Sensorweb Research Laboratory Georgia State University Fundamentals of Computer Security Song Tan Georgia State University
Sensorweb Research Laboratory Georgia State University -2- Outline Concepts about computer security in distributed system. Recent studies about computer security in distributed system. Future vision about the potential research topics.
Sensorweb Research Laboratory Georgia State University -3- Concepts
Sensorweb Research Laboratory Georgia State University -4-Secure? A secure computer and communication system is a robust system that exhibits the characteristics of secrecy, integrity, availability, reliability and safety in the operation of the system. (Randy Chow,1997)
Sensorweb Research Laboratory Georgia State University -5- Secrecy: protection from unauthorized disclosure of system objects. Integrity: only authorized users can modify system objects. Availability: authorized user can have access to the corresponding authorized objects. Reliability and safety: fault-tolerant features.
Sensorweb Research Laboratory Georgia State University -6- Risks and Threats? In a distributed system: Open architecture and interactions across a wide range of autonomous and heterogeneous systems over open communication links. Issue: access control and user authentication. Message passing through a communication network. Issue: protection against spoofing and forging.
Sensorweb Research Laboratory Georgia State University -7- Risks and threats? Transparency: uniform view of a system that has transparent distribution of computation and resources. Interoperability: the ability to have effective information exchange between hosts and between processes. Issues: Interdomain authentication, secure message transfer between domains and interdomain access control.
Sensorweb Research Laboratory Georgia State University -8- Subjects: active entities that access objects. Objects: passive entities whose security attributes must be protected. Access control policy: a security policy that describes how objects are to be accessed by subjects. Flow control policy: a security policy that describes how the information flow is to be regulated.
Sensorweb Research Laboratory Georgia State University -9- Security threats and protection approaches
Sensorweb Research Laboratory Georgia State University -10- Distributed security architecture
Sensorweb Research Laboratory Georgia State University -11- Recent Studies
Sensorweb Research Laboratory Georgia State University -12- Segregate Applications at System Level to Eliminate Security Problems: resource separating and grouping mechanism that physically and logically separates system resources by adaptable scale to eliminate security problems and reduce the overall cost.
Sensorweb Research Laboratory Georgia State University -13- Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control: An approach to design a multi- agent systemmanaging a security management system corporate memory in the form of adistributed semantic Web and describes the resulting architecture.
Sensorweb Research Laboratory Georgia State University -14- Future vision
Sensorweb Research Laboratory Georgia State University -15- Cloud Security Issues Assurance in service level agreements (SLA) about the users’ private data. The security of corporate data in Software as a service (SaaS), Platform as a service (PaaS), and Infrastructure as a service (IaaS) environment. VM level attacks: VM(Virtual Machine) technology used by cloud vendors are a potential problem in multi-tenant architecture. Enterprises have to merge cloud security policies with their own security metrics and policies.
Sensorweb Research Laboratory Georgia State University -16- References R.Chow, T.Johnson. Distributed Operating system & Algorithm,1997. CJ.Jone, “Segregate Applications at System Level to Eliminate Security Problems”, Cluster Computing and the Grid Workshops, Sixth IEEE International Symposium, Kandukuri, B.R.; Paturi, V.R.; Rakshit, A., Adv. Software Technol.” Cloud Security Issues”, Services Computing, SCC '09. G.A.S. Torrellas ; D.V. Cruz, Security in a PKI-based networking environment: a multi-agent architecture for distributed security management system & control, Computational Cybernetics, ICCC Farzad Sabahi,” Virtualization-Level Security in Cloud Computing”, Communication Software and Networks (ICCSN), 2011
Sensorweb Research Laboratory Georgia State University -17- Thank You