SECURITY IN DISTRIBUTED FILE SYSTEMS Tejaswini Kalluri, Venkata Prudhvi Raj Konda, Kanna Karri.

Slides:



Advertisements
Similar presentations
Secure Data Storage in Cloud Computing Submitted by A.Senthil Kumar( ) C.Karthik( ) H.Sheik mohideen( ) S.Lakshmi rajan( )
Advertisements

Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Chapter 19: Network Management Business Data Communications, 5e.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
An Introduction to Secure Sockets Layer (SSL). Overview Types of encryption SSL History Design Goals Protocol Problems Competing Technologies.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Chapter 1 – Introduction
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential The Internet offers no inherent security services to its users; the data transmitted.
Principles of Information Security, 2nd edition1 Cryptography.
Java Security Model Lab#1 I. Omaima Al-Matrafi. Safety features built into the JVM Type-safe reference casting Structured memory access (no pointer arithmetic)
LAB#2 JAVA SECURITY OVERVIEW Prepared by: I.Raniah Alghamdi.
Distributed File Systems Chapter 11
FIT3105 Smart card based authentication and identity management Lecture 4.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Wide-area cooperative storage with CFS
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Alexander Potapov.  Authentication definition  Protocol architectures  Cryptographic properties  Freshness  Types of attack on protocols  Two-way.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
Chapter 31 Network Security
Chapter 10: Authentication Guide to Computer Network Security.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
A Brief Overview by Aditya Dutt March 18 th ’ Aditya Inc.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Technology Overview. Agenda What’s New and Better in Windows Server 2003? Why Upgrade to Windows Server 2003 ?  From Windows NT 4.0  From Windows 2000.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Authors: Jiann-Liang Chenz, Szu-Lin Wuy,Yang-Fang Li, Pei-Jia Yang,Yanuarius Teofilus Larosa th International Wireless Communications and Mobile.
W HAT IS H ADOOP ? Hadoop is an open-source software framework for storing and processing big data in a distributed fashion on large clusters of commodity.
1 Boundary Control Chapter Materi: Boundary controls:  Cryptographic controls  Access controls  Personal identification numbers  Digital signatures.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Scalable Web Server on Heterogeneous Cluster CHEN Ge.
Chapter 21 Distributed System Security Copyright © 2008.
Strong Security for Distributed File Systems Group A3 Ka Hou Wong Jahanzeb Faizan Jonathan Sippel.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Peer-to-Peer Network Tzu-Wei Kuo. Outline What is Peer-to-Peer(P2P)? P2P Architecture Applications Advantages and Weaknesses Security Controversy.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Authors: Jiann-Liang Chenz, Szu-Lin Wuy, Yang-Fang Li, Pei-Jia Yang,
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
9.2 SECURE CHANNELS JEJI RAMCHAND VEDULLAPALLI. Content Introduction Authentication Message Integrity and Confidentiality Secure Group Communications.
Distributed File System. Outline Basic Concepts Current project Hadoop Distributed File System Future work Reference.
PARALLEL AND DISTRIBUTED PROGRAMMING MODELS U. Jhashuva 1 Asst. Prof Dept. of CSE om.
Security of the Internet of Things: perspectives and challenges
Cryptography CSS 329 Lecture 13:SSL.
Chapter 6: Securing the Cloud
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
File System Implementation
SECURITY IN DISTRIBUTED FILE SYSTEMS
Cloud Testing Shilpi Chugh.
Chapter 2: Operating-System Structures
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Chapter 2: Operating-System Structures
Presentation transcript:

SECURITY IN DISTRIBUTED FILE SYSTEMS Tejaswini Kalluri, Venkata Prudhvi Raj Konda, Kanna Karri

Overview Chapter 11 from textbook Research Paper: Strong Security for Distributed File System Research Paper: Implement A Reliable and Secure Cloud Distributed File System Future work

11.8 Security Security in distributed file systems organized along a client-server architecture is to have the servers handle authentication and access control. This is a straightforward way of dealing with security, an approach that has been adopted. NFS is an example of traditional approach.

Security in NFS Security in NFS mainly focuses on the communication between a client and a server. Secure communication means that a secure channel between the two should be set up. In addition to secure RPCs, it is necessary to control file accesses which are handled by means of access control file attributes in NFS.

Security in NFS A file server is in charge of verifying the access rights of its clients. NFS is layered on top of an RPC system, setting up a secure channel in NFS boils down to establishing secure RPCs (Remote Procedural Calls).

Secure RPCs With the introduction of NFSv4, security is enhanced by the support for RPCSEC_GSS. RPCSEC_GSS is a general security framework that can support a myriad of security mechanism for setting up secure channels. In particular, it not only provides the hooks for different authentication systems, but also supports message integrity and confidentiality, two features that were not supported in older versions of NFS. It should be noted that because RPCSEC_GSS is implemented as part of the RPC layer that underlies the NFS protocols.

Secure RPCs The important aspect of secure RPC in NFS is that the designers have chosen not to provide their own security mechanisms, but only to provide a standard way for handling security.

Access Control Authorization in NFS is analogous to secure RPC: it provides the mechanisms but does not specify any particular policy. Access control is supported by means of the ACL (Access Control List) file attribute.

Decentralized Authorization One of the main problems with systems such as NFS is that in order to properly handle authentication, it is necessary that users are registered through a central system administration. A solution to this problem is provided by using the Secure File Systems (SFS) in combination with decentralized authentication servers. The SFS client is responsible for setting up a secure channel with an SFS server. It is also responsible for communicating with a locally-available SFS user agent, which is a program that automatically handles user authentication.

Decentralized Authorization The organization of SFS

Secure Peer-to-Peer File-Sharing Systems Secure Lookups in DHT-Based Systems for secure routing Secure routing requires that three issues are dealt with: 1.Nodes are assigned identifiers in a secure way. 2.Routing tables are securely maintained. 3.Lookup requests are securely forwarded between nodes.

Strong Security for Distributed File Systems This paper proposes three different security schemes that can be implemented on a distributed file system.

Introduction Distributed Storage replaced traditional centralized storage In these systems, disks are attached directly and rely upon their own security, rather than using server’s protection This arrangement makes security more difficult as the disk is directly exposed to potential attacks instead of being hidden Encrypting files using standard encryption provides security but it is an ad hoc mechanism. It does not deal with issues such as sharing files between users The goal is to address the security shortcomings of file systems while preserving the flexibility and performance of distributed file systems.

Design Goals End-to-end Encryption – The first feature is end-to-end encryption of all file system data and metadata, including storage on disk. Data integrity - A user reading data from the server must be sure that the files received are those he originally stored Flexibility - While it would certainly be possible to simply encrypt each file with a user’s password, this approach is impractical because it makes file sharing difficult High Performance and Scalability – Performance is usually the trade off for security

SNAD – Secure Network Attached Disk The basic mechanism behind SNAD is to encrypt all data at the client and give the server sufficient information to authenticate the writer and the reader and verify the end-to-end integrity of the data SNAD relies upon several standard cryptographic tools. The client uses a standard algorithm such as RC5 to encrypt the data, ensuring that the data is unreadable SNAD also makes extensive use of cryptographic hashes and keyed hashes. Cryptographic hashes such as MD5 and SHA-1 are used Keyed hashes such as HMAC (hashed message authentication code) use a cryptographic hash in conjunction with a shared secret to check integrity and authenticate a writer.

SNAD Data Structures Secure Data Object – Minimum unit of data can be read or written in the secure file system File Object – Composed of one or more data objects along with per file metadata Key Object – Composed of Unique Id, User id last modified and Permissions Certificate Object – Contains list of tuples that include user ID, public key, HMAC key, and timestamp

3 Security Schemes Scheme 1: The most secure authentication mechanism Users sign the checksum of every block they write using public-key encryption, and for the disk to authenticate every block before writing If the checksum is cryptographically strong this mechanism is very secure, and allows the system to track the last writer for each block. Signature generation and checking are slow operations

3 Security Schemes Scheme 2: Reduces the load on the disk’s CPU by replacing the signature check at the server with a message authentication code (MAC) check. The client still generates a signature and checks it upon reading a block, but the disk need not perform such an expensive check, improving overall performance. The improvement of performance with this scheme is with loss of some security

3 Security Schemes Scheme 3: Further improves performance by dispensing with signatures altogether Instead, it uses combinations of cryptographic hashes to ensure data integrity throughout the system This scheme is considerably faster because it requires no signature generation or checking However, it is not possible to verify who last wrote a file

Implement A Reliable and Secure Cloud Distributed File System In this paper, a distributed file system based on Apache Hadoop is implemented, and the original Hadoop distributed file system is replaced with the Tahoe least-authority file system.

Introduction Cloud computing is based on the Internet, and the users and mobile users can share resources every time and everywhere through Internet and heterogeneous networks access Resources of cloud computing are virtualized and dynamic allocated. Therefore, the resources are able to utilize widely and efficiently According to the user types, the cloud computing can be approximately classified into three types that are public cloud, private cloud and hybrid cloud Cloud computing can be classified into three types according to the service types, such as Software as a Service (SaaS), Platform as a Service (PaaS) and Infrastructure as a Service (IaaS)

Apache Hadoop Hadoop is an open source project which is dedicated to develop scalable, reliable and distributed computing implementations Features of Hadoop:  Vast amounts of data – Capabilities for enormous storage and computing. Features of massive computing  Cost Efficiency – Low construction cost and improves performance by clustering the computing resources together  Parallel Computing – Achieved with the help of distributed architecture  Robustness – High availability and fault tolerance

Apache Hadoop Architecture Design concept of Hadoop refers to Google. These three techniques are individually mapping to Hadoop Distributed File System (HDFS), Hadoop MapReduce and Hadoop Base (HBase). The layer-bottomed is composed of several computers or servers with the clustered architecture.

Hadoop Distributed File System HDFS employs the Master/Slave architecture Nodes can be classified into Name Nodes and Data Node. There is only one Name Node in HDFS, and it manages the attribution and permission of file system. Also determines the strategy of duplication allocation The Data Nodes are responsible for executing the task and instruction, which assigned from the Name Node In reality the file is stored in the Data Nodes. Therefore, the amount of information in Data Nodes is much higher than Name Node There can be several data nodes

Tahoe Least Authority File System The Tahoe-LAFS is an open source platform for cloud storage system, and the data is separately saved in several servers The uploaded files can be downloaded successfully, even if part of servers are attacked and unavailable The users authorize the data readability and modification to the general storage providers, and the providers ensure that not to abuse the authority for stored data Design concept is based on the Principle of Least Authority, which means that the user needs a suitable authority to execute a process or task. The data and metadata is stored in the servers after Erasure Coding and cryptography technique.

Erasure Coding is one kind of Forward Error Correction (FEC) method. It copies N duplications and separately stores in H servers, and requires K servers to accomplish data download Moreover, the Tahoe-LAFS encrypts the data, therefore, it provides the data with high availability, confidentiality and integrity, and without providing the authority Tahoe Least Authority File System

HDFS v/s Tahoe LAFS

FUTURE WORK Concerning Factors Denial of Service Performance trade off Scalability

THANK YOU!!!!