1 Security and Agent Based Computing Environment Presented by: Feng Zhang, Markus Kaiser, Hien Nguyen, and Shu Wang.

Slides:



Advertisements
Similar presentations
Configuration management
Advertisements

Mobile Agents Mouse House Creative Technologies Mike OBrien.
CSE300-1 Profs. Steven A. Demurjian Q. Jin, J. Nam, Z. Qian and C. Phillips Computer Science & Engineering Department 191 Auditorium Road, Box U-155 The.
The Mobile Code Paradigm and Its Security Issues Anthony Chan and Michael Lyu September 27, 1999.
ABHIJIT PATHAK ABHIJIT PATHAK. Roadmap Introduction Introduction System Overview System Overview System Architecture System Architecture Detailed Design.
Securing the Broker Pattern Patrick Morrison 12/08/2005.
Approaches to EJB Replication. Overview J2EE architecture –EJB, components, services Replication –Clustering, container, application Conclusions –Advantages.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
Systems Analysis and Design in a Changing World, 6th Edition
David Adams ATLAS DIAL Distributed Interactive Analysis of Large datasets David Adams BNL March 25, 2003 CHEP 2003 Data Analysis Environment and Visualization.
Edward Tsai – CS 239 – Spring 2003 Strong Security for Active Networks CS 239 – Network Security Edward Tsai Tuesday, May 13, 2003.
CS-550 (M.Soneru): Protection and Security - 1 [SaS] 1 Protection and Security.
Chapter 13 Physical Architecture Layer Design
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
1 Building with Assurance CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute May 10, 2004.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Hands-On Microsoft Windows Server 2003 Administration Chapter 5 Administering File Resources.
1 Software Testing and Quality Assurance Lecture 30 – Testing Systems.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Nine Managing File System Access.
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Chapter 5 Database Application Security Models
NFS. The Sun Network File System (NFS) An implementation and a specification of a software system for accessing remote files across LANs. The implementation.
Distributed Systems: Client/Server Computing
Passage Three Introduction to Microsoft SQL Server 2000.
Web-based Portal for Discovery, Retrieval and Visualization of Earth Science Datasets in Grid Environment Zhenping (Jane) Liu.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
System Design/Implementation and Support for Build 2 PDS Management Council Face-to-Face Mountain View, CA Nov 30 - Dec 1, 2011 Sean Hardman.
Computer Security Tran, Van Hoai Department of Systems & Networking Faculty of Computer Science & Engineering HCMC University of Technology.
© 2010 VMware Inc. All rights reserved Access Control Module 8.
Access Control Module 8. Module You Are Here VMware vSphere 4.1: Install, Configure, Manage – Revision A vSphere Environment Introduction to VMware.
Greg Andolshek Alex Koch Michael McCormick Team Lasso.
1 Chapter Client-Server Interaction. 2 Functionality  Transport layer and layers below  Basic communication  Reliability  Application layer.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
B.Ramamurthy9/19/20151 Operating Systems u Bina Ramamurthy CS421.
Implementing Network Access Protection
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Database Application Security Models Database Application Security Models 1.
1 22 August 2001 The Security Architecture of the M&M Mobile Agent Framework P. Marques, N. Santos, L. Silva, J. Silva CISUC, University of Coimbra, Portugal.
SEC835 Practical aspects of security implementation Part 1.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 12 - Databases, Controls, and Security.
Chapter 5.4 DISTRIBUTED PROCESS IMPLEMENTAION Prepared by: Karthik V Puttaparthi
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
ECI – electronic Commerce Infrastructure “ An application to the Shares Market ” Demetris Zeinalipour ( Melinos Kyriacou
Jini Architecture Introduction System Overview An Example.
Security Mechanisms for Delivering Ubiquitous Services in Next Generation Mobile Networks Haitham Cruickshank University of Surrey workshop on Ubiquitous.
D’Agents 1 Presented by Haiying Tan May, 2002 D’Agents: Security in a multiple-language, mobile-agent system Robert S. Gary, David Kotz, George Cybenko,
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
A Flexible Access Control Service for Java Mobile Code HPCC lab 문 정 아.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
Learners Support Publications www. lsp4you.com Database Users and Administrator.
SECURITY. Security Threats, Policies, and Mechanisms There are four types of security threats to consider 1. Interception 2 Interruption 3. Modification.
Chapter 29: Program Security Dr. Wayne Summers Department of Computer Science Columbus State University
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
Securing Network Servers
CSE300-2 Distributed Object Computing
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Mobile Agents.
Microsoft Office Access 2003
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

1 Security and Agent Based Computing Environment Presented by: Feng Zhang, Markus Kaiser, Hien Nguyen, and Shu Wang

2 Outline  Motivation.  Objectives.  System architecture.  Implementation.  Empirical results.  Related work.  Conclusion and Future work.

3 Motivation  Addressing the security threats in agent computing paradigm is a challenging problem.  Our ongoing work of multi-agent distributed goal satisfaction project (MADGS) currently is not employing any security mechanism:  Unauthorized access:  Unauthorized access: No control over the agent communication, migration, resource allocation  Denial of services: No control over who can create agents and use resources  Disclosure of information: No protection over the communication among agents.

4 Objectives  Address security issues in MADGS by two models:  Use role-based security approach through JINI.  Implement role-based security inside MADGS.  Empirically evaluate these two models based on their performances, integrity, and scalability.

5 Objectives (cont.)  Allow any MADGS agents to access JINI resources such as university database.  Research:  Literature search of agent security, replication.

6 Overview of the current MADGS system Carolina server AgentManager ResourceManager PlanHandler agent Prodigy AgentTool Agent Environment Tool for creation & deployment agents Planning tool

7 Architecture of combining JINI Security Service with MADGS JINI Lookup Role-Based Privileges Security Registration Authorization List UniversityDB JINI Security Client MADGSJiniClient AgentManagerResourceAgent PlanHandlerAgent Carolina Server Prodigy AgentTool SecurityHandler

8 Architecture of combining JINI Security Service with MADGS

9 Architecture of building a security component in MADGS AgentManager ResourceAgent PlanHandlerAgent Carolina Agent Server Prodigy AgentTool SecurityHandler MADGS Security Client SecurityManager

10 Architecture of building a security component in MADGS

11 Implementation of using JINI Security Service  JINI Security Service  MADGSJiniClient  JINI Security Client  Integration between MADGSJiniClient and SecurityHandler

12 Implementation of using JINI Security Service +checkPrivileges() +createRole() +deleteRole() +createClient() +deleteClient() +Grant(Revoke)_UR_Client() +Grant(Revoke)_UR_Resource() …….. JINI Security Service Role Management +createRole() +deleteRole() Client Management +createClient() +deleteClient() AuthRoleToClient +Grant_UR_Client() +Revoke_UR_Client() ResourceManagement +appendResource() +deleteResource() GrantRevokeRSM +Grant_UR_Resource() +Revoke_UR_Resource()

13 Implementation of MADGSJiniClient MADGSJiniClient Capability:long +accessJiniResource( role,resc,inObj,outObj ) +checkResourceRequest() +createResource() +deleteResource() +findResource() -locateLookup() +discovered() +discarded() JINI Security Service +checkPrivileges() +createRole() +deleteRole() +createClient() +deleteClient() +appendResource() +deleteResource() +Grant_UR_Client() +Grant_UR_Resource() +Revoke_UR_Client() +Revoke_UR_Resource() 0..* 1

14 Implementation of JINI Security Client  Builds a more organized, easy to use graphical user interface compared to the existing one  Includes:  Role management, client management, resource management panels  Client and resource authorization panels

15 Implementation of JINI Security Client Role management panel

16 Implementation of JINI Security Client

17 Integration between MADGSJiniClient and SecurityHandler in MADGS  Add some translation code in MADGSJiniClient to retrieve information from JINI SS.  Each Carolina server is considered as a client of JINI environment.  JINI Security Service must keep each server’s information in the client table ahead of time.

18 Implementation of a security component in MADGS  MADGS Security Manager  SecurityHandler  MADGS Security Client  Making changes in Agent Manager and Message Manager

19 Implementation of MADGS Security Manager Role +roleId +roleDescription Resource +resourceId +serviceId Agent +agentId +agentName Privilege +resourceId +serviceId +methodId +privilegeId … Security Manager +getResourceList(..) +getServiceList(..) +createRole(..) +deleteRole(..) +getRoleById(..) +grantPrivilege(..) +revokePrivilege(..) +getRolePrivilege(..) +getAgentList(…) +grantRoleToAgent(..) +revokeRoleFromAgent(…) ……. *1*1 *1*1 *1*1 *1*1

20 Implementation of SecurityHandler in MADGS  Is a common interface for SecurityManager, AgentManager, MessageManager and MADGSJiniClient  Contains a set of public methods of SecurityManager  Each method in SecurityHandler will direct the call to the corresponding method in SecurityManager and MADGSJiniClient.

21 Implementation of MADGS Security Client  Usability criteria  Easy to use, comprehensible, well-organized, iterative design.  Includes  Role services  Authorization services  Agent services  Option to switch to use JINI Security Service or no security.

22 Implementation of MADGS Security Client

23 Implementation of MADGS Security Client Grant privileges to a role in MADGS Security Client

24 Using MADGS Security Manager to control agent migration in MADGS

25 Access JINI resources from any MADGS agents  Chooses university database as the JINI resource in this implementation.  Builds a tool to access this resource (JINI University Database tool).  Creates a MADGS agent to use this tool to access the university database from MADGS.

26 Implementation JINI University Database tool

27 Allow MADGS agents to use JINI UDB  Each Carolina server is considered as a client in JINI environment.  Each Carolina client will be granted a set of roles which is the union of all of the roles assigned to all agents operating on it.  Information of agents’ roles are kept in the agent directory and maintained by Security Manager in MADGS.

28 A MADGS agent access JINI university database resource

29 Objectives of empirical evaluation  To make sure the security enforcement is working properly.  To explore the effects of security on the main functions of MADGS such as agent communication or migration.  To look at the performance issues of using JINI Security Service

30 Empirical evaluation setting  Carolina server was installed on four machines (Lisa, Markus, Hien and Greg).  JINI Lookup Service and JINI Security service was install on Lisa machine  “Stress” agent was created on every machine to monitor the communication process among agents.  Measurement of communication time between  Sender agent with (without GUI) sends messages to Echo agent with(without GUI).  Communication time = receiving time – sending time  Using asynchronous communication

31 Deployment diagram of empirical evaluation

32 Stress agent

33 Empirical evaluation results

34 Empirical evaluation results

35 Empirical evaluation results

36 Empirical evaluation results

37 Empirical evaluation results

38 Related work  Research done in agent security  Mobile agent system built with security  Replication methods.

39 Related work in agent security  Protecting agent platforms  Security threats: masquerading, denial of service and unauthorized service.  Approaches: software-based fault isolation, safe code interpretation, signed code, proof carrying code, state appraisal, path history, role-based access.  Protecting agents  Security threats: spy agent’s communication, invoke agent’s public methods without permissions. Malicious platforms can intercept, update agent’s states  Approaches: environmental key generation, computing with encrypted function, record mutual itinerary with and without replication, tracing execution, role-based access

40 Existing mobile agents system with security  Telescript:  protecting agent platforms only by issuing a permit for each agent.  Concordia  protecting agent platforms: using statistically specified access control lists based on user identities.  protecting agents: using encryption control  Ajanta:  protecting agent platforms: based on concept of proxy interposition  protecting agents: by encryption.

41 Overview on replication approaches  Active replication  client sends its request to all replicas and takes the first incoming result  Passive replication  client sends its request to only one main server. This replica will execute the operation and copy the results to other existing replicas.  Semi active replication, semi passive replication  combine of active and passive replication

42Summary  Incorporated the security using role-based approach into a multiagent distributed goal satisfaction system.  Experienced with using JINI Security Service and implements an separated security component in MADGS.  Did empirical evaluation to see how the security affects the operation of a mobile agent system, which method (JINI or not JINI) is appropriate with MADGS.  Opened many interesting research issues from the implementation and evaluation of the project.

43 Future work  Look at negative privileges as well as positive privileges  Look at combination of an encryption technique with role information to protect role information from being spied and changed.  Replication of security database:  high level: using JINI  low level: using local database on Carolina server

44 Future work  Provide a tool for a security officer to analyze the role hierarchy.  Allow any JINI client to access some resource in MADGS.  Test with an working scenario in the context of distributed planning.