Secure Distributed Open Social Networks Henry Story Senior Staff Engineer Semantic Web Evangelist Sun Microsystem photo by.

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
II Web 3.0 explained with a stamp (English version) Part I: the basics Part II: techniques.
RDF Tutorial.
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
WebID4VIVO Erich Bremer and Tammy DiPrima Stony Brook University July 18, 2013 PREVIEW! BETA! BETA! BETA! BETA! BETA! BETA!
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
Calendar Browser is a groupware used for booking all kinds of resources within an organization. Calendar Browser is installed on a file server and in a.
The Web of data with meaning... By Michael Griffiths.
By: Ansuya Chauhan.
PKI Activities at Virginia January 2004 CSG Meeting Jim Jokl.
Active Directory: Final Solution to Enterprise System Integration
CSCI 572 Project Presentation Mohsen Taheriyan Semantic Search on FOAF profiles.
Design Aspects. User Type the URL address on the cell phone or web browser Not required to login.
Semantic Web Presented by: Edward Cheng Wayne Choi Tony Deng Peter Kuc-Pittet Anita Yong.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Build Your Own Website Introduction Introduction Phil Stone Phil Stone ICT tutor for Dudley Adult Community Learning ICT tutor for Dudley Adult Community.
IT:Network:Applications.  Single Key (Symmetric) encryption ◦ One “key” or passphrase used to encrypt and decrypt ◦ FAST – good for large amounts of.
© 2006 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Publishing data on the Web (with.
Semantic Web Series 1 Mohammad M. R. Cowdhury UniK, Kjeller.
Masud Hasan Secue VS Hushmail Project 2.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
IST E-infrastructure shared between Europe and Latin America ULAGrid Certification Authority Vanessa Hamar Universidad de Los.
1 SPARQL A. Emrah Sanön. 2 RDF RDF is quite committed to Semantic Web. Data model Serialization by means of XML Formal semantics Still something is missing!
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Introduction to the Semantic Web and Linked Data Module 1 - Unit 2 The Semantic Web and Linked Data Concepts 1-1 Library of Congress BIBFRAME Pilot Training.
Dr. Lowell Vizenor Ontology and Semantic Technology Practice Lead Alion Science and Technology Semantic Technology: A Basic Introduction.
Joseph Smarr A Practical Vision for Friends-List Portability Joseph Smarr IIW 2007b, 12/5/2007.
GRID-FR French CA Alice de Bignicourt.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Virtual Organisations and the NGS Mike Jones Research Computing Services e-Science & “The Grid” for Bio/Health Informaticians, IT January 2008.
VCE IT Theory Slideshows
My Learning Journal Parent Workshop Friday 28th April 2017.
Key management issues in PGP
AFFORDABLE WEBSITE DESIGN SERVICES.  The different areas web designing services includes web graphic design, user interface designing, authoring and.
Linked Data Web that can be processed by machines
SSL Certificates for Secure Websites
SPARQL.
Simple Authentication for the Web
Building the Semantic Web
Cryptography and Network Security
Section 12.1 Section 12.2 Discuss the functions of a Web site
Authentication Applications
SPARQL: A query language for RDF
Yahoo Support Ireland Toll-Free Number:
Using SSL – Secure Socket Layer
How To Recover Your Account If You Forget Your Gmail Password.
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Analyzing and Securing Social Networks
Chapter 7 STRENGTH OF ENCRYPTION & Public Key Infrastructure
Lesson 6: Protecting, Maintaining and Managing Databases
Setting up an online account
Public-Key Certificates
Richland 1 professional development
Metcalfe’s Law : Why is the Web so Big?
Protocol ap1.0: Alice says “I am Alice”
Unit# 5: Internet and Worldwide Web
Authentication & the Web
Increase and Improve your PC management with Windows Intune
JSON for Linked Data: a standard for serializing RDF using JSON
The Italian Academic Community’s Electronic Voting System
Chapter 8 roadmap 8.1 What is network security?
Tyler Technologies presents: What you need to know about upcoming changes to your New World ERP technical environment in Scott Alan Miller MCP,
Presentation transcript:

Secure Distributed Open Social Networks Henry Story Senior Staff Engineer Semantic Web Evangelist Sun Microsystem photo by prakharevich

Overview 1. Description of the Social Networking problem 2. Why this is no longer “somebody else's problem”: a hyper address booksomebody else's problem”: a hyper address book 3. The functioning of the Address Book 4. How to add distributed decentralized security 5. A final thought: how this changes the desktop paradigm

Too many Social Networks?...are there too many web servers?

The Problem: data silos ● SN don't link up: – Information can't be moved easily (see: Data Portability the video)Data Portability the video – Users have to create and maintain accounts on each SN they have friends on, or loose contacts ● Growing number of social networks (SN) – because there are a lot of $$$ to be made – because there are many needs – there will never be one SN to rule them all.

Scoble gets thrown off Facebook! In early January 2008 Scoble, the developer who got blogging going at Microsoft, got thrown off Facebook for extracting information too agressively from his social network on Facebook. This is the Facebook who asked users for their gmail password to extract all their contacts from their ! see his videohis video

An (evolving) Social Graph relates many different things ● people to information about them ● name ● address ● phone number ● relations between people: ● who knows who ● who worked with who ● relations with external things ● blogs ● companies

Two social Networks how can Tim and Henry link up ?

Solution 1: minimal naïve approach but within each SN queries are very limited: e.g.: in Network A, nobody can query for Tim's address

Solution 2: copy some information ➔ how to copy the data? Data Portability? (DRY principle?) ➔ how to keep the relations up to date?! Twice as much work. ➔ queries still limited: what are the friends of Tim's friends?

Solution 3: copy all ➔ technically impossible: does not scale as networks grow in size and number: ➔ how to keep information up to date? ➔ amount of synchronization grows exponentially ➔ politically impossible: S.N. are very protective of their data + privacy issues + oligopoly issues

The pull to one network Due to Metcalf's law: the larger the network the more valuable it becomes.Metcalf's law But why does it have to be in one database? Because each database has its own LOCAL POINTER mechanism, just like every Java virtual Machine has a local pointer mechanism. You cannot easily point from one JVM/DB into another. What if we had one big world wide database? we would need universal names for things. URIs?

The Solution: linking across social networks requires a global namespace

The Solution: a closer look ● objects and documents have URLs ● Relations also have URLs: foaf:knows, foaf:namefoaf:knowsfoaf:name ➔ The Self Describing WebThe Self Describing Web

A hyperdata Address Book

1. first launch of jnlp

2. drag and drop a foaf file url

3. click on the first name in the first column

4. explore the second column

5. press the space bar on the keyboard...

6. positioning with NASA's World Wind

7. Sun Intranet Foaf experimentSun Intranet Foaf experiment

Foaf: Friend of a Friend

Advantages ● Open Social Network – no data silos ● Information about people is always up to date (an HTTP GET away) ➔ this could be used to keep up to date on where friends are ● It is easy to publish a foaf file: one click away ● Drag and drop friends ● security: some ideas at the end of the talk

Two foaf files on the internet

Well, what we really have is

Well, what we really have is in graph view

The graphs inside the Beatnik Database

Networked graphs: A merged view

SPARQL: semantic query lang ● PREFIX foaf: ● SELECT ?p ● WHERE { ● ?p foaf:knows ?q. ● }

SPARQL construct query PREFIX xsd: CONSTRUCT { ?subject ?relation ?object. } WHERE { GRAPH ?g { ?subject ?relation ?object. } ?g :fetched-at ?date. FILTER { ?date < “ ”^^xsd:date } } This CONSTRUCT query can be used to construct a graph that is a union of all graphs that were fetched after march 2008.

Networked Graphs: SPARQL Rules PREFIX owl: CONSTRUCT { ?b owl:sameAs ?a. } WHERE { ?a owl:sameAs ?b. FILTER ( ! SAMETERM(?a, ?b) ) } CONSTRUCT queries can also be thought of as rules. Here is the well known rule of symmetry of identity. Simon Schenk's Networked Graphs can have a number of rules expressed as SPARQL CONSTRUCT queries, which works nicely with the Sesame semantic engine.Networked Graphs

merging identities PREFIX owl: PREFIX foaf: CONSTRUCT { ?a owl:sameAs ?b. } WHERE { ?a foaf:homepage ?pg. ?b foaf:homepage ?pg. FILTER ( ! SAMETERM (?a, ?b)) } The rule that if we have two names for people that have the same homepage, then the two names refer to the same person. There are more general ways of stating this btw.

Security: 3 approaches 1. Simple Firewall based security 2. OpenId based Security 3. Even simpler SSL based security

Firewall protection

Protecting resources with OpenId

Protected Resources :me a foaf:Person; foaf:name “Henry Story”; rdfs:seeAlso. openid:login. ● This is trying to say that in order to access the protected resource one needs to login with openid first. ● This is a sketch of such a vocabulary

OpenId continued

foaf+ssl: even simpler

Protected Resources :me a foaf:Person; foaf:name “Henry Story”; rdfs:seeAlso. ● notice the seeAlso is now an https url

foaf+ssl: even simpler

X509 certificate Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: dsaWithSHA1 Issuer: O=OpenPGP to X.509 Bridge, OU=RDFauth Test, CN=Henry Story Validity Not Before: Dec 12 21:49: GMT Not After : Dec 6 21:49: GMT Subject: O=OpenPGP to X.509 Bridge, OU=RDFauth Test, CN=Henry Story Subject Public Key Info: Public Key Algorithm: dsaEncryption DSA Public Key: pub: 33:41:...

X509 certificate with id X509v3 extensions: X509v3 Basic Constraints: critical CA:TRUE X509v3 Key Usage: critical Digital Signature, Non Repudiation, Key Encipherment, Key Agreement, Certificate Sign Netscape Cert Type: SSL Client, S/MIME X509v3 Subject Key Identifier: 45:DC:F9:10:33:C0:45:28:EA:90:6E:83:73:06:6F:51:21:89:13:DD X509v3 Authority Key Identifier: keyid:45:DC:F9:10:33:C0:45:28:EA:90:6E:83:73:06:6F:51:21:89:13:DD X509v3 Subject Alternative Name: URI: Signature Algorithm: dsaWithSHA1 30:2c:02:14:78:69:1e:4f:7d:37:36:a5:8f:37:30:58:18:5a: f6:10:e9:13:a4:ec:02:14:03:93:42:3b:c0:d4:33:63:ae:2f: eb:8c:11:08:1c:aa:93:7d:71:01

Very Simple Authentication

The Semantic Desktop

some references Getting Started With RDF The Semantic Address Book web site