SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1.

Slides:



Advertisements
Similar presentations
Overview of local security issues in Campus Grid environments Bruce Beckles University of Cambridge Computing Service.
Advertisements

GT 4 Security Goals & Plans Sam Meder
Policy Based Dynamic Negotiation for Grid Services Authorization Infolunch, L3S Research Center Hannover, 29 th Jun Ionut Constandache Daniel Olmedilla.
Chapter 14 – Authentication Applications
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
A Unified Approach to Trust, Delegation, and Authorization Blair Dillaway, Greg Fee Microsoft Corporation Presented at GGF18 Copyright © 2006, Microsoft.
Administrative Policies in XACML Erik Rissanen Swedish Institute of Computer Science.
Lecture 23 Internet Authentication Applications
New Challenges for Access Control April 27, Improving Usability and Expressiveness with Dynamic Policies and Obligations Dennis Kafura Markus Lorch.
Using XACML Policies to Express OAuth Scope Hal Lockhart Oracle June 27, 2013.
The Community Authorisation Service – CAS Dr Steven Newhouse Technical Director London e-Science Centre Department of Computing, Imperial College London.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Authz work in GGF David Chadwick
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Secure Systems Research Group - FAU Patterns for access control E.B. Fernandez.
The EC PERMIS Project David Chadwick
Making certificates programmable1 John DeTreville Microsoft Research April 24, 2002.
Chapter 12 USING TECHNOLOGY TO ENHANCE BUSINESS PROCESSES.
21 June 2006Copyright 2006 University of Kent1 Delegation of Authority (DyVOSE project) David Chadwick University of Kent.
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
SecPAL*: A security policy language to support grid on demand Jason Hogg Program Manager Grid Security Advanced Technology Incubation.
1 July 2005© 2005 University of Kent1 Seamless Integration of PERMIS and Shibboleth – Development of a Flexible PERMIS Authorisation Module for Shibboleth.
Distributed Computer Security 8.2 Discretionary Access Control Models - Liang Zhao.
Understanding Active Directory
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
● Problem statement ● Proposed solution ● Proposed product ● Product Features ● Web Service ● Delegation ● Revocation ● Report Generation ● XACML 3.0.
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
Database Design - Lecture 1
GT Components. Globus Toolkit A “toolkit” of services and packages for creating the basic grid computing infrastructure Higher level tools added to this.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Web Services Security Standards Overview for the Non-Specialist Hal Lockhart Office of the CTO BEA Systems.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Secure Systems Research Group - FAU Using patterns to compare web services standards E. Fernandez and N. Delessy.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Single Sign-On
Supporting further and higher education The Akenti Authorisation System Alan Robiette, JISC Development Group.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-01.
Communicating Security Assertions over the GridFTP Control Channel Rajkumar Kettimuthu 1,2, Liu Wantao 3,4, Frank Siebenlist 1,2 and Ian Foster 1,2,3 1.
Matej Bel University Cascaded signatures Ladislav Huraj Department of Computer Science Faculty of Natural Sciences Matthias Bel University Banska Bystrica.
Manish Mehta, CS 590L Authentication Services in Open Grid Services by Manish Mehta April 27, 2004.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Claims-Based Identity Solution Architect Briefing zoli.herczeg.ro Taken from David Chappel’s work at TechEd Berlin 2009.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Automatic Trust Negotiation Rajesh Gangam
PAPI: Simple and Ubiquitous Access to Internet Information Services JISC/CNI Conference - Edinburgh, 27 June 2002.
Authorisation, Authentication and Security Guy Warner NeSC Training Team Induction to Grid Computing and the EGEE Project, Vilnius,
Key Management. Authentication Using Public-Key Cryptography  K A +, K B + : public keys Alice Bob K B + (A, R A ) 1 2 K A + (R A, R B,K A,B ) 3 K A,B.
Connect. Communicate. Collaborate Deploying Authorization Mechanisms for Federated Services in the eduroam architecture (DAMe)* Antonio F. Gómez-Skarmeta.
1 AHM, 2–4 Sept 2003 e-Science Centre GRID Authorization Framework for CCLRC Data Portal Ananta Manandhar.
Old Dominion University1 eXtensible Access Control Markup Language [OASIS Standard] Kailash Bhoopalam Java and XML.
A Portrait of the Semantic Web in Action Jeff Heflin and James Hendler IEEE Intelligent Systems December 6, 2010 Hyewon Lim.
Adding Distributed Trust Management to Shibboleth Srinivasan Iyer Sai Chaitanya.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
AuthZ WG Conceptual Grid Authorization Framework document Presentation of Chapter 2 GGF8 Seattle June 25th 2003 Document AID 222 draft-ggf-authz-framework pdf.
1 Authorization Sec PAL: A Decentralized Authorization Language.
OGSA Attributes: Requirements, Definitions, and SAML Profile Abstract This document specifies elements and vocabulary for expressing attribute assertions.
Decentralized Access Control: Policy Languages and Logics
Adding Distributed Trust Management to Shibboleth
Grid Security M. Jouvin / C. Loomis (LAL-Orsay)
Computer Security Distributed System Security
O. Otenko PERMIS Project Salford University © 2002
Data Model.
Presentation transcript:

SecPAL Presented by Daniel Pechulis CS5204 – Operating Systems1

SecPAL CS5204 – Operating Systems Overview What and why SecPAL Specifics Logic Examples Implementation Example 2

SecPAL CS5204 – Operating Systems Introduction SecPAL – Security Policy Assertion Language Designed by Microsoft Research Declarative authorization language Designed for distributed systems Simplicity, expressiveness, and efficiency 3

SecPAL CS5204 – Operating Systems Distributed Systems 4

SecPAL CS5204 – Operating Systems Distributed Systems Frequent ad hoc collaborations  No centralized entity to grant authorization No pre-established trust  No certificates or guarantees Separated authorization policies  Different rules, different needs 5

SecPAL CS5204 – Operating Systems Existing Solutions XrML – eXtensible Rights Markup Language XACML – eXtensible Access Control Markup Language SPKI/SDCI – Simple Public Key Infrastructure / Simple Distributed Security Infrastructure Not widely adopted, possibly due to poor usability 6

SecPAL CS5204 – Operating Systems Design Considerations Expressiveness  Delegation of authority – essential in distributed system  Domain specific constraints – promote flexibility  Negation – useful, but must be controlled Clear, readable syntax  XML – too verbose, poor usability  Logic – difficult to follow 7

SecPAL CS5204 – Operating Systems Design Considerations Succinct, unambiguous semantics  Existing solutions do not always terminate or decide  SecPAL – 3 deduction rules for assertions  Managed negation Effective decision procedures  Proven decidable and tractable in polynomial time through translation to constrained Datalog Extensibility  Can be extended without breaking current functionality 8

SecPAL CS5204 – Operating Systems Language Details Assertions  Basic format: ‘ A says fact if fact 1,…,fact n, c ’ A is the issuer fact 1,…,fact n are the conditional facts c is the constraint  Digitally signed by a Security Token Server and sent as tokens Constraints  Can be applied to variables, constants, or built-in functions  Domain includes equality, numerical inequalities, path constraints, and regular expressions 9

SecPAL CS5204 – Operating Systems Language Details (con’t) Semantics  3 basic rules cond – ‘say’ keyword can say – denotes delegation, ceding control to another entity for the decision can act as – asserts that all rules applying to one entity also apply to another 10

SecPAL CS5204 – Operating Systems Grid Example Simple grid system  Interaction between administrative domains with individual policies  Attribute based authorization and delegation Scenario: User Alice wants to perform data mining on cluster  Cluster must fetch file from file server  No trust relationship between Alice and Cluster, or Cluster and File Server 11

SecPAL CS5204 – Operating Systems Grid Example (Step 1) Alice requests execution of command: dbgrep /project/data  ‘STS says Alice is a researcher ’ STS is a trusted security server Identity token issued to validate Alice’s identity  ‘FileServer says Alice can read /project’ FileServer asserts Alice the right to read specified folder  ‘Alice says Cluster can read /project/data if currentTime() <= 07/09/2006’ Alice delegates to Cluster the right to read the file until the specified date 12

SecPAL CS5204 – Operating Systems Grid Example (Step 2) Cluster must authenticate and validate the incoming request Suppose the following local Cluster assertions  ‘Cluster says STS can say 0 x is a researcher ’ Cluster defers to STS to determine who is a researcher STS identified Alice as a researcher earlier step  ‘Cluster says x can execute dbgrep if x is a researcher ’ Cluster grants the right to execute dbgrep if requester is a certified researcher 13

SecPAL CS5204 – Operating Systems Grid Example (Step 3) FileServer verifies action and proceeds Suppose the following local FileServer assertion  ‘FileServer says x can say ∞ y can read file if x can read dir, file contains dir, markedConfidential( file ) ≠ Yes’ x = Alice, y = Cluster say ∞ allows for re-delegation, say 0 does not 14

SecPAL CS5204 – Operating Systems Grid Example (Step 4) Cluster would now send the task to its computation nodes for execution  Each Node could receive a delegation assertion from Cluster (remember say ∞ )  Or, ‘FileServer says Node can act as Cluster’ ‘can act as’ gives every Cluster right to Node 15

SecPAL CS5204 – Operating Systems GridFTP.NET Multiple access types  Attribute based  Role based  “Role-deny” based  Impersonation based  Delegation based  Capability based Entities  Data owner  Resource provider  Virtual Organization (VO)  Data requester 16

SecPAL CS5204 – Operating Systems GridFTP.NET Implementation 17

SecPAL CS5204 – Operating Systems GridFTP.NET Results Successfully implemented most requirements  All use cases satisfied  Some requirements require further study Minimal performance hit (vs gridmap)  10M file – 4.2%  100M file – 1.0% 18

SecPAL CS5204 – Operating Systems19 Questions?

SecPAL CS5204 – Operating Systems References M. Becker, C. Fournet, A. Gordon, “SecPAL: Design and Semantics of a Decentralized Authorization Language,” Cambridge, UK, Microsoft Research. B. Dillaway, “A Unified Approach to Trust, Delegation, and Authorization in Large- Scale Grids,” Redmond, WA, Microsoft Corporation. M. Humphery, S. Park, J. Feng, N. Beekwilder, G. Wasson, J. Hogg, B. LaMacchia, B. Dillaway, “Fine-Grained Access Control for GridFTP using SecPAL,” 8th IEEE/ACM International Conference on Grid Computing (Grid 2007), Austin, TX, Sept 19-21,