25-27/11/02 Pisa 1 SeT: Secure Service Technology for Dependable e-Business/Government Applications Jie Xu, Keith Bennett and Malcolm Munro The SeTech.

Slides:



Advertisements
Similar presentations
Network Resource Broker for IPTV in Cloud Computing Lei Liang, Dan He University of Surrey, UK OGF 27, G2C Workshop 15 Oct 2009 Banff,
Advertisements

CLOUD COMPUTING AN OVERVIEW & QUALITY OF SERVICE Hamzeh Khazaei University of Manitoba Department of Computer Science Jan 28, 2010.
Business Continuity and DR, A Practical Implementation Mich Talebzadeh, Consultant, Deutsche Bank
Distributed Systems Architectures
Distributed Database Management Systems
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
DISTRIBUTED DATABASE MANAGEMENT SYSTEM CHAPTER 07.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
THE DICOM 2013 INTERNATIONAL CONFERENCE & SEMINAR March 14-16Bangalore, India DICOM Medical Image Management the Challenges and Solutions – Cloud as a.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information and Communication Technologies in the field of general education in Armenia NATIONAL CENTER OF EDUCATIONAL TECHNOLOGIES.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Security Framework For Cloud Computing -Sharath Reddy Gajjala.
Intelligent Media Systems & Services Laboratory (imss) Informatics Research Centre, Computer Science Department School of Systems Engineering University.
FIORANO SERVICE BUS The Cloud Enablement Platform
Software to Data model Lenos Vacanas, Stelios Sotiriadis, Euripides Petrakis Technical University of Crete (TUC), Greece Workshop.
Critical Emerging Network-Centric Applications Tele-control/tele-presence Defense Tele-medicine Remote plane/vehicle/robot control Distance learning Real-time.
CLOUD COMPUTING Corey Rutledge Spencer Peaty Group 4 – IT Seminar.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
CORE 2: Information systems and Databases CENTRALISED AND DISTRIBUTED DATABASES.
TECHNOLOGY GUIDE THREE
1 Distributed Systems: an Introduction G53ACC Chris Greenhalgh.
How computer’s are linked together.
Part 3: Internetworking Internet architecture, addressing, encapsulation, reliable transport and the TCP/IP protocol suite.
Week 5 Lecture Distributed Database Management Systems Samuel ConnSamuel Conn, Asst Professor Suggestions for using the Lecture Slides.
Development of Multipoint Communication Systems for Remote Seminar Toshihiro Hayashi and Yukuo Hayashida Department of Information Science, Saga University.
Information: Policy, Strategy and Systems Module Overview
CERN openlab V Technical Strategy Fons Rademakers CERN openlab CTO.
DAME: A Distributed Diagnostics Environment for Maintenance Duncan Russell University of Leeds.
DISTRIBUTED COMPUTING. Computing? Computing is usually defined as the activity of using and improving computer technology, computer hardware and software.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Department of Electronic Engineering Challenges & Proposals INFSO Information Day e-Infrastructure Grid Initiatives 26/27 May.
Information Technology Needs and Trends in the Electric Power Business Mladen Kezunovic Texas A&M University PS ERC Industrial Advisory Board Meeting December.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Transforming Education Through Information Technologies Spanning the Digital Divide David Staudt, Spanning.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
A scalable and flexible platform to run various types of resource intensive applications on clouds ISWG June 2015 Budapest, Hungary Tamas Kiss,
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Data Communications and Networks Chapter 9 – Distributed Systems ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Networking: Applications and Services Antonia Ghiselli, INFN Stu Loken, LBNL Chairs.
Access Control for Dynamic Virtual Organisations Duncan Russell, Peter Dew & Karim Djemame University of Leeds.
Securing the Grid & other Middleware Challenges Ian Foster Mathematics and Computer Science Division Argonne National Laboratory and Department of Computer.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
The e-Demand Project (A Demand-Led Service-Based Architecture for Dependable e-Science Applications) Jie Xu (Project PI) A joint 3-year EPSRC/DTI-funded.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Network Processing Systems Design
Centre of Excellence in Physics at Extreme Scales Richard Kenway.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Chapter 1 Characterization of Distributed Systems
Clouds , Grids and Clusters
MadeCR: Correlation-based Malware Detection for Cognitive Radio
Introduction to Operating Systems
Security of Grid Computing Environments
Christos Markou Institute of Nuclear Physics NCSR ‘Demokritos’
GlassFish in the Real World
TYPES OF SERVER. TYPES OF SERVER What is a server.
3.2 Virtualisation.
Network Services.
Chapter 2. Malware Analysis in VMs
Managing Online Services
ExaO: Software Defined Data Distribution for Exascale Sciences
Mixed Reality Server under Robot Operating System
Mobile Agents M. L. Liu.
The Italian Academic Community’s Electronic Voting System
In Distributed Systems
OU BATTLECARD: WebLogic Server 12c
Presentation transcript:

25-27/11/02 Pisa 1 SeT: Secure Service Technology for Dependable e-Business/Government Applications Jie Xu, Keith Bennett and Malcolm Munro The SeTech Centre Department of Computer Science University of Durham

25-27/11/02 Pisa 2 The SeTech Centre at Durham Funding Sources: EPSRC/DTI, NEeS Centre Industrial Partners (Sun, Sharp, Sparkle etc) Technical Board: Jie Xu (Distributed Systems & Dependability) Keith Bennett (Service-Based Architecture) Malcolm Munro & Nick Holliman (Visualisation) Research Staff: 6 Academic Staff Members + 12 Research Staff Members Hardware Testbed: A Sun 32 CPU UltraGrid computer connected to a network of Sun servers and workstations with an upgraded Gigabit link between Durham and Newcastle Close Collaborations: The Pennine Group, EU and USA univ. & insti.

25-27/11/02 Pisa 3 The SeTech Centre Building

25-27/11/02 Pisa 4 Problems and Challenges The Problem - Coordinated resource sharing & problem solving in large- scale, dynamic, multi-institutional virtual organisations Major Technical Obstacles - Inflexible, protocol-specific architectures & approaches - Difficulty in structuring and writing such large-scale programs - Security risks and malicious attacks - Many risks and problems rooted in software

25-27/11/02 Pisa 5 e-Demand: A Software-Based Solution The Demand-Led Service-Based Architecture - New service-based model for organising flexible e-business/ government applications - An instance of the architecture to be implemented Generic Services, e.g. our unique SIR technique - Support for secure and attack-tolerant information sharing - 3D visualisation service for program/information comprehension Fault-Injection-Based System Evaluation - The FITMVS tool, supported by clusters of workstations - Evaluation with respect to faults/attacks/performance

25-27/11/02 Pisa 6 Architectural Evolution Applications Transport Internet Link Internet Architecture Resources Connectivity Resource Management Coordination of Multiple Resources Applications Protocol-Based Architecture e-Actions Service-Based Architecture ISPs, CSPs, SPs Information, Negotiation Settlement, After-Services Generic Services: Security, FT Visualisation

25-27/11/02 Pisa 7 Service-Based Architectural Model Contractor/assembly service provider Contractor/assembly service provider Catalogue/ontology provider Catalogue/ontology provider Service consumer Service/solution provider Demand Provision Ultra-Late Binding Finding Publishing e-Action service Attack-tolerance service Auto-3D service

25-27/11/02 Pisa 8 The Attack-Tolerant PIR Scheme Private Information Retrieval (PIR) - Normal query to a (remote) database: give me the record x - PIR query: compute functions F 1, F 2, …, F k for me over x, y, z,... (reconstruct x locally based on the results of F 1, F 2, …, F k ) Attack/Failure Models of Remote DB Servers - Honest-but-Curious (HbC): query with K functions (computing tasks) - HbC & loss of results: query with K + L functions - Malicious hosts (may change the results deliberately): 2 different queries (i.e. 2K functions for detection) or (f + 2) queries for tolerating f attacks/failures New Approach: a query with K signed functions (detection) for tolerating f attacks/failures Application Domains: critical information services, healthcare etc.

25-27/11/02 Pisa 9 The System Architecture A11A12 A1m A21A22 A2m An1 An2 Anm request manager mobile code dispatcher request A1 A2 An (local host) user application A1, A2 … An result manager mobile code collector result A1, A2 … An Internet host 1host 2host m (pieces of code)

25-27/11/02 Pisa 10 An Implementation for Real DBs Length of Queries vs. Execution Time