, 2014 Presented.
Secure Cyber Incident Information Sharing UTSA Team Leads Dr. Ram Krishnan, Assistant Professor, ECE Dr. Ravi Sandhu, Professor (CS) and Executive Director.
Institute for Cyber Security Cross-Tenant Trust Models in Cloud Computing Bo Tang and Ravi Sandhu IRI Aug 14-16, 2013 San Francisco, CA © ICS at UTSA World-Leading.
1 Grand Challenges in Authorization Systems Prof. Ravi Sandhu Executive Director and Endowed Chair November 14, 2011
11 World-Leading Research with Real-World Impact! Risk-Aware RBAC Sessions Khalid Zaman Bijon, Ram Krishnan and Ravi Sandhu Institute for Cyber Security.
11 World-Leading Research with Real-World Impact! Group-Centric Secure Information Sharing: A Lattice Interpretation Institute for Cyber Security Ravi.
1 Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010
Institute for Cyber Security Multi-Tenancy Authorization Models for Collaborative Cloud Services Bo Tang, Ravi Sandhu, and Qi Li Presented by Bo Tang ©
1 RABAC : Role-Centric Attribute-Based Access Control MMM-ACNS 2012 Xin Jin, Ravi Sandhu, Ram Krishnan University of Texas at San Antonio San Antonio,
Relationship-based Access Control for Online Social Networks: Beyond User-to-User Relationships Sep. 3, 2012 PASSAT 2012, Amsterdam, The Netherlands Yuan.
INSTITUTE FOR CYBER SECURITY A Hybrid Enforcement Model for Group-Centric Secure Information Sharing (g-SIS) Co-authored with Ram Krishnan, PhD Candidate,
1 Group-Centric Models for Secure Information Sharing Prof. Ravi Sandhu Executive Director and Endowed Chair March 30, 2012
1 Attribute-Based Access Control Models and Beyond Prof. Ravi Sandhu Executive Director, Institute for Cyber Security Lutcher Brown Endowed Chair in Cyber.
1 Authorization Federation in Multi-Tenant Multi-Cloud IaaS Navid Pustchi Advisor: Prof. Ravi Sandhu.
1 The Authorization Leap from Rights to Attributes: Maturation or Chaos? Prof. Ravi Sandhu Executive Director and Endowed Chair SecurIT 2012 August 17,
1 Role-Based Access Control (RBAC) Prof. Ravi Sandhu Executive Director and Endowed Chair January 29, © Ravi.
1 Secure Cloud Computing: A Research Perspective Prof. Ravi Sandhu Executive Director and Endowed Chair Texas Fresh Air Big Data and Data Analytics Conference.
INSTITUTE FOR CYBER SECURITY 1 Purpose-Centric Secure Information Sharing Ravi Sandhu Executive Director and Endowed Professor Institute for Cyber Security.
Institute for Cyber Security
Institute for Cyber Security
Institute for Cyber Security An Attribute-Based Protection Model
Institute for Cyber Security
Institute for Cyber Security
Past, Present and Future
Institute for Cyber Security
Prosunjit Biswas, Ravi Sandhu and Ram Krishnan
World-Leading Research with Real-World Impact!
An Access Control Perspective on the Science of Security
Institute for Cyber Security (ICS) & Center for Security and Privacy Enhanced Cloud Computing (C-SPECC) Ravi Sandhu Executive Director Professor of.
Attribute-Based Access Control: Insights and Challenges
Institute for Cyber Security
Institute for Cyber Security
ABAC Panel Prof. Ravi Sandhu Executive Director and Endowed Chair
Institute for Cyber Security
Attribute-Based Access Control (ABAC)
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control: Insights and Challenges
ASCAA Principles for Next-Generation Role-Based Access Control
Assured Information Sharing
Institute for Cyber Security
Cyber Security Research: A Personal Perspective
Cyber Security Research: Applied and Basic Combined*
Attribute-Based Access Control (ABAC)
Access Control Evolution and Prospects
Ph.D. Dissertation Defense
Access Control Evolution and Prospects
Presentation transcript:

11 World-Leading Research with Real-World Impact! Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS (Invited Paper) Xin Jin, Ram Krishnan and Ravi Sandhu Institute for Cyber Security University of Texas at San Antonio October 22–25, th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing Institute for Cyber Security

2 World-Leading Research with Real-World Impact! IT Infrastructure Operations

3 World-Leading Research with Real-World Impact! Access Control

4 Infrastructure as a Service (IaaS) Platform as a Service (PaaS) Software as a Service (SaaS) Virtualized hardware infrastructure App dev environment with cloud characteristics Network accessible software Cloud Service Models

5 World-Leading Research with Real-World Impact! “Moving” to Cloud Equivalent policies should be configurable using cloud access control service With virtualization, cloud may provide more fine-grained access control

6 World-Leading Research with Real-World Impact! Access Control in IaaS

7 World-Leading Research with Real-World Impact! Requirements: Intra-CSP

8 World-Leading Research with Real-World Impact! Requirements: Inter-CSP

9 World-Leading Research with Real-World Impact! Key Requirements  Requirements  Tenants’ full control over their access control design  Simple yet flexible administrative policy  Flexible operational model  Strong formal foundations  Existing Models  Industry Models  OpenStack and Amazon Web Service  RBAC-based Models  Using the legend RBAC model  ABAC-based Models  More details to follow

10 World-Leading Research with Real-World Impact! OpenStack (Grizzly Release)  Limitations  Tenant can not configure their own policy, uses cloud role instead  Not able to configure tenant administrator  Access control on operation level, no control on object level  Give identity:createUser permission to role r1, then r1 can create users in any tenant  Give nova:stop permission to role r1, r1 can stop any machine in the tenant  Access control only based on role

11 World-Leading Research with Real-World Impact! AWS Access Control

12 World-Leading Research with Real-World Impact! AWS Access Control  Advantages over OpenStack  Tenant has full control over their own policy, by account root user  Flexible policy : groups, user id, time, address.  Control over resources and operations  Limitations  No automation  Restricted set of attributes  Not flexible enough, group explosion  No extension available (e.g., can not include customized attributes)  No subject and user distinction

 Formal Model  UCON ABC (Park and Sandhu, 01): authorization, mutable attributes, continuous enforcement  Logical framework (Wang et al, 04): set-theory to model attributes  NIST ABAC draft (Hu et al, 13): enterprise enforcement  Policy Specification Language  SecPAL (Becker et al 03, 04), DYNPAL (Becker et al 09), Rule-based policy (Antoniou et al, 07), Binder (DeTreville 02), EPAL1.2 (IBM, 03), FAF (Jajodia et al 01)  Enforcement Models  ABAC for web service (Yuan et al 06), PolicyMaker (Blaze et al 96)  Implementations  XACML: authorization  SAML: pass attributes  OAuth: authorization  Attribute Based Encryption  KP-ABE (Goyal et al 06), CP-ABE (Bethencourt et al 07) 13 World-Leading Research with Real-World Impact! Related ABAC models No difference between user and subject (classical models can not be configured) No relationship of user, subject and object attributes. No difference between user and subject (classical models can not be configured) No relationship of user, subject and object attributes. Focus on authorization and attribute release among organizations Limited Policy Language

14 World-Leading Research with Real-World Impact! Proposed Model  ABAC-alpha model [1] and GURA model [2]  Flexibility  Covers DAC, MAC and RBAC  Potentials to covers various RBAC extensions  Resource-level fine-grained access control  Automation  User attributes inherited by subject and further object, access control automatically added for newly created objects  Ease in policy specification and administration  Attributes defined to reflect semantic meaning and policy specified with certain level of relationship to natural language [1] Xin Jin, Ram Krishnan and Ravi Sandhu, A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC In Proceedings 26th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy DBSec [2] Xin Jin, Ram Krishnan and Ravi Sandhu, A Role-Based Administration Model for Attributes. In Proceedings of the First ACM International Workshop on Secure and Resilient Architectures and Systems (SRAS '12), Minneapolis, Minnesota, September 19, 2012

15 World-Leading Research with Real-World Impact! IaaS ad and IaaS op Model Different types of object may have different sets of attributes.

16 IaaS op Model

17 IaaS ad Model

18 World-Leading Research with Real-World Impact! Proof of concept in OpenStack

19 World-Leading Research with Real-World Impact! OpenStack Authorization for Nova

20 World-Leading Research with Real-World Impact! ABAC Enforcement in OpenStack Enforcement Model I

21 World-Leading Research with Real-World Impact! Alternative Enforcement Models

22 World-Leading Research with Real-World Impact! Conclusion  Summary  We illustrate the case of access control in cloud IaaS  We summarize four core requirements of access control models  Existing models fail to satisfy those requirements  By connecting existing models with additional features, we proposed IaaS op and IaaS ad models based on ABAC  Future work  Different types of attributes: system wide, service-specific attributes.  Various types of subject attributes constraints, object attribute constraints.  Reachability analysis on IaaS op and IaaS ad instance.

23 World-Leading Research with Real-World Impact! Conclusion  Thanks. Questions?