CDNI Metadata Interface (draft-ma-cdni-metadata-01) Kevin J. Ma

Slides:



Advertisements
Similar presentations
Metadata and Search at Boeing Julie Martin Library & Learning Center Services
Advertisements

ECHO Browse Reclassification Document ID: ECHO_Ops_Con_023 Version: 2.
OASIS OData Technical Committee. AGENDA Introduction OASIS OData Technical Committee OData Overview Work of the Technical Committee Q&A.
Operating System Security
Session-Independent Policies draft-ietf-sipping-session-indep-policy-01 Volker Hilt Gonzalo Camarillo
Query Verb Proposal Ashok Malhotra, Oracle
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: LB1c-handover-issues.ppt Title: MIH Security – What is it? Date Submitted:
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
Web Architecture & Services (2) Representational State Transfer (REST)
1 Designing a Data Exchange - Best Practices Data Exchange Scenarios –Sender vs. Receiver-initiated exchanges –Node Design Best Practices: –Handling Large.
CollectionSpace Service REST-based APIs June 2009 Face-to-face Aron Roberts U.C. Berkeley IST/Data Services.
CODD’s 12 RULES OF RELATIONAL DATABASE
CRISP Requirements Discussion draft-ietf-crisp-requirements-02.txt Andrew Newton 55 th IETF, November 19, 2002 Atlanta, GA.
Chapter 8 Cookies And Security JavaScript, Third Edition.
What is MOF? The Meta Object Facility (MOF) specification provides a set of CORBA interfaces that can be used to define and manipulate a set of interoperable.
(Business) Process Centric Exchanges
23-Oct-15 Abstract Data Types. 2 Data types A data type is characterized by: a set of values a data representation, which is common to all these values,
Intra-CDN Provider CDNi Experiment Ge Chen Mian Li Hongfei Xia
In-Band Access Control Framework Group Name: WG4 SEC Source: Qualcomm Meeting Date: Agenda Item:
Database Systems DBMS Environment Data Abstraction.
Maintaining a Database Access Project 3. 2 What is Database Maintenance ?  Maintaining a database means modifying the data to keep it up-to-date. This.
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
CDNI Requirements (draft-lefaucheur-cdni-requirements-02) CDNI Working Group IETF 81 Quebec City, Canada July 28, 2011 Kent Leung Yiu.
Models for adaptive-streaming-aware CDNI - File Management and Content Collections draft-brandenburg-cdni-has-01, section 3.1 CDNI Extended Design Team.
Internet & World Wide Web How to Program, 5/e. © by Pearson Education, Inc. All Rights Reserved.2.
CSE314 Database Systems Lecture 3 The Relational Data Model and Relational Database Constraints Doç. Dr. Mehmet Göktürk src: Elmasri & Navanthe 6E Pearson.
Applicability and Tradeoffs of ICN for Efficient IoT draft-lindgren-icnrg-efficientiot-01 presented by Adeel Malik IRTF ICNRG Interim ICNRG meeting, Paris.
1 Registry Services Overview J. Steven Hughes (Deputy Chair) Principal Computer Scientist NASA/JPL 17 December 2015.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
RESTful Web Services What is RESTful?
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
REST By: Vishwanath Vineet.
Content Terminology in CDNI draft-deventer-cdni-content-terminology IETF 81 – Quebec, CDNI WG Oskar van Deventer Ray van Brandenburg.
CDNI Requirements draft-lefaucheur-cdni-requirements-01 Mohamed Boucadair Christian Jacquenet
Currently Open Issues in the MIPv6 Base RFC MIPv6 security design team.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Security API discussion Group Name: SEC Source: Shingo Fujimoto, FUJITSU Meeting Date: Agenda Item: Security API.
Network Security Celia Li Computer Science and Engineering York University.
COEN 350: Network Security E-Commerce Issues. Table of Content HTTP Authentication Cookies.
CDN Interconnect Metadata draft-ietf-cdni-metadata-00 Ben Niven-Jenkins David Ferguson Grant Watson.
Database Form Processing Made Easy Chad Killingsworth Web Projects Coordinator.
CDNI Capabilities Interface draft-ma-cdni-capabilities-00 Kevin J. Ma 1.
CDNI Video Publisher Use cases (draft-ma-cdni-publisher-use-cases-00) Kevin J. Ma
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
CAS Proxying and Web Services The somewhat “easy way” Presented By: Joseph Mitola Programmer/Analyst Office Of The Registrar.
Draft-fieau-https-delivery-delegation-02 A CDNi Use case Lurk BoF Frédéric Fieau Orange Emile Stephan, Benoît Gaussen IETF 95 – Buenos Aires.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
© 2010 IBM Corporation RESTFul Service Modelling in Rational Software Architect April, 2011.
Introduction: Databases and Database Systems Lecture # 1 June 19,2012 National University of Computer and Emerging Sciences.
DECADE Requirements draft-gu-decade-reqs-05 Yingjie Gu, David A. Bryan, Y. Richard Yang, Richard Alimi IETF-78 Maastricht, DECADE Session.
CDNI URI Signing (draft-leung-cdni-uri-signing-01) CDNI Working Group IETF 85 Atlanta, Georgia November 8, 2012 Kent Leung
Database System Implementation CSE 507
MQTT-255 Support alternate authenticaion mechanisms
Database Management.
Better RESTFul API – Best Practices
Models for adaptive-streaming-aware CDNI - Content Acquisition and Content Collections draft-brandenburg-cdni-has-01, section 3.2 CDNI Extended Design.
Hypertext Transfer Protocol
JDBC.
Aggregation Aggregations operations process data records and return computed results. Aggregation operations group values from multiple documents together,
RMS with Microsoft SharePoint
WEB API.
Resource Certificate Profile
$, $$, $$$ API testing Edition
WebDAV Design Overview
Greta Mameniskyte IV course 3rd group
Presentation transcript:

CDNI Metadata Interface (draft-ma-cdni-metadata-01) Kevin J. Ma

CDNI Metadata Requirements Metadata Push (META-3, META-4) Metadata Modify/Remove (META-7, META-8) Hierarchical Metadata and Metadata Grouping (META-9, META-10, META-11, META-12) CDNI Defined Metadata (META-15) – Content Acquisition (META-5, META-6) – Delivery Restrictions (META-14) – Request Authorization (META-17) Opaque Metadata (META-16) Metadata Rejection (META-13)

Data Model and API MetadataDomainBaseAddr Agent 10..* 1..*1 1 1 Domain create/modify (POST), retrieval (GET), and removal (DELETE) – Domains provide information about and group Agents and Metadata. Agent create/modify (POST), retrieval (GET), and removal (DELETE) – Agents provide basic access control differentiation for Metadata. Metadata create/modify (POST), retrieval (GET), and removal (value=“”) – Metadata is stored as opaque name/value pairs, grouped by URI. – Metadata is indexed by domain, agent, and URL (BaseAddr + URI). – Metadata has a flag to force rejection of metadata that cannot be enforced. – Metadata values support any semantic representation. – Metadata is removed by clearing the value field.

Opaque Metadata Distribution Opaque representation in the data model provides support for both well- known and unknown metadata which may be encountered: – Opaque distribution does not prevent specifying rich semantics; nor does it increase complexity or workload for specifying individual metadata semantics; Opaque representation in the data model simply adds a layer of abstraction. – Opaque distribution supports extensibility for future metadata. Opaque representation in the data model separates metadata semantics from basic elements of generic metadata distribution: – Name/Value: The semantics of the metadata contained in ‘value’ are associated with the metadata ‘name’, but independent of the URI, Mandatory Flag, and TTL which apply to all metadata objects. – BaseAddr/URI: Metadata is associated with request URIs and BaseAddrs. URI wildcards define hierarchical sets of content. – Mandatory Flag: Handling of unenforceable metadata must be deterministic. The mandatory flag specifies when to reject unknown and/or unsupported metadata (i.e., mandatory metadata must either be enforced or rejected). – TTL: Metadata may be automatically invalidated via an optional TTL.

Opaque Metadata Examples Some metadata may only require simple string values: – Acquisition Base URL – Content Activation Time: T01:00:00.00Z – Content Deactivation Time: T03:30:00.00Z Other metadata may require more complex object representations: – URL Hash: h e 5000 epoch XXX prepend md5

Metadata Interface Security Attacks against the metadata interface poses risks to content delivery: – Inability to retrieve content acquisition metadata, or the altering of content acquisition metadata may prevent content acquisition and delivery. – Inability to distribute security metadata, or the altering of security metadata may allow content to be delivered insecurely or otherwise violate distribution licensing or media rights. – Insertion of bogus request filters or other mandatory metadata may prevent content delivery. – Insertion of bogus mandatory metadata may prevent request delegation. – Impersonation of a dCDN may allow unauthorized access to content. Spoofing of valid CDNs may be prevented using mutual authentication or host filtering, however, segregation of metadata between multiple valid dCDNs requires association of authentication credentials with metadata. – The agent associated with each metadata object provides this abstraction. – Only metadata intended for the requesting agent should be returned. – Only agents with proper credentials should be able to modify metadata. – Need to verify agent name relationship to authentication credentials.

Next Steps: WG Feedback There are multiple metadata interface proposals currently being discussed: – Does the WG feel that this proposal meets the needs as defined in the requirements document and/or are those requirements sufficient? – Does the WG feel that there is merit in continuing to work on this particular proposal? – Does the WG feel that there are any particular aspects of this proposal that should be pursued and/or should be abandoned?