Distributed Trust Management security1.win.tue.nl/~zannon e/teaching/dtm10-11.html.

Slides:



Advertisements
Similar presentations
1 ABCs of PKI TAG Presentation 18 th May 2004 Paul Butler.
Advertisements

Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Using Multi-Encryption to Provide Secure and Controlled Access to XML Documents Tomasz Müldner, Jodrey School of Computer Science, Acadia University, Wolfville,
Grid Computing, B. Wilkinson, 20045a.1 Security Continued.
Decentralized Trust Management Sandro Etalle Jerry den Hartog.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Information Security & Cryptographic Principles. Infosec and Cryptography Subjects / Topics : 1. Introduction to computer cryptography 1. Introduction.
RBAC and Usage Control System Security. Role Based Access Control Enterprises organise employees in different roles RBAC maps roles to access rights After.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Grid Security. Typical Grid Scenario Users Resources.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Computer Security Key Management
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Security Issues in Physics Grid Computing Ian Stokes-Rees OeSC Security Working Group 14 June 2005.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
CMSC 414 Computer (and Network) Security Lecture 2 Jonathan Katz.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
1 Digital Signatures CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 12, 2004.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
21 June 2006Copyright 2006 University of Kent1 Delegation of Authority (DyVOSE project) David Chadwick University of Kent.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
An Introduction to Decentralized Trust Management Sandro Etalle University of Twente thanks to William H. Winsborough – University of Texas S. Antonio.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Secure Electronic Transaction (SET)
Masud Hasan Secue VS Hushmail Project 2.
Security Policy What is a security policy? –Defines what it means for a system to be secure Formally: Partition system into –Secure (authorized) states.
Csci5233 Computer Security1 Bishop: Chapter 10 (Cont.) Key Management: Storage & Revoking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Extending Forefront beyond the limit TMG UAG ISA IAG Security Suite
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
@Yuan Xue CS 285 Network Security Fall 2008.
Configuring Directory Certificate Services Lesson 13.
Proof-Carrying Code & Proof-Carrying Authentication Stuart Pickard CSCI 297 June 2, 2005.
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
G53SEC 1 Access Control principals, objects and their operations.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
Academic Year 2014 Spring Academic Year 2014 Spring.
Creating and Managing Digital Certificates Chapter Eleven.
Introduction to Access Control and Trust Management Daniel Trivellato.
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
Access Control Lesson Introduction ●Understand the importance of access control ●Explore ways in which access control can be implemented ●Understand how.
Computer Security: Principles and Practice
2/1/20161 Computer Security Foundational Results.
Doc.: IEEE /0098r0 Submission July 2010 Alex Reznik, et. al. (InterDigital)Slide Security Procedures Notice: This document has been.
Pertemuan #8 Key Management Kuliah Pengaman Jaringan.
Prof. Reuven Aviv, Nov 2013 Public Key Infrastructure1 Prof. Reuven Aviv Tel Hai Academic College Department of Computer Science Public Key Infrastructure.
Decentralized Access Control: Overview Deepak Garg Foundations of Security and Privacy Fall 2009.
TAG Presentation 18th May 2004 Paul Butler
Decentralized Access Control: Policy Languages and Logics
Key management issues in PGP
Lan Zhou, Vijay Varadharajan, and Michael Hitchens
Grid Security.
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Authentication Applications
O. Otenko PERMIS Project Salford University © 2002
Appropriate Access InCommon Identity Assurance Profiles
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

Distributed Trust Management security1.win.tue.nl/~zannon e/teaching/dtm10-11.html

Course Organization Introduction AC, DTM topics based on research papers  Next week: Discretionary Access Control Website:  List of Topics  Papers to read security1.win.tue.nl/~zannone/teaching/dtm10-11.html

The need for Data Protection Confidential data  Databases with essential business information Private data  EHR, RFID, OVchip, `Slimme meter’ Risks & Threats. News headlines:  Bank looses unencrypted laptop with client db  Job seekers victim identity theft  Hacker publishes 14 million stolen passwords  Justice demands pictures ov-chipcard travelers ...

The need for Trust Decision on interaction with other entity:  Value to give to information in this lecture.  Give access to a resource. Incomplete information  Is the information correct, state-of-the-art?  How will the resource be used?

Trust Management Establishing trust in the digital world TrusterTrustee Gives Trust Subjective, perceived probability Claims/Shows Trustworthiness Trust me I’m a doctor

Controlling access to resources Who is trusted to do what with a resource  Subject, Action, Object I’m Bob Bob May Park

Access Control Matrix Policy: Students may read grade list and read and run submitPaper Teacher may read and write grade list and submitPaper So we are done ? UserGradeListSubmitPaper Jerryrw Jorisrrx Timrrx

Controlling access to resources Enforcement, Implementation Maintenance, Consistency  Captures intended policy (how to check?)  Dynamicity; Rights not constant Specification, Policies  Authority on the resource; Who decides? Decentralized systems, Delegation.  Conditions, Obligation, Purpose Privacy  Anonymity, attribute based AC CENSORED

Access Control Lists Enforcement & Maintenance UserGradeListSubmitPaper Jerryrw Jorisrrx Timrrx UserSubmitPaper Jerryrw Jorisrx Timrx

Role base access control (1) Role (Similar to `group’)  Teacher  Student Assign access rights to Roles and Roles to users Added Indirection makes for easier maintenance RoleGradeList Teacherrw Studentr RoleUsers TeacherJerry StudentJoris, Tim 1) RBAC treated in more detail in a later lecture.

Role dependency (Role Hierarchies) Staff Prof Lecturer ScientificFinancial... Legal... Staff may Enter Building  Staff rights also granted to Professors

Decentralized AC Different authorities at different locations  UT admin does not control TU/e resources Different Hierarchies for different locations  In NL PhD student is subrole of Employee  in US PhD student is subrole of Student Access control for distributed resources?  TU/e student list, US student discount.

Delegation Define your roles based on roles of other users:  Jerry.StudentsInMyClass = EducationOffice.RegisteredStudents2IS25 Trust Management Issue:  I trust education office to define registered student role  In turn education office may trust registration office EducationOffice.RegisteredStudents2IS25 = RegistrationOffice.Student and WebServer.subscribed2IS25

Towards Rule based TM Can specify `trust rules’  Link roles in different Hierarchies  Difficulty: Naming Conventions e.g. AIO – PhD student More fine grained control Different Roles for different users/locations  Jerry.StudentsInMyClass  Sandro.StudentsInMyClass  EducationOffice.RegisteredStudents2IF34

Why trust? Trust needed for cooperation  Cannot control behaviour of other people/systems Base of trust  Own experience and experience of others  Regulations  Technical measures (see also next slide)  Taking a risk (risk vs benefit analysis when possible) `Good’ behaviour slowly enforces/builds trust `Bad’ behaviour quickly lowers trust

Why Trust (Cont.) ? Trusting remote computation  Trusted computing platform Hardware chip base chain of trust – chip checks signatures of programs to ensure they are not altered, can do essential computation steps.  Smartcards protect information, applications from device holder

Trust Management Main TM classes  Rule based TM E.g. based on Regulations Trusted parties can be exactly determined trust ~ formal relationship  Reputation based TM E.g. when based on behaviour, recommendations trust ~ subjective probability `correct’ behaviour Trust me I’m a doctor

Rule Based Trust Management Example systems  Role based trust management (RT)  SDKI/SPKI  … Example scenario  Student at accredited university gets discount Shop.Discount ← AccBody.Univ.Student AccBody.Univ ← TUe TUe.Student ← Alice

Rule Based Trust Management Distributed, Open  Each participant is authority, issues credentials  Participants can join, leave Delegation  entrust credentials of others Binary  User either fully trusted or not trusted Static trust level  No change based on actions of the user

Reputation System Example E-bay transaction feedback system Eigentrust: More advanced combination

Reputation Systems Scenario Joint ordering to get bulk discount More participants = more savings Do have to show up when the book arrives Allow friends to join & recommend others  Alice joins  Bob does not join but recommends Charlie  Charlie does not join but recommends Dave...

Reputation Based TM Main properties  Distributed, Open Each participant is an authority Issues its own recommendations/feedback.  Delegation Place trust in the recommendations of others.  Multilevel and dynamic trust level level of trust actions influences the level of trust

Common features TM classes Combine info from different sources  trust sources providing information Openness; Anyone can  join or leave the system  issue credentials/recommendations Other participants decide on their value

Differences TM classes Role of risk:  In rule based systems certificates state facts  Reputation systems include intrinsic risk; reputation does not give any guarantees. (“ In het verleden behaalde resultaten geven geen garantie voor de toekomst ”) Yes / No verses numerical. Reputation changes with actions; level of trust is dynamic.

Back to specification of access rights AC matrix snapshot for single location TM meant to link locations Policies to capture `rules’  Rules underlie the permissions in AC matrix  Derive, Update, Maintain permissions  E.g. Logic in access control

Logic in Access Control Express AC rules with logical formulas:  Rights expressed by predicates: may-access(p,o,r): principle p has access right r to object o  Basic rules can also be expressed: may-access(p,o,Wr) → may-access(p,o,Rd) write access implies read access  Different ways to generalize this principle

Logic in Access Control (2) Complications of distributed systems Often used construct: `SAYS’  for stating requests  for delegation, e.g. p says may-access(q,o,r) p says may-access(q,o,r) => ( may-access(p,o,r) => may-access(q,o,r) )

Expressing the intended policy AC matrix not expressive enough  e.g. no rules Just add anything you can think of ? Limit on expressiveness  Illustrate with Take-grant model

Take-Grant model Directed graph represents AC matrix.  Edge Role -- Object labeled with right (e.g. read/write) Delegation rights added  Edge between Roles: can take/may grant rights Changes in response to delegation actions  Rules for changing graph

Take-Grant Model example File R,W AliceBob t File R,W AliceBob t R,W Example of an application of the Take-rule; Bob takes Alice’s read/write permission

Safety problem Can subject obtain a right? Given delegation rules, initial permissions: can a given permission be granted ? Decidable in linear time if delegation rules fixed to Take-Grant model [Jone76]. Undecidable in general (details next week)  Not possible to create algorithm  Takes as input set of rules and starting configuration  Always stops with the correct decision. (Equivalent to the Turing halting problem.)

Implications Undecidability of safety shows limits; AC policy language cannot be too expressive  Efficiently decide whether users have a right  Check safety properties before granting right  Complexity in understanding Difficulty:  find AC specification mechanism simple to understand effectively computable sufficiently expressive

Implementation: Certificates Proof that you are a member of a role  Student card issued by registration office More generally: Binding of properties (attributes) to an identity (public key) signed by the cerfitication authority (issuer of role student). Proof that a role is defined in a given way  Education office can issue a single certificate stating EduOffice.RegStudents2IS25 = RegOffice.Student and WebServer.subscribed2IS25 rather than giving a different certificate to each student

Using Certificates Use a chain of certificates to proof role membership  Student card to proof student  confirmation webserver to show registered  education office registration policy certificate (Automatic) Chain discovery can be difficult  who stores certificates  where to look for certificates

PKI & certificate systems PKI  Public key cryptosystem, e.g. RSA  Certificate links public key to identity.  Trust based on authority that signs Trusted roots predefined in web browser trust by numbers (PGP) examples of PKI/certificate based systems:  X.509 – Certificates bind a public key to a name(string)  SPKI: PKI with focus on authorization (rather than authentication), binding properties directly to public keys  Kerberos: Single sign on system; the user gets a `ticket’ for use of a service. Ticket is a form of certificate  PGP: Often used for encryption and signing of . No central CAs for distribution of public keys.

Conclusions Basics of decentralized trust management  Distributed access control  Delegation control Remaining Lectures treat  Access Control  Privacy Policies  Rule based Trust Management  Reputation Systems  Applications of TM Systems Please check papers & info at: security1.win.tue.nl/~zannone/teaching/dtm10-11.html

Recommended Reading Decentralized Trust Management, M. Blaze et al.  the PolicyMaker trust management system.  comparison with X.509 and PGP. Formal Models for Computer Security, C. Landwehr  Overview of classical data security notions and systems

The End