Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.

Slides:



Advertisements
Similar presentations
Trust Management of Services in Cloud Environments:
Advertisements

ITU-T SG13 futures session – July 25, D1 Present document contains informations proprietary to France Telecom. Accepting this document means for.
Cobalt: Separating content distribution from authorization in distributed file systems Kaushik Veeraraghavan Andrew Myrick Jason Flinn University of Michigan.
Martin Wagner and Gudrun Klinker Augmented Reality Group Institut für Informatik Technische Universität München December 19, 2003.
Jaringan Komputer Lanjut Packet Switching Network.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
High Performance Computing Course Notes Grid Computing.
Group #1: Protocols for Wireless Mobile Environments.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Active Directory: Final Solution to Enterprise System Integration
CoreGRID Workpackage 5 Virtual Institute on Grid Information and Monitoring Services Authorizing Grid Resource Access and Consumption Erik Elmroth, Michał.
Military Technical Academy Bucharest, 2006 SECURITY FOR GRID INFRASTRUCTURES - Grid Trust Model - ADINA RIPOSAN Department of Applied Informatics.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
© nCode 2000 Title of Presentation goes here - go to Master Slide to edit - Slide 1 Reliable Communication for Highly Mobile Agents ECE 7995: Term Paper.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Mobile Agents: A Key for Effective Pervasive Computing Roberto Speicys Cardoso & Fabio Kon University of São Paulo - Brazil.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Friendly Authentication and Communication Experience (Face) for Ubiquitous Authentication on Mobile Devices Author: Benjamin Halpert Presented by: 魏聲尊.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Cloud Usability Framework
Abstraction and Control of Transport Networks (ACTN) BoF
Plan Introduction What is Cloud Computing?
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
COnvergence of fixed and Mobile BrOadband access/aggregation networks Work programme topic: ICT Future Networks Type of project: Large scale integrating.
Report from Breakout Session 1.2 Secure Consumerization: the Genuine Trustworthiness Revolution Chair: Craig Lee Rapporteur: Paolo Mazzetti.
An affinity-driven clustering approach for service discovery and composition for pervasive computing J. Gaber and M.Bakhouya Laboratoire SeT Université.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Vic Liu Liang Xia Zu Qiang Speaker: Vic Liu China Mobile Network as a Service Architecture draft-liu-nvo3-naas-arch-01.
Introduction Infrastructure for pervasive computing has many challenges: 1)pervasive computing is a large aspect which includes hardware side (mobile phones,portable.
A Context Model based on Ontological Languages: a Proposal for Information Visualization School of Informatics Castilla-La Mancha University Ramón Hervás.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
Enabling the Future Service-Oriented Internet (EFSOI 2008) Supporting end-to-end resource virtualization for Web 2.0 applications using Service Oriented.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Introduction to Grids By: Fetahi Z. Wuhib [CSD2004-Team19]
July 14 th SAM 2008 Las Vegas, NV An Ad Hoc Trust Inference Model for Flexible and Controlled Information Sharing Danfeng (Daphne) Yao Rutgers University,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Computer Science and Engineering 1 Mobile Computing and Security.
Introduction to Active Directory
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Virtual Machine Abstractions for Nomadic Pervasive Computing (NPC) Environment Presented by: Hen-I Yang, Nov. 29, 2006.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Towards a High Performance Extensible Grid Architecture Klaus Krauter Muthucumaru Maheswaran {krauter,
Chapter 1 Characterization of Distributed Systems
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Grid Computing Security Mechanisms: the state-of-the-art
Mobile &Wireless Computing
Physical Architecture Layer Design
Cloud Computing.
Overlay Networking Overview.
Computer Science Department
The Globus Toolkit™: Information Services
UNIT No: IV IDENTITY MANAGEMENT MODELS IN IoT
3rd Studierstube Workshop TU Wien
Mobile Computing Lecture Materials By Bintang Eka Putera.
Presentation transcript:

Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications (ENST) 46 Rue Barrault, Paris 75013, France {naqvi,

22 November 2005CGW'05 - Krakow, Poland2 Outline Introduction Trust Establishment Implementation Status Conclusions

22 November 2005CGW'05 - Krakow, Poland3 Outline Introduction Trust Establishment Implementation Status Conclusions

22 November 2005CGW'05 - Krakow, Poland4 The reliance on a property or a virtue of a person, or the conviction that a given premise is true. Oxford Dictionary An entity A is considered to trust another entity B when entity A believes that entity B will behave exactly as expected and required. International Telecommunication Union Trust

Pervasive Grid Environments The Grid can be accessed from any networked device –laptop, mobile phone, PDA, … The Grid can be composed of Internet-connected light- weight devices –Inherent limitations of these devices, physical security, … Ubiquitous access to the computing and storage resources –Adaptable to users’ environments; available anywhere anytime –Enable mobile users to launch, monitor, and steer applications on the Grid Introduces new challenges –Bandwidth, heterogeneity, connectivity, scalability, interfacing –Security: physical; gaps; requires knowledge of context and state

22 November 2005CGW'05 - Krakow, Poland6 The Problem Statement How pervasive grid nodes can trust unknown infrastructure with their private data; and How a computing infrastructure can trust a mobile node which is seeking access to its resources.

22 November 2005CGW'05 - Krakow, Poland7 Outline Introduction Trust Establishment Implementation Status Conclusions

8 Trust Requirements Identification, Access Control, Privacy, … User-based Trust Relationships –If a user has the right to use sites A and B, the user should be able to use sites A and B together without requiring the security administrators from sites A and B to interact. Distributed Trust Evaluation –The decentralized nature of administration makes it difficult to establish and propagate trust. A distributed trust evaluation scheme is therefore required for the pervasive grid environments. Non-History-based Trust Establishment –If there is no trust among parties and there is no mechanism to build some trust based on a history of previous interactions.

22 November 2005CGW'05 - Krakow, Poland9 Delegation of trust –Decentralized hierarchical administration, scalability of certificate issuing capacity, … Continuous monitoring of the changes to the trust level of each node –Dynamic evaluation of the trust relationships, broadcast the presence of a malicious node in the environment, … Consideration of context and state –Determination of the access control on the basis of user’s location and the state of the user’s environment. Trust Establishment Approach

22 November 2005CGW'05 - Krakow, Poland10 Instead of having a single value representing the trust- worthiness of a node, the value should be broken into separate attributes – confidences –Each confidence represents a characteristic of a node from which trust can be synthesized. For example: We can trust a node to be accurate (important for data integrity) We can trust a node to complete task reliably We can trust nodes to return data quickly (or always in the guaranteed time). These attributes form a virtual plane to link the resources, users (individuals & services) and the applications –Virtual and extensible basis for synthesizing varying types of trust Signifies that there is not a fix form of trust among the various entities Allows the greatest flexibility from one entity to the other

22 November 2005CGW'05 - Krakow, Poland11 From the functional point of view: –Attribute certificates are used in compliment with identity certificates provided by the existing infrastructure. Identity certificates are used to verify the identity of an entity in a highly anonymous environment (e.g. the internet) Attribute certificates are used to determine the trustworthiness of an uncertain environment (such as Pervasive Grid) –For direct trust relationship within a single domain, a node estimates the trustworthiness of the node it is going to interact. By using the centralized credentials architecture to determine the trust values of the individual nodes. By maintaining a trust table of the domain. –For indirect trust relationships across multiple domains, a node has to trust all the intermediaries that it traversed before arriving the second node. By evaluating the trust degree along the whole path.

22 November 2005CGW'05 - Krakow, Poland12 Outline Introduction Trust Establishment Implementation Status Conclusions

22 November Exam Hall Library CA / Storage & Display Center S SSS T T S S Experimental Set-up

22 November 2005CGW'05 - Krakow, Poland14

22 November 2005CGW'05 - Krakow, Poland15 Outline Introduction Trust Establishment Implementation Status Conclusions

22 November 2005CGW'05 - Krakow, Poland16 The computing world is moving from the desktop computing to the mobile and nomadic computing. The near future Grid users will prefer to access the grid resources from their smart devices. Current research efforts to address trust problem in a Grid environment focus on relatively static scenarios. Pervasive Grid Environments require dynamic establishment of trust. These pervasive Grid environments may be few years ahead but its important to envision how things will be dealt with in the future. Our future directions include: –Implementation of deeper and fine grained interactions among the various entities of the Pervasive Grid Environments. –Implementation of our trust model as an extension to the GSI.

22 November 2005CGW'05 - Krakow, Poland17