Trusted Computing: Open, Closed, or Both? Computer Science Department Seminar Prof. Clark Thomborson 6 th April 2006.

Slides:



Advertisements
Similar presentations
Appropriate Access InCommon Identity Assurance Profiles David L. Wasley Campus Architecture and Middleware Planning workshop February 2008.
Advertisements

Technical Assistance for Civil Society Organisations Regional Office This project is funded by the European Union. Advocacy and Policy Influencing KOEN.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
INTERNET SAFETY FOR STUDENTS
Digital Signatures Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) Coming up: Digital.
Internet, Intranet and Extranets
Information Security Policies and Standards
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
2 4. But first  A bit more from Tuesday about Privacy Social Media Marketing, 2e© 2-2.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Electronic Commerce. On-line ordering---an e-commerce application On-line ordering assumes that: A company publishes its catalog on the Internet; Customers.
Electronic Data Interchange (EDI)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
INTERNET SAFETY FOR STUDENTS
Understanding Active Directory
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
SEC835 Database and Web application security Information Security Architecture.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 4 th April 2007.
Trusted Computing BY: Sam Ranjbari Billy J. Garcia.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Introduction to Computers Lesson 12A. home Information System A mechanism that helps people collect, store, organize and use information.
Advanced Accounting Information Systems Day 27 Financial Reporting in an Electronic Environment October 28, 2009.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Additional Security Tools Lesson 15. Skills Matrix.
Maintaining Network Health. Active Directory Certificate Services Public Key Infrastructure (PKI) Provides assurance that you are communicating with the.
1 The World Bank Internet Services Program Rajan Bhardvaj
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Government Policy on Trusted Computing and Digital Rights Management a view from New Zealand Prof. Clark Thomborson 7 th April 2007.
Module 7 Planning and Deploying Messaging Compliance.
Network Security & Accounting
How TPMs Can (and Should) Control Copyright Presentation to InternetNZ Copyright Workshop Prof. Clark Thomborson 13 th February 2007.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
An Appropriate Design for Trusted Computing and Digital Rights Management Prof. Clark Thomborson 7 th April 2007.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Cybersafe and Secure BYHS ACCEPTABLE USE POLICY.  Access to Internet and computer resources should be for educational purposes.  Transmission of copyrighted.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Chapter 9 : Knowledge Transfer in the E-World KNOWLEDGE TRANSFER IN THE E-WORLD Chapter 4.
Unified Identity for Access Control Carl Ellison 7 April 2011 IDtrust.
8 – Protecting Data and Security
Identity and Access Management
Threat Modeling for Cloud Computing
Service Organization Control (SOC)
LATIHAN MID SEMINAR AUDIT hiday.
Introduction to Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
SharePoint Online Authentication Patterns
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
Appropriate Access InCommon Identity Assurance Profiles
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Presentation transcript:

Trusted Computing: Open, Closed, or Both? Computer Science Department Seminar Prof. Clark Thomborson 6 th April 2006

Topical Outline Three types of trust: Hierarchical, bridging, peering Three use cases: , B2B e-commerce, DRM Three OS development methodologies: Open, closed, hybrid

Technical and non-technical definitions of Trust In security engineering, placing trust in a system is a last resort. It’s better to rely on an assurance (e.g. a proof, or a recourse mechanism), than on a trusting belief that “she’ll be right”. In non-technical circles, trust is a good thing: more trust is generally considered to be better. Trustworthiness (an assurance) implies that trust (a risk- aware basis for a decision) is well-placed. A completely trustworthy system (in hindsight) is one that has never violated the trust placed in it by its users. Just because some users trust a system, we cannot conclude that the system is trustworthy. A rational and well-informed person can estimate the trustworthiness of a system. Irrational or poorly-informed users will make poor decisions about whether or not, and under what circumstances, to trust a system.

Privilege in a Hierarchy Information flows upwards, toward the leading actor (at the root) of a secret society. Commands and trust flow downwards. The King is the most privileged. The peons are the most trusted. King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … Information flowing up is “privileged”. Information flowing down is “trusted”. Orange book TCSEC, e.g. LOCKix.

Trustworthiness in a Hierarchy In a secret society, information flows upwards, toward the most powerful actor. Commands and trust flow downwards. Peons must be trusted with some information! If the peons are not trustworthy, then the system is not secure. King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … If the King does not show good leadership (by issuing appropriate commands), then the system will not work well. “Noblesse oblige”!

in a Hierarchy Information flows upwards, toward the leading actor.  Actors can send to their superiors. Non-upwards traffic is trusted: not allowed by default; should be filtered, audited, … King, President, Chief Justice, Pope, or … Peons, illegal immigrants, felons, excommunicants, or … up: “privileged” (allowed by default) down: “trusted” (disallowed by default, risk to confidentiality) across: privileged & trusted routing

across Hierarchies Q: How should we handle between hierarchies? Company XCompany Y Answers:  Merge  Subsume  Bridge Merged X+Y Not often desirable or even feasible. Cryptography doesn’t protect X from Y, because the CEO of the merged company has the right to know all keys. Can a noble CEO(X+Y) be found?

across Hierarchies Q: How can we manage between hierarchies? Company X Company Y Answers:  Merge  Subsume  Bridge

across Hierarchies Q: How can we manage between hierarchies? Company X Company Y Answers:  Merge  Subsume  Bridge! Bridging connection: trusted in both directions.

Bridging Trust We make bridges every time we send personal from our work computer. We make bridges every time we send work-related from our home computer. Even Kings can form bridges. However Kings are most likely to use an actual person, e.g. their personal secretary, rather than a bridging persona. Company X Hotmail Bridging connection: bidirectional trusted. Used for all communication among an actor’s personae. C should encrypt all hotmail to avoid revelations. C, acting as an employee C, acting as a hotmail client

Personae, Actors, and Agents I use “actor” to refer to an agent (a human, or a computer program), pursuing a goal (risk vs. reward), subject to some constraints (social, technical, ethical, …) In Freudian terms: ego, id, superego. Actors can act on behalf of another actor: “agency”. In this part of the talk, we are considering agency relationships in a hierarchy. Company X Hotmail When an agent takes on a secondary goal, or accepts a different set of constraints, they create an actor with a new “persona”. Bridging connection: bidirectional trusted, models communication among an agent’s personae. C, acting as an employee C, acting as a hotmail client

Bridging Trust: B2B e-commerce Use case: employee C of X purchasing supplies through employee V of Y. Employee C creates a hotmail account for a “purchasing” persona. Purchaser C doesn’t know any irrelevant information. Company X Company Y Most workflow systems have rigid personae definitions (= role assignments). Current operating systems offer very little support for bridges. Important future work! C, acting as an employee C, acting as a purchaser Employee V

Why can’t we trust our leaders? Commands and trust flow upwards (by majority vote, or by consensus). Information flows downwards by default (“privileged”). Upward information flows are “trusted” (filtered, audited, etc.) In a peerage, the leading actors are trusted, have minimal privilege, don’t know very much, and can safely act on anything they know. “Our leaders are but trusted servants…” Peers By contrast, the King of a hierarchy has an absolute right (“root” privilege) to know everything, is not trusted, and cannot act safely.

Turn the picture upside down! Information flows upwards by default (“privileged”). Commands and trust flow downwards. Downward information flows are “trusted” (filtered, audited, etc.) A peerage can be modeled by Bell-La Padula, because there is a partial order on the actors’ privileges. Equality of privilege is the default in a peerage, whereas inequality of privilege is the default in a hierarchy. Facilitator, Moderator, Democratic Leader, … Peers, Group members, Citizens of an ideal democracy, …

Peer trust vs. Hierarchical trust Trusting decisions in a peerage are made by peers, according to some fixed decision rule. There is no single root of peer trust. There are many possible decision rules, but simple majority and consensus are the most common. Weighted sums in a reputation scheme (e.g. eBay for goods, Poblano for documents) are a calculus of peer trust -- but “we” must all agree to abide by the scheme. “First come, first serve” (e.g. Wiki) can be an appropriate decision rule, if the cost per serving is sufficiently low. Trusting decisions in a hierarchy are made by its most powerful members. Ultimately, all hierarchical trust is rooted in the King.

Legitimation and enforcement Hierarchies have difficulty with legitimation. Why should I swear fealty (give ultimate privilege) to this would-be King? Peerages have difficulty with enforcement. How could the least privileged actor possibly be an effective facilitator? This isn’t Political Science 101! I won’t argue whether ideal democracies are better than ideal monarchies. I will argue that hierarchical trust is quite different to peer trust, that bridging trust is also distinct, and that all three forms are important in our world. My thesis: Because our applications software will help us handle all three forms of trust, therefore our operating systems should support all three forms.

1 Trust in DRM on home PCs Let us assume that user X is has root privilege on their home PC. User X can read and write anything stored on their PC. Anyone who sells DRM content to X ’s DRM purchasing persona must trust X ’s root- admin persona. X, as PC root admin DRM vendor 1.The DRM vendor makes a trusting transfer of information (sale of DRM content). 2.User X makes a trusting transfer of information (storing DRM content on their PC) between their purchasing persona and their using persona. X, as DRM user X, as DRM purchaser 2

3 DRM on a trusted PC X has given root privilege on their PC to an OS Admin Y. The DRM vendor must trust Y not to redistribute this content. Y, as root of X ’s PC DRM vendor 1.DRM vendor trusts a persona of the OS admin (not to abuse their knowledge of a decryption key). 2.OS Admin writes keys into X ’s kernel. This is a privileged transfer, then a trusted transfer. 3.DRM vendor makes a trusting sale of encrypted DRM content. 4.User X makes a trusting storage of DRM content ( X, as DRM user X, as DRM purchaser 4 OS Administrator Y 1 2a 2b

Peer administration of trusted PCs Information flows upwards by default (“privileged”). Commands and trust flow downwards. Downward information flows are “trusted” (filtered, audited, etc.) The users must refrain from reading the state of the key generator: this is an enforcement problem. Peerages have enforcement problems, and hierarchies have legitimation problems. Enforcement problems are manageable if no single infraction causes much damage, and if the cost of detection & response is small. Disclaimer: this is vapourware. Some components are available. How could this system gain the trust of a major corporation? (Let’s look at our use cases….) Cryptographic Key Distributor Users (a community with peer trust) Malware Blocker Spam Blocker

Trusted When a hierarchical organisation receives , the first question is “who is it from?” The answer to this question determines the privilege level of the incoming data. from a privileged persona is confidential – it can be delivered only to an actor from an unprivileged persona can be read by anyone in the hierarchy. When a hierarchy sends , the first question is whether it is low-high (privileged), high-low (trusted), or incomparable (cross-hierarchy: low-high-low). Trusted should be filtered and audited. The first questions can be answered accurately if the hierarchy can reliably associate personae with their cryptographic key(s).

Public Key Infrastructures Cryptographic keys can be associated with user-ids, using a “digital certificate” in a Public Key Infrastructure (PKI). Verisign issues certificates linked to credit card numbers. These are suitable for e-commerce, but not for (except in wealthy communities). Some PKIs issue certificates linked to addresses. It is far from clear how we can maintain a secure associations between an address and a persona. The Web of Trust issues digital certificates using a peer-trust model, however these certificates have not met widespread acceptance (perhaps because we don’t yet use personae!). Important future work!

E-commerce Corporations use idiosyncratic databases to identify their customers. Federated networks (e.g. Liberty Alliance) offer a compatibility layer (involving cryptographic keys) to organizations who agree to correlate their identity databases. “Single sign-on”: (Employee X of Company Y) == (Customer W of Company Z) (Shopping persona of X) == (Credit-card possessing persona of X) This allows organizations to model bridging trust! Nothing (other than a lack of trust) prevents peerages from sharing keys with hierarchical organisations, in a federated identity network. Corporate organizations rely on financial and legal structures to legitimate their hierarchies of privilege, and to enforce obedience to hierarchical commands (trust). Peerages will need financial and legal support, especially for enforcement, before they would be trusted by corporates. This is conceivable: “identity theft” is popularly understood to be a crime.

Peer-trust DRM A peerage could establish a good reputation for “fair trading” in DRM objects. Such a peerage would have to self-enforce a widely-accepted set of DRM rules. iTunes is an interesting test case It is easy to bypass DRM restrictions in iTunes, implying that users have privileged access to their DRM stores, and that they are trusted by the DRM vendor not to abuse this privilege. iTunes is hierarchical, but a peer-trust system might be able to enforce similar rules. An important leadership role in a peer-trust system is to evict peers who don’t follow the rules.

DRM for Baby Books Grandparents, parents, child are the Guardians of a Baby Book. They collectively control access rights. They may decide to add (or delete) Guardians. They must trust each other to “do the right thing” when in physical possession of the Baby Book. Guardians may allow others to read the Book, if this will not be inappropriate (as judged by other Guardians). At most one Guardian can write, at any given time. The Book should not be lost or damaged. Can an online Baby Book meet these requirements?

Trust, for Baby Books G1G2G3 W R2 R1 Guardian G3 is in a bridge-trust relationship with Writer W. W is trusted by (G1, G2, G3) not to abuse the write-privilege. G3 is in a peer-trust relationship with (G1, G2). G3 is trusted by (G1, G2) to take good care of the Book. Reader personae (R1, R2) are not currently animated. Actions of all these personae must be subject to review by (G1, G2, G3): auditable, non- repudiable, and confidential. The Book must be confidential, have integrity, and be available.

Open vs. Closed source Closed-source methodology is hierarchical. Only personae with sufficiently high privilege can read the source. An obfuscated OS kernel can hold, and manipulate, cryptographic keys for a remote, trusted, OS administrator. A trusted computer base (TCB) can offer additional security through hardware (TPM) enforcement of privilege. Open-source development is based on peer trust. The OS kernel can’t hold any secrets if it is open source. A trusted computer base (TCB) can hold keys in privileged (closed) hardware.

More vapourware Closed-source methodology is appropriate for designing hierarchical systems. These systems have trouble with legitimation. Why should a user trust that the system designers (and administrators) won’t abuse their privilege? Open-source methodology is appropriate for designing peerage systems. These systems have trouble with enforcement. Why should anyone trust a user not to abuse their privilege? Real-world peerages can legitimise hierarchies, and hierarchies can enforce peerages. Why shouldn’t our next-generation OS use this design pattern?

A Legitimised Hierarchy Auditor IG2IG1 OS Root Administrator Users Chair of User Assurance Group Inspector-General (an elected officer) Each assurance group may want its own Audit (different scope, objectives, Trust, … ). The OS Administrator may refuse to accept an Auditor. The OS Administrator makes a Trusting appointment when granting auditor-level Privilege to a nominee. Assurance organizations may be hierarchical, e.g. if the Users are governmental agencies or corporate divisions.

Acknowledgements & Sources Privilege, trust: Richard O'Brien, Clyde Rogers, “Developing Applications on LOCK”, Personae: Jihong Li, “A Fifth Generation Messaging System”, 2002; and Shelly Mutu-Grigg, “Examining Fifth Generation Messaging Systems”, Reputation systems: Benjamin Lai, Trust in Online Trading Systems, Trusted OS, use cases: Matt Barrett, “Towards an Open Trusted Computing Framework”, 2005; and “Using NGSCB to Mitigate Existing Software Threats”. Use cases: Qiang Dong, “Workflow Simulation for International Trade”, Use cases: WTC, Telecom NZ, ADLS, SOEI, Microsoft. I want to find more NZ corporate partners with interest in trusted computing!

Please contact me… Google for “Thomborson” Your tax dollars  my research programme Help NZ software developers decide whether or not (and how!) to design new products using trusted PCs Develop novel software services, to benefit NZ Develop new technology in software protection Protocol Initial contact: confidential, no cost to you I’ll want permission to report the contact to NZ’s Foundation for Research Science and Technology Publishable case studies: no cost to you Product development: Auckland UniServices incubator with “seed capital” grant from government