Implementing User-Defined Security Policies in Cooperative Systems With Group Access Controls Jeffrey Hemmes 28 June 201528 June 201528 June 2015.

Slides:



Advertisements
Similar presentations
Decentralized User Authentication in a Global File System Max Meisterhans - Seminar in Distributed Computing WS 05/06.
Advertisements

Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Study of Hurricane and Tornado Operating Systems By Shubhanan Bakre.
The Basic Authentication Scheme of HTTP. Access Restriction Sometimes, we want to restrict access to certain Web pages to certain users A user is identified.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Emery Berger University of Massachusetts Amherst Operating Systems CMPSCI 377 Lecture.
1 Presentation at SciDAC face-to-face January 2005 Ron A. Oldfield Sandia National Laboratories The Lightweight File System.
 Introduction Originally developed by Open Software Foundation (OSF), which is now called The Open Group ( Provides a set of tools and.
Kerberos Authentication for Multi-organization Cross-Realm Kerberos Authentication User sent request to local Authentication Server Local AS shares cross-realm.
MITP 458 Application Layer Security By Techjocks.
P2P: Advanced Topics Filesystems over DHTs and P2P research Vyas Sekar.
Chord and CFS Philip Skov Knudsen Niels Teglsbo Jensen Mads Lundemann
Group Management, Permissions, and Revocation in OceanStore Barbara Engelhardt George Porter Naveen Sastry UC Berkeley January 2002.
September 24, 2007The 3 rd CSAIL Student Workshop Byzantine Fault Tolerant Cooperative Caching Raluca Ada Popa, James Cowling, Barbara Liskov Summer UROP.
Wide-area cooperative storage with CFS
What is a Distributed System? Computing (CPU) Mass Storage User Interface Just insert a network?
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Authentication and authorization Access control consists of two steps, authentication and authorization. Subject Do operation Reference monitor Object.
FTP File Transfer Protocol. Introduction transfer file to/from remote host client/server model  client: side that initiates transfer (either to/from.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
Fine-Grained Access Control (FGAC) in the Cloud Robert Barton.
Evolution to CIMI Charles (Cal) Loomis & Mohammed Airaj LAL, Univ. Paris-Sud, CNRS/IN2P3 29 August 2013.
Xrootd Authentication & Authorization Andrew Hanushevsky Stanford Linear Accelerator Center 6-June-06.
Cooperative File System. So far we had… - Consistency BUT… - Availability - Partition tolerance ?
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Pond: the OceanStore Prototype Sean Rhea, Patric Eaton, Dennis Gells, Hakim Weatherspoon, Ben Zhao, and John Kubiatowicz University of California, Berkeley.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
1 Web services and security ---discuss different ways to enforce security Presenter: Han, Xue.
Announcements Assignment 3 due. Invite friends, co-workers to your presentations. Course evaluations on Friday.
INTRODUCTION What is a Web-Enabled Database? Problem and its Importance Two-tier Architecture Three-tier Architecture Need for a compatible centralized.
What is a Distributed File System?? Allows transparent access to remote files over a network. Examples: Network File System (NFS) by Sun Microsystems.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
European Laboratory for Particle Physics NICE NT Web Services Alberto Di Meglio CERN IT/DIS/NCS.
A Brief Documentation.  Provides basic information about connection, server, and client.
DISTRIBUTED COMPUTING Introduction Dr. Yingwu Zhu.
DAV ACLs Lisa Lippert Microsoft. Agenda Background –drafts, terms, how file systems use ACLs –Other ACLs efforts Scenarios Goals –goals, may-haves, won’t-haves.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Security (and privacy) Larry Rudolph With help from Srini Devedas, Dwaine Clark.
1 Internet Network Services. 2 Module - Internet Network Services ♦ Overview This module focuses on configuring and customizing the servers on the network.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Some Ideas for a Revised Requirement List Dirk Duellmann.
GRID Centralized Management of the Globus grid-mapfile Carlo Rocca, INFN Catania.
COSC573 Instructor: Professor Anvari Student:Shen Zhong ID#: Summer semester,1999 Washington.D.C.
1 Objectives Discuss File Services in Windows Server 2008 Install the Distributed File System in Windows Server 2008 Discuss and create shared file resources.
Privilege Management Chapter 22.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
Review CS File Systems - Partitions What is a hard disk partition?
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Distributed File Systems Questions answered in this lecture: Why are distributed file systems useful? What is difficult about distributed file systems?
Decentralized User Authentication in a Global File System CS294-4 Presentation Nikita Borisov October 6, 2003.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
Dsitributed File Systems
Implementing POP3 and IMAP4 Using Dovecot AfNOG 2016 Scalable Internet Services (SS-E) Gaborone, Botswana Presented by Michuki Mwangi (Built on materials.
Windows Active Directory – What is it? Definition - Active Directory is a centralized and standardized system that automates network management of user.
Protection and Security
CS490 Windows Internals Quiz 2 09/27/2013.
Implementing POP3 and IMAP4 Using Dovecot
Cisco Real Exam Dumps IT-Dumps
CE Operating Systems Lecture 21
An Introduction to Cloud Computing
Scheduled Accomplishments
Outline Announcements Lab2 Distributed File Systems 1/17/2019 COP5611.
Chord and CFS Philip Skov Knudsen
Outline Review of Quiz #1 Distributed File Systems 4/20/2019 COP5611.
Ch 9 – Distributed Filesystem
Programming Assignment #1
Access Control What’s New?
Presentation transcript:

Implementing User-Defined Security Policies in Cooperative Systems With Group Access Controls Jeffrey Hemmes 28 June June June 2015

Problem Need flexible access controls for shared storage Need flexible access controls for shared storage Existing systems either overly fine-grained or overly coarse-grained Existing systems either overly fine-grained or overly coarse-grained Groups may be distributed Groups may be distributed Cannot assume shared file system Cannot assume shared file system Users may not have root privileges Users may not have root privileges

Project Objectives Add decentralized groups to Chirp Add decentralized groups to Chirp Basic primitives Basic primitives Policy mechanisms – Caching Policy mechanisms – Caching Caching policies Caching policies Group files Group files Lookup decisions Lookup decisions ► Resource Owners Set Policy

ACL Checking without decentralized groups ACL File Server Client authentication acl_check ► all ACL checking performed locally

ACL Checking with decentralized groups ACL File Server A Client authentication lookup File Server B File Server C File Server D lookup

Policy Caching Pol C Pol D get_policy Pol B policy_cache File Server B ACL File Server A Client hostname port policy policy_exp file_exp dec_exp

Group File Caching get_file grp1 host B grp1 cache_file_index File Server B ACL File Server A Client grp1 hostname port grp_name file_name expiration

Decision Caching File Server B ACL File Server A Client lookup cache result decision_cache hostname port grp_name user_name result expiration

Performance Effect of Policy Caching on Interserver RPCs

Performance

Conclusion Groups → Flexible Access Controls Groups → Flexible Access Controls Group File & Policy Caching → Scalability Group File & Policy Caching → Scalability Decision Caching → Performance Decision Caching → Performance Consistency Tradeoffs → Security Policies Consistency Tradeoffs → Security Policies

Questions