Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen Zhang George Mason University SACMAT05, June 1--3, 2005,

Slides:



Advertisements
Similar presentations
Cyber-Identity and Authorization in an Uncertain World Ravi Sandhu Laboratory for Information Security Technology Department of Information.
Advertisements

Towards Usage Control Models: Beyond Traditional Access Control 7 th SACMAT, June 3, 2002 Jaehong Park and Ravi Sandhu Laboratory for Information Security.
Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
© 2006 Ravi Sandhu Secure Information Sharing Enabled by Trusted Computing and PEI * Models Ravi Sandhu (George Mason University and TriCipher)
A Usage-based Authorization Framework for Collaborative Computing Systems Xinwen Zhang George Mason University Masayuki Nakae NEC Corporation Michael J.
© 2006 Ravi Sandhu Cyber-Identity, Authority and Trust Systems Prof. Ravi Sandhu Professor of Information Security and Assurance Director,
Confidential 1 Phoenix Security Architecture and DevID July 2005 Karen Zelenko Phoenix Technologies.
Copyright© 2006 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 Trusted Computing David Grawrock TPM.
Thomas S. Messerges, Ezzat A. Dabbish Motorola Labs Shin Seung Uk.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Vpn-info.com.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
Preventing Theft of Quality of Service on Open Platforms Kwang-Hyun Baek and Sean W. Smith Department of Computer Science Dartmouth College
1 Minimal TCB Code Execution Jonathan McCune, Bryan Parno, Adrian Perrig, Michael Reiter, and Arvind Seshadri Carnegie Mellon University May 22, 2007.
1 Bootstrapping Trust in a “Trusted” Platform Carnegie Mellon University November 11, 2008 Bryan Parno.
Public Key Infrastructure (PKI) Providing secure communications and authentication over an open network.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Using Secure Coprocessors to Protect Access to Enterprise Networks Dr. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Enforcement of Security Policy Compliance in Virtual Private Networks Prof. José Carlos Brustoloni Dept. Computer Science University of Pittsburgh
Trusted Platform Modules: Building a Trusted Software Stack and Remote Attestation Dane Brandon, Hardeep Uppal CSE551 University of Washington.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Trusted Computing Technology and Client-side Access Control Architecture Acknowledgement: Some slides and diagrams are adapted from TCG Architecture Overview,
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture Three.
Trusted Computing Platform Alliance – Introduction and Technical Overview – Joe Pato HP Labs MIT 6.805/ October 2002.
Securing Information Transfer in Distributed Computing Environments AbdulRahman A. Namankani.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
Security in the industry H/W & S/W What is AMD’s ”enhanced virus protection” all about? What’s coming next? Presented by: Micha Moffie.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Hands-On Microsoft Windows Server 2008
Bootstrapping Trust in Commodity Computers Bryan Parno, Jonathan McCune, Adrian Perrig 1 Carnegie Mellon University.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Week #7 Objectives: Secure Windows 7 Desktop
Trusted Computing Platform Alliance
Architecture for Protecting Critical Secrets in Microprocessors Ruby Lee Peter Kwan Patrick McGregor Jeffrey Dwoskin Zhenghong Wang Princeton Architecture.
Trusted Computing Or How I Learned to Stop Worrying and Love the MPAA.
Cryptography, Authentication and Digital Signatures
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
1 NEW GENERATION SECURE COMPUTING BASE. 2 INTRODUCTION  Next Generation Secure Computing Base,formerly known as Palladium.  The aim for palladium is.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
PAPER PRESENTATION ON NETWORK SECURITY ISSUES BY M.D SAMEER YASMEEN SULTHANA.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
Middleware for Secure Environments Presented by Kemal Altıntaş Hümeyra Topcu-Altıntaş Osman Şen.
An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
DIGITAL SIGNATURE.
Trusted Infrastructure Xiaolong Wang, Xinming Ou Based on Dr. Andrew Martin’s slides from TIW 2013.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Trusted Computing and the Trusted Platform Module Bruce Maggs (with some slides from Bryan Parno)
1 Information Security – Theory vs. Reality , Winter Lecture 12: Trusted computing architecture (cont.), Eran Tromer Slides credit:
Fall 2006CS 395: Computer Security1 Key Management.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
INSTITUTE FOR CYBER SECURITY 1 Enforcement Architecture and Implementation Model for Group-Centric Information Sharing © Ravi Sandhu Ram Krishnan (George.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources 1.
IoT Cooperation Strategy
Trusted? 05/4/2016 Charles Sheehe, CCSDS Security Working Group GRC POC All information covered is from public sources.
Trusted Computing and the Trusted Platform Module
Trusted Infrastructure
Trusted Computing and the Trusted Platform Module
Outline What does the OS protect? Authentication for operating systems
Outline What does the OS protect? Authentication for operating systems
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
Assignment #7 – Solutions
User-mode Secret Protection (SP) architecture
Trusted Computing Technology and Client-side Access Control Architecture Acknowledgement: Some slides and diagrams are adapted from TCG Architecture Overview,
Bruce Maggs (with some slides from Bryan Parno)
Bruce Maggs (with some slides from Bryan Parno)
Presentation transcript:

Peer-to-Peer Access Control Architecture Using Trusted Computing Technology Ravi Sandhu and Xinwen Zhang George Mason University SACMAT05, June 1--3, 2005, Stockholm, Sweden With thanks to our Intel colleagues Kumar Ranganathan, Carlos Rozas and Michael Covington

What is trust? Trust –An entity can be trusted if it always behaves in the expected manner for the intended purpose. –Trusted Computing Group (TCG) Previously called Trusted Computing Platform Alliance (TCPA) Includes Intel, Microsoft, IBM, HP Entity –A platform, or an application or service running on a platform. personal computer, personal digital assistant (PDA), smart phone, etc. –A client is a computing platform that can initiate communication with other clients to transfer or share data and resources

Need Trust on the Client Traditional Client/Server Architecture –Trust is on the server side. –Trust is obtained with multi-layer protection mechanisms. Access control Firewall Intrusion detection and intrusion prevention systems –There is little trust on client side. Clients are generally lightly protected. Ubiquitous connectivity in clients Attacks outpacing todays protection models Attack tools readily available Information resident on the client becomes susceptible to software-based attacks. –Mismatch between security and high value of data in client platforms.

Trusted Computing Technology Basic premise –software alone cannot provide an adequate foundation for trust on the client Old style TC –Multics system –Capability-based computers Intel 432 –Trust with security kernel based on military-style security labels Orange Book, eliminate trust from applications Whats new –Hardware and crypto-based root of trust Ubiquitous availability –Trust within a platform –Trust across platforms –Trust in applications No Trojan Horses, ergo no covert channels Little participation from academia or larger research community

Trusted Computing Recent TC activities: –TCG Specifications of TPM (Trusted Platform Module) TPM is hardware root of trust Needs to be ubiquitous –cheap, cheap, cheap –therefore a performance bottleneck –Additional Hardware Intels LaGrande Technology (LT) ARM TrustZone –OS/Software Microsoft Palladium -> NGSCB -> ?? Linux, SE Linux, Trusted BSD –Mostly NSA funded –Supporting PKI

Trusted Platform Module (TPM) Specified by TCPA/TCG Smartcard on board MCH ICH AGP Network Port LPC TPM CPU RAM BIOS TPM is connected to the motherboard Adapted from TCG presentation

TPM Key Hierarchy –Non-Migratable Keys :Permanently bound specific TPM, i.e., platform –Migratable Keys: Can be migrated to other platforms Storage Root Key (SRK) Non-Migratable Storage Key Migratable Storage Key Endorsement Key Migratable Storage Key Migratable Signing Key Non-Migratable Storage Key Non-Migratable Signing Key Migratable Signing or Storage Key Attestation ID Keys Migratable Signing or Storage Key Protected by the RTS Protected by the TPM From TCG presentation

Attestation From Intel presentation

Intels LaGrande Technology (LT) LT includes: –Chipset Protected graphics and memory management –Extended CPU: Enable domain separation Enforce policy for protected memory –Currently DMA bypasses memory protection –Sleep mode on laptops looses memory protection guarantee –Protected I/O: Trusted channel between keyboard/mouse and trusted software –TCG TPM v1.2 Protect keys Provide platform authentication and attestation –Ultra privileged ring -1 Existing ring 0 has too much stuff in it (principally device drivers) Rings 1 and 2 unused, everything outside OS kernel runs in ring 3 New ring -1 privileged beyond OS kernel

Contributions of this paper Integrate user attributes into TC architecture Support a user's ability to roam between platforms by migrating user identities and attribute certificates Consider specific applications

Motivating Applications Trust on client needed in emerging applications –Information Sharing (sometimes called Dissemination Control or DCON) Health records of a patient may be transmitted from a primary physician to a consultant who can access them for some limited period of time and cannot transmit them to anyone else –P2P VOIP application Realtime protection of audio data in a platform –conversation is not eavesdropped or illegally recorded. Forward control of audio object (e.g., voice mail) –control the platform and user to forward –M-commerce electronic currency between peer platforms payment systems for p2p e-commerce (e.g., micropayment, mobile- payment)

Architecture Platform with trusted reference monitor (TRM) Assumptions: –Tamper resistent hardware –A homogeneous environment Each platform is equipped uniformly with necessary TC hardware.

Available Credentials TPM AIK pair (PK TPM.AIK, SK TPM.AIK ) –private key is protected by a TPM with SRK. –Public key is certified by a privacy CA. TRM key pair (PK TRM,SK TRM ) –The private key is protected by the TPM. –The public key is certified by AIK. Application key pair (PK APP,SK APP ) –Similar to TRM key pair TPM storage key(s) –Either the SRK of a TPM, or a key protected by the SRK –Protect TRM's credential –Protect secrets and policies

Functions of TRM TRM.Seal(H(TRM),x): –seals data x by TRM with integrity measurement of H(TRM). –x can only be unsealed under this TRM when the corresponding PCR value is H(TRM). –In practical a set of PCRs may be included. TRM.GenerateKey(k) –generates a secret key k TRM.Attest(H(TRM), PK TRM ) –Return {H(TRM) || PK TRM } SK_TPM.AIK –Attestation response signed by AIK of TPM

Architecture Policy and Secret Distribution: –Each object has a policy. –Object is encrypted with secret key before distribution. –Policy specifies what platform and application can access this object migratable or non-migratable policy

Architecture Policy Enforcement in a client platform –Only valid TRM can unseal the policy info and secret. –This valid TRM (specified by integrity measurement) can enforce the policy.

Revocation Revocation because of –Trust revocation of a requesting application –Trust revocation of a TRM –Trust revocation of a platform Two approaches: –Push: Object owner sends updated policy to client side –Pull: client side check policy update from object owner –Both may have delayed revocation –Instant revocation needs centralized policy server

Support User Attributes Each platform has a user agent (UA) –Controlled by platform administrator –A key pair (PK UA,SK UA ) Each user has an identity key pair (PK u, SK u ) –Migratable key Identity and role certificates:

Support User Attribute Binding of identity and role certificates –tightly-coupled binding: by signature –loosely-coupled binding: by other components

Support User Attribute Role-based policy enforcement: –TRM sends attestation challenge message to the UA. –UA responds with attestation information. –If the TRM trusts the running UA, it sends requesting message for role information of the user. –The UA sends back the role certificate of the user. UA may submit the proof-of-possession for the corresponding private key of the identity public key –Mutual attestation may be needed UA needs to ensure that TRM does not release role information. Role certificate is private information of a user.

Support User Attribute Migration of User Credentials –Identity credential and role credential are migratable. Not bounded to specific platform Can be moved or copied between platforms –Destination platforms determined by identity owner (user)

Applications Secure VOIP: –Realtime Protection of Conversation Secure channel between VOIP software and device driver Attestation between TRM and VOIP software Attestation between TRM and UA Attestation between TRM and device driver –Secure Storage and Forward of Voice Mail A policy specifying authorized platform and user attribute Similar to DCON

Related Work Includes Secure Boot: –Arbaugh et al., Oakland97 –Boot only signed and verified software Secure coporcessors –IBM 4758 crypto coprocessor –Closed system to run certified and signed software Behavior-based attestation –Haldar et al. USENIX04. –Trusted VM Trusted operating systems –SELinux, Trusted Solaris, TrustedBSD Attestation-based policy enforcement –Sailer et al. CCS04 –Controlled access from client to server by attesting client platform

Conclusion Summary –Architecture with TC to support peer-to-peer based access control –General architecture for client-side access control –Consider trust of platforms and applications in access control policy –Integrate user attributes in TC Future work opportunities include: –Performance TPM is highly performance challenged –Access control model with TC A new model? Fit in some component of existing models? –Consider other applications P2P and Ad Hoc networks Grid systems Ubiquitous and pervasive computing environments Information sharing Digital home

OM-AM Objectives Model Architecture Mechanism What? How? AssuranceAssurance TPM, LT, PKI Information Sharing, VoIP, etc This paper focuses here Future work