Usage control: From distributed systems and information to Clouds



Documenti analoghi
IBM SmartCloud Le regole per la Sicurezza nel Cloud Computing: la visione di IBM

IP TV and Internet TV

Access to HPC resources in Italy and Europe

Cloud Computing e la Sicurezza?

Il Cloud Computing: Definizioni, Classificazioni, Costi, Benefici, SLA

Infrastrutture critiche e cloud: una convergenza possibile

IBM SmartCloud Le regole per la Sicurezza nel Cloud Computing: la visione di IBM

Mobile and cloud security Esercitazione

REGISTRATION GUIDE TO RESHELL SOFTWARE

Common Criteria CC-101 CC Part 2 Basics

TNCguide OEM Informativa sull introduzione di documentazione aggiuntiva nella TNCguide

Security and Trust issues for Services

Introduzione Kerberos. Orazio Battaglia

IP multimedia services in the NGN

LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI

GstarCAD 2010 Features

MOC10982 Supporting and Troubleshooting Windows 10

LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI

Microsoft Dynamics CRM Live

LA SACRA BIBBIA: OSSIA L'ANTICO E IL NUOVO TESTAMENTO VERSIONE RIVEDUTA BY GIOVANNI LUZZI

Azioni e proposte SG7/SG8

Alessandro Huber Chief Technology Officer, Microsoft Italia Claudia Angelelli Service Line Manager, Microsoft Italia

The Castelfranco Charter Recommendations for users of e-health in cloud computing

Installazione di DraftSight Enterprise

La tutela dei dati nei processi di outsourcing informatico in India

User Guide Guglielmo SmartClient

European Archive at ECMWF. Tiziana Paccagnella ARPA-SIMC, Italy

Quando mi collego ad alcuni servizi hosting ricevo un messaggio relativo al certificato di protezione del sito SSL, come mai?

Sommario. Esempio di Modellazione mediante DASM: Grid OGSA. Grid secondo OGSA. Definizione Grid per OGSA. Stati di un Job e Requisiti DASM

Regional Health Information System

L'oro dei nostri giorni. I dati aziendali, i furti, la loro protezione in un ambiente oltre i confini

MOC20487 Developing Windows Azure and Web Services (Visual Studio 2012)

Guida all installazione del prodotto 4600 in configurazione plip

The distribution energy resources impact

Android Development. Course Projects. Università degli Studi di Parma

Gestione integrata dei rischi e data protection: casestudy

Tipologie di sensori e di estrazione automatica di dati

F ondazione Diritti Genetici. Biotecnologie tra scienza e società

UNIVERSITÀ DEGLI STUDI DI TORINO

SolidNetwork License Manager

Note su H2020 Call 3 e-infrastructure e WP2 INFN. Davide Salomoni 5/9/2013

General info on using shopping carts with Ingenico epayments

Laboratorio di Amministrazione di Sistema (CT0157) parte A : domande a risposta multipla

tecnologie di cloud computing per il calcolo scientifico Presentazione stage per studenti triennali Università di Torino Mar 6, 2013

GESTIONE IMMOBILIARE REAL ESTATE

WELCOME. Go to the link of the official University of Palermo web site Click on the box on the right side Login unico

Scheduling. Scheduler. Class 1 Class 2 Class 3 Class 4. Scheduler. Class 1 Class 2 Class 3 Class 4. Scheduler. Class 1 Class 2 Class 3 Class 4

Fiori di campo. Conoscere, riconoscere e osservare tutte le specie di fiori selvatici più note

Organizzazione Informatica in Alstom Sergio Assandri Punta Ala, 27/09/2012

SYMPHONY ENERGY MANAGER

Agenda BlackBerry Enterprise Update Diego Ghidini L evoluzione dei modelli di lavoro: Scenari e Opportunità per le Aziende

Nicola Be You! protagonisti o figuranti Are you ready for the next level?

Solutions in motion.

Benvenuti STEFANO NOSEDA

Cloud Computing - Il progetto RESERVOIR - una infrastruttura Service Oriented 'on demand' per i servizi IT

PIANO DI STUDI. Primo anno di corso

StrumenJ semanjci per la ricerca applicata ai tram funzionali: sviluppo e applicabilità dei Thesauri

WELCOME UNIPA REGISTRATION:

C. & G. Agency Srl Via Novara, snc Tuscania VT Tel. 0761/ Fax. 0761/ Website: info@cegagency.

CORSO VM6SKO: VMware vsphere: Skills for Operators [V6] CEGEKA Education corsi di formazione professionale

Ingegneria del Software

CORSO MOC6425: Configuring and Troubleshooting Windows Server 2008 Active Directory Domain Services

Cyber Security Energia Una Piattaforma di Ricerca e Innovazione. Giovanna Dondossola

CORSO MOC6439: Configuring and Troubleshooting Windows Server 2008 Application Infrastructure

MOC6419 Configuring, Managing and Maintaining Windows Server 2008 Servers

Enel App Store - Installation Manual - Mobile

Virtualizzazione con Microsoft Tecnologie e Licensing

Ingegneria del Software Testing. Corso di Ingegneria del Software Anno Accademico 2012/2013

19 touchscreen display

Ambienti di calcolo a griglia - Parte 3

Rischio... o Opportunità?

A.A. 2006/2007 Laurea di Ingegneria Informatica. Fondamenti di C++ Horstmann Capitolo 3: Oggetti Revisione Prof. M. Angelaccio

Ingegnerizzazione e Integrazione: il valore aggiunto di un Data Center Moderno, Efficace, Efficiente

Innovazione e Open Source nell era dei nuovi paradigmi ICT

Iris and SJU Project P Iris Public Event 04/02/2013 University of Salzburg Unipark P. Tavernise P PM. Ref.:

Accesso Mul*plo - modelli

Protection Regulation Italia

Customer Centric/Inquiry/E-bill. Tanya Enzminger

Politecnico di Torino. PRAISE & CABLE projects interaction

shared bytes -> shared good A geek proposal for the Sharing Economy survival

Resources and Tools for Bibliographic Research. Search & Find Using Library Catalogues

User Centricity in AGCOM

INTRODUZIONE ALLA PROGETTAZIONE EUROPEA: INDICAZIONI PRATICHE E ASPETTI ORGANIZZATIVI

ABSTRACT. In informatica, con il termine cloud computing, in italiano nube informatica,

CODI/21 PIANOFORTE II // CODI/21 PIANO II

Copyright 2012 Binary System srl Piacenza ITALIA Via Coppalati, 6 P.IVA info@binarysystem.eu

Website of the PAYS.MED.URBAN Project

Definizione di Cloud La sicurezza nel Cloud

La Security Policy della rete GARR

Database support Prerequisites Architecture Driver features Setup Stored procedures Where to use. Contents

I CAMBIAMENTI PROTOTESTO-METATESTO, UN MODELLO CON ESEMPI BASATI SULLA TRADUZIONE DELLA BIBBIA (ITALIAN EDITION) BY BRUNO OSIMO

INTERNET & MARKETING INNOVATIVE COMMUNICATION.

EC11 ANNO ACCADEMICO 2013/2014 CORSO DI LAUREA IN ECONOMIA, COMMERCIO INTERNAZIONALE e MERCATI FINANZIARI

Social Interaction through Map- based Wiki

Un introduzione al Progetto SOCS: formalizzazione e verifica di protocolli di comunicazione.

Service Oriented Architectures

CORSO 50403: Implementing Active Directory Rights Management Services with Exchange and SharePoint

DHTCS-IT Distributed High Throughput Computing and Storage in Italy

Cloud Computing: alcuni punti fermi per non smarrirsi fra le nuvole

L AoS avrà validità per l intero periodo anche in caso di interruzione del rapporto tra l'assurer e l assuree.

Transcript:

Usage control: From distributed systems and information to Clouds Fabio Martinelli Institute for Informatics and Telematics ICT Department National Research Council (IIT-CNR)

Distributed systems Outline GRID,P2P, MANETs, Clouds Usage control, experiences from two EU projects: Server-side (GridtTrust Approach) User-side (Consequence Approach) Discussion on usage control in clouds

Distributed systems in a picture (Foster et al.) Supercomputers Distributed Systems Grids Clouds Clusters Application Oriented Web2.0 Service Oriented

Grid Computing Dynamic collection of diverse and distributed individuals who share heterogeneous resources (services) in a coordinated fashion Computers Data Bases Storage User and service Providers might be unknown each other An advanced security support is required to: Protect resources from code provided by users Protect the code provided by users from resources

Cloud Computing Still a cloudy definition Current : Clouds are a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or services). These resources can be dynamically reconfigured to adjust to a variable load (scale), allowing also for an optimum resource utilization. This pool of resources is typically exploited by a pay-per-use model in which guarantees are offered by the Infrastructure Provider by means of customized SLAs. 9. Vaquero LM., Rodero-Merino L., Cáceres J., Lindner M. A Break in the Clouds: Towards a Cloud Definition. ACM Computer Communication Reviews. January 2009 Future :???

Usage Control Model A Uniform conceptual model suggested by Sandhu et al It systematizes previous work in the area The evaluation of an usage right is performed Before the action (PRE) Standard access control approach Continuously during the access (ONGOING) The right could be revoked and the access interrupted Used for long lived accesses (hours, days,...)

From Access Control to Traditional Access Control Pre decision Usage Control Continuity of decision Ongoing decision Usage Decision still valid? Can you revoke access? Before usage Ongoing usage After usage Pre update Ongoing update Post update Mutability of attributes Time

Usage Control Model: Beyond Access Control Privacy Protection UCON [Park04] Intellectual Property Rights Protection Sensitive Information Protection Traditional Trust Access Mangt. Control DRM Usage Control Server-side Reference Monitor (SRM) Client-side Reference Monitor (CRM) SRM & CRM

Usage Control Server Side: the GridTrust Approach (1) The Grid is dynamic environment, but Standard GRID/Globus authorization mechanisms are too coarse and static GridTrust adopts the Usage Control Model to protect the service providers Fine grained control Continuous policy enforcement Active Policy decision Point Policies depend on trust levels Trust levels are modified by adherence to policies

Usage Control Server Side: the GridTrust Approach (2) Service Level: the execution of grid services is controlled Service execution is interrupted when ongoing authorization fails Computational Level: the execution of user applications on Computational services is monitored The security relevant actions performed by the applications are controlled The application is interrupted when ongoing authorization fails UCON as a SERVICE: We implemented UCON on GRID services as a GRID service

Continous Usage Control Works Code Provider for Computational GRID Code CodeInsta OpenFile() nce ReadFile() Hosting Environment The po licy may depend on the trust value Monitor Start Closed Local Policy Opened Reading OpenFile() CloseFile() Shared resources Policy Enforcement Point Trust on the code provider is reduced Violation

Usage Control Client-side: the Consequence Approach (1) Context Aware Data-centric Information Sharing Agreements Focus on protection of disseminated information regulated by data sharing agreements: Define an architecture within a framework to enable dynamic management policies based on agreements that ensure end-to-end secure protection of data-centric information.

Usage Control Client-Side: the Consequence Approach (2) Digital information is disseminated among peers The usage policies must obey digital agreements The protection mechanism is now client-side (not owned by the data provider) Policies are attached/related to data There is the need for digital crypto-containers Software-based reference monitors ID-based crypto Hardware-based reference monitors (TCB): (Currently not foreseen in the project)

UCON in Cloud? In the Cloud, the same entity could be both Producer and Consumer: PROSUMER In GRID the same entity could share a service and exploit the services provided by other participants The Usage Control Framework could integrate Server side controls User side controls E.g., privacy policies on stored data could be expressed as usage control policies

Integrated UCON The UCON framework monitors both Services that are accessed by users Data that have been distributed to users Advantages An access on server side could influence an access on user side and viceversa Global view of the behaviour of an entity Possibly uniform policy management systems

Example Scenario The user downloads a road map of Italy The map data is protected by a Usage Control policy The user wants to compute a tourist's path in tuscany He submits the map to a tourist's service Several policies to be enforced The map local policy, that determines whether the user can read that map The service local policy, that determines whether the user can access that service The system global policy to decide whether that path can be computed on that map by that user on that service

Local policy Integrated UCON Architecture Attribute Manager Services service request User environment UCON authz Global policy access Data Local policy Obligation Manager

Links Fabio Martinelli www.iit.cnr.it/staff/fabio.martinelli GRIDtrust Project www.gridtrust.eu/ CONSEQUENCE project http://www.consequence-project.eu/