1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at.

Slides:



Advertisements
Similar presentations
ControlSphere is a computer security and automation solution designed to protect user data and automate most of authentication tasks for the user at work.
Advertisements

A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Ubiquitous Computing and Active Spaces The Gaia Approach Fabio Kon Department of Computer Science University of São Paulo, Brazil
A Pervasive Reminder System for Smart Homes Sylvain GIROUX and Simon GUERTIN Département d’informatique, Université de Sherbrooke 2500 boul. Université,
1 Secure Dynamic Reconfiguration of Scalable Systems with Mobile Agents Fabio Kon, Binny Gill, Manish Anand, Roy Campbell, and M. Dennis Mickunas
Using DSVM to Implement a Distributed File System Ramon Lawrence Dept. of Computer Science
The road to reliable, autonomous distributed systems
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Towards Security and Privacy for Pervasive Computing Author : Roy Campbell,Jalal Al-Muhtadi, Prasad Naldurg,Geetanjali Sampemane M. Dennis Mickunas.(2002)
FIT3105 Smart card based authentication and identity management Lecture 4.
Gaia Context and Location-Aware Encryption for Pervasive Computing Environments Jalal Al-MuhtadiRaquel Hill Roy Campbell Dennis Mickunas University of.
1.1 Installing Windows Server 2008 Windows Server 2008 Editions Windows Server 2008 Installation Requirements X64 Installation Considerations Preparing.
Adaptive Directory Services for Highly Dynamic Environments Fabio Kon Department of Computer Science University of São Paulo, Brazil
Using Internet Information Server And Microsoft ® Internet Explorer To Implement Security On The Intranet HTTP.
EEC-681/781 Distributed Computing Systems Lecture 3 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
Rob Jaeger, University of Maryland, Department of Computer Science 1 Active Networking “ The active network provides a platform on which network services.
1 Janos Patrick Tullmann Flux Research Group University of Utah.
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Self-Organizing Adaptive Networks Hari Balakrishnan MIT Laboratory for Computer Science
Parts of a Computer Why Use Binary Numbers? Source Code - Assembly - Machine Code.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
AHM /09/05 AHM 2005 Automatic Deployment and Interoperability of Grid Services G.Kecskemeti, Yonatan Zetuny, G.Terstyanszky,
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
OOPSLA 2000 Workshop The Jini™ Pattern Language © Michael Kircher, Prashant Jain, and Kirthika Parameswaran, The History of the Jini™ Pattern Language.
ISpheres Project. Project Overview iSpheresCore iSpheresImage Demonstration References.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
MILCOM 2001 October page 1 Defense Enabling Using Advanced Middleware: An Example Franklin Webber, Partha Pal, Richard Schantz, Michael Atighetchi,
1 Vrijendra Gokhale, Bernard Menezes K. R. School of Information Technology IIT Bombay User Interfaces for Jini Services The Jini Pattern Language Workshop.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
Wireless Networks of Devices (WIND) Hari Balakrishnan and John Guttag MIT Lab for Computer Science NTT-MIT Meeting, January 2000.
Architectures of distributed systems Fundamental Models
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
1 Introduction to Middleware. 2 Outline What is middleware? Purpose and origin Why use it? What Middleware does? Technical details Middleware services.
Component Technology. Challenges Facing the Software Industry Today’s applications are large & complex – time consuming to develop, difficult and costly.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Intrusion Tolerant Software Architectures Bruno Dutertre, Valentin Crettaz, Victoria Stavridou System Design Laboratory, SRI International
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Future Directions in Middleware Research and Technology Fabio Kon Department of Computer Science University of São Paulo, Brazil
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Distributed Architectures for Medical Systems Andrew A. Kitchen Computer Integrated Surgery 8 March 2001.
1 Choices “Our object-oriented system architecture embodies the notion of customizing operating systems to tailor them to support particular hardware configuration.
Mobile Agent Security Presented By Sayuri Yonekawa October 17, 2000.
Cherubim Dynamic Security System Roy Campbell and Denny Mickunas Tin Qian, Vijay Raghavan, Tim Fraser, Chuck Willis, Zhaoyu Liu Department of Computer.
Jini Architectural Overview Li Ping
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
Proxy Pattern. What’s a Proxy? A remote proxy acts as a local representative of a remote object Remote Object: instantiated in a different JVM heap (a.
OOPSLA 2000 Workshop “The Jini™ Pattern Language” © Michael Kircher, Prashant Jain, and Kirthika Parameswaran, 2000 CORBA Based Jini™ - JinACE Michael.
Java & The Android Stack: A Security Analysis Pragati Ogal Rai Mobile Technology Evangelist PayPal, eBay Java.
Cofax Scalability Document Version Scaling Cofax in General The scalability of Cofax is directly related to the system software, hardware and network.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
BUILD SECURE PRODUCTS AND SERVICES
Security Issues.
3.2 Virtualisation.
Seraphim : A Security Architecture for Active Networks
A mobile single sign-on system
Operating Systems Bina Ramamurthy CSE421 11/27/2018 B.Ramamurthy.
Architectures of distributed systems Fundamental Models
Architectures of distributed systems Fundamental Models
A Component-based Architecture for Mobile Information Access
JINI ICS 243F- Distributed Systems Middleware, Spring 2001
PLANNING A SECURE BASELINE INSTALLATION
Architectures of distributed systems Fundamental Models
A lighttwiht reconfigurable security mechanism for 3G/4G mobile devices 2019/7/1 A Lightweight reconfigurable security mechanism for 3G/4G mobile devices.
Presentation transcript:

1 My Dream of Jini Fabio Kon Jalal Al-Muhtadi Roy Campbell M. Dennis Mickunas Department of Computer Science University of Illinois at Urbana-Champaign

2 Java, Jini, and Active Spaces l Active Spaces project at U. of Illinois l 6 professors, ~25 grads, 3-5 years l Based on l 2K Network-Centric OS (middleware level) l CORBA l Java and C++ l Instantiating Jini patterns using CORBA l Bridges to link our system to real Jini l Byproduct: study strengths and limitations of Jini

3 Security and Privacy l Jini and other Jini-like technologies are going to enter our lives and homes. l Concerns l Protecting from home viruses l Denial of Service attacks l Privacy l Supermarket scenario: l want to get info about products using palmtops l don’t want the supermarket to track us

4 Java is a Good Start l We can protect ourselves using: l bytecode verification l type safety l sandboxes l code signing l But we also need l authentication of users and services l access control l communication integrity and privacy l delegation

5 Jini and TinySESAME Prototype l SESAME (an European security standard) l Jalal Al-Muhtadi (U. of Illinois) l Tiny SESAME: dynamically configurable, component-based subset of SESAME l Authentication through different methods l Different strengths of encryption l Supports Role-Based Access Control l Limited-time certificates

6 Secure Smart Home l Software simulation of a Smart Home l Uses Jini plug-and-play facilities l Uses Tiny SESAME for l mutual authentication l encryption l role-based access control

7 Scaling Up l How to support multiple hierarchical domains? l How to integrate small Jini domains into wide-area and large-scale distributed systems? l Federation of Lookup Servers l Current research at U. of Illinois: l Federation of CORBA Name Servers and Traders l MIT’s “intentional naming system”

8 Hierarchical Organization of Physical Spaces and Traders

9 Scaling Down l Difficult to run JVM in small devices like PalmPilots. l It’s not just a matter of saying “memory and CPU is getting cheaper”. Wearable wrist watches 16-bit CPU, 4 MHz, 2 MB flash memory Wearable wrist watches 16-bit CPU, 4 MHz, 2 MB flash memory Light bulb / paperclip 8-bit CPU, 1 MHz, 8 KB RAM? Light bulb / paperclip 8-bit CPU, 1 MHz, 8 KB RAM?

10 Scaling Down - Possible Solutions 1. Proxies l Run native code objects in the small devices. l Use sockets to talk to Java proxies on the local network. 2. CORBA  Jini bridges l Run small CORBA ORBs in the small devices. l Use bridges to integrate the CORBA clients with the Java/Jini world. 3. CORBA  CORBA

11 Java-related Problems l Dynamic loading is great. But dynamic unloading is also important: l replacing class implementations on the fly l maintaining minimal memory footprint l use different versions of the same class l Hiding platform-specific details is good. l But, access to system resource information is important for adaptable applications.

12 Conclusion l Jini is great but a few desirable features are still missing. l Not everything should be added to the Jini System (simplicity is a great feature). l We should extend the Jini pattern language with patterns related to Security, Proxies, Bridges, Federations,...

13 How to contact us 2K Web site: