Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008

Slides:



Advertisements
Similar presentations
TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
Advertisements

802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
Web Services Architecture An interoperability architecture for the World Wide Service Network.
The Next Generation Grid Kostas Tserpes, NTUA Beijing, 22 of June 2005.
SelfCon Foil no 1 Dynamic component systems 1. SelfCon Foil no 2 Pre-structured systems vs. dynamic component systems Pre-structured – emphasis on content.
Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
Web Services Andrea Miller Ryan Armstrong Alex. Web services are an emerging technology that offer a solution for providing a common collaborative architecture.
Unified Modeling (Part I) Overview of UML & Modeling
Software Requirements
Using Architecture Frameworks
Emerging Research Dimensions in IT Security Dr. Salar H. Naqvi Senior Member IEEE Research Fellow, CoreGRID Network of Excellence European.
Web Service Architecture Part I- Overview and Models (based on W3C Working Group Note Frank.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Web Services Michael Smith Alex Feldman. What is a Web Service? A Web service is a message-oriented software system designed to support inter-operable.
Business Rules: The Promise of Data Warehousing. In the Beginning: Formulating Business Rules The Business Objectives The Promise (Data Warehousing) –
What is Software Architecture?
Software Architecture in Practice (3rd Ed) Introduction
Methodology and Tools for End-to-End SOA Configurations By: Fumiko satoh, Yuichi nakamura, Nirmal K. Mukhi, Michiaki Tatsubori, Kouichi ono.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
Cardea Requirements, Authorization Model, Standards and Approach Globus World Security Workshop January 23, 2004 Rebekah Lepro Metz
Katanosh Morovat.   This concept is a formal approach for identifying the rules that encapsulate the structure, constraint, and control of the operation.
EXPECTATIONS OF TURKISH ENVIRONMENTAL SECTOR FROM INSPIRE Ministry of Environment and Forestry June, 2010 Özlem ESENGİN Ahmet ÇİVİ Tuncay DEMİR.
1 TAPAS Workshop Nicola Mezzetti - TAPAS Workshop Bologna Achieving Security and Privacy on the Grid Nicola Mezzetti.
Digital Object Architecture
1 Multi Cloud Navid Pustchi April 25, 2014 World-Leading Research with Real-World Impact!
An Introduction to Software Architecture
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
95-843: Service Oriented Architecture 1 Master of Information System Management Service Oriented Architecture Lecture 10: Service Component Architecture.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
Secure Credential Manager Claes Nilsson - Sony Ericsson
TIED: A Cluster of One. TIED: Trial Integration Environment DETER The DETER folks: Terry Benzel, Bob Braden, Ted Faber, John Hickey, Alefiya Hussain,
EU Project proposal. Andrei S. Lopatenko 1 EU Project Proposal CERIF-SW Andrei S. Lopatenko Vienna University of Technology
© DATAMAT S.p.A. – Giuseppe Avellino, Stefano Beco, Barbara Cantalupo, Andrea Cavallini A Semantic Workflow Authoring Tool for Programming Grids.
GEC5 Security Summary Stephen Schwab Cobham Analytical Services July 21, 2009.
A Federation Architecture for DETER Ted Faber, John Wroclawski, Kevin Lahey, John Hickey University of Southern California Information Sciences Institute.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
Ocean Observatories Initiative Data Management (DM) Subsystem Overview Michael Meisinger September 29, 2009.
© 2012 xtUML.org Bill Chown – Mentor Graphics Model Driven Engineering.
Architectural Design Yonsei University 2 nd Semester, 2014 Sanghyun Park.
Modeling Component-based Software Systems with UML 2.0 George T. Edwards Jaiganesh Balasubramanian Arvind S. Krishna Vanderbilt University Nashville, TN.
Semantic Web Technologies Research Topics and Projects discussion Brief Readings Discussion Research Presentations.
System.Security.Policy namespace Chinmay Lokesh.NET Security CS 795 Summer 2010.
NT SECURITY Introduction Security features of an operating system revolve around the principles of “Availability,” “Integrity,” and Confidentiality. For.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Overview of Privilege Project at Fermilab (compilation of multiple talks and documents written by various authors) Tanya Levshina.
EUCISE 2020 EUCISE 2020 has received funding from the European Union’s seventh framework programme under grant agreement no: Participating Countries:
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Interoperable Trust Networks Chris Rogers California Dept of Justice February 16, 2005.
Week 04 Object Oriented Analysis and Designing. What is a model? A model is quicker and easier to build A model can be used in simulations, to learn more.
Sponsored by the National Science Foundation Establishing Policy-based Resource Quotas at Software-defined Exchanges Marshall Brinn, GPO June 16, 2015.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Globus and PlanetLab Resource Management Solutions Compared M. Ripeanu, M. Bowman, J. Chase, I. Foster, M. Milenkovic Presented by Dionysis Logothetis.
JRA1.4 Models for implementing Attribute Providers and Token Translation Services Andrea Biancini.
© 2004 IBM Corporation ICSOC2004 Panel Discussion: Grid Systems: What is needed from web service standards? Jeffrey Frey IBM.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Globus: A Report. Introduction What is Globus? Need for Globus. Goal of Globus Approach used by Globus: –Develop High level tools and basic technologies.
Newcastle uopn Tyne, September 2002 V. Ghini, G. Lodi, N. Mezzetti, F. Panzieri Department of Computer Science University of Bologna.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: September,
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
Designing a Federated Testbed as a Distributed System Robert Ricci, Jonathon Duerig, Gary Wong, Leigh Stoller, Srikanth Chikkulapelly, Woojin Seok 1.
Self Healing and Dynamic Construction Framework:
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx
Single Point of Entry (SPOE)
An Introduction to Software Architecture
Presentation transcript:

Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008

Outline Testbed Federation DETER federation model and architecture Access control in the DETER architecture Access control implementation: fedd

Federation of Network Testbeds Federation: Independent testbeds working together Testbeds maintain local control of shared resources Inherent tension: Experimenters' needs Testbeds' constraints Inherent power: More resources More kinds of resources More environments

Federation's Power: not just more resources Federation enables Combining testbed resources Hardware Tools Combining testbed environments Operational features – security properties Combining testbed communities Collaborative experiments Competitive exploration Individual testbed properties come from testbed independence

The Critical Capabilities Helping experimenters federate Fitting experiments into federation Fitting federation into experiments Letting testbeds control their resources Sharing information about experimenters Controlling access to resources Supporting federated experiments Powerful tools Usable environments

DETER Federation Model Experiments are created from federated resources Minimal prior agreements between testbeds Specifically humans are not involved per-experiment Testbeds have emulab interfaces Federated experiments are conducted in emulab-like environment Ssh logins Shared filesystems Emulab event system Model Goal: create a familiar environment appropriate for the experiment from independent testbeds

DETER Federation Architecture Flow: Experimenter: think, design, experiment Federator: decompose, embed, connect Testbed: authenticate, allow, allocate Federated Experiment Creator Federator Testbeds Federated Experiment Creator User Standard Experiment Representation “Assembly Code” testbed configuration operations

Making an Experiment Experimenter has hypothesis Turning a hypothesis to an experiment: Selecting appropriate topology Positioning experimental elements in it Mapping those to physical elements Mapping complicated by federation Resource discovery Access requirements Experimental effects Each automated phase improves access

Experiment Creation: Mapping an Experiment User assisted decomposition: User understands federation and experiment Suggests possible splittings to tools Automated decomposition: Tools detect areas of homogeneity and split Domain-specific definitions of homogeneity Experiment generation: Loose description in domain specific-language Generate and split experiment from it Pipeline into decomposition

Access Control: Putting global users into local scope Resources are controlled locally Federated users must be integrated into local: Representations Policies Accounting After access control exchange: Federated experimenter can authenticate to testbed Testbed knows experimenter's rights in local terms Analogous to getting an account on a system

DETER Access Control Architecture Based on single-emulab structures: Projects control resource access User's project membership determines access DETER federation architecture: Users, projects, testbeds have global names Federants permit accesses (create accounts) based on: Proof of name Attested facts (evaluated wrt name)‏ Local information bound to name Federants assign federated experiments to local projects

Access Exchange Access key: SSH public key Project/User has rights to requested resources Project/User configured to be accessible by Access key FederatorTestbed

Global Entities: Users, Projects, Testbeds Basis of a three-level access control system Each has different attestation abilities Testbeds about itself, its projects, and its users Projects about itself and its users Users about themselves A user making a request can Ask directly Ask its project to ask for it (use a project name)‏ Ask its testbed to ask for it (use a testbed name)‏ Attestation improves scalability

Self-certifying Names Properties: Holder can prove identity interactively Others agree on holder's identity Many implementations (self-signed PGP key)‏ Provide a global decentralized naming system Scale Federants access info tied to names Flexibility

Fedd: Platform for Access Control Implementation of the DETER access control arch. Open interfaces: WSDL/SOAP descriptions We have 2 interoperable implementations Prototype implementation of global identifiers for federation Flexible access control descriptions in emulab terms Dynamic project allocation

Federation ID Implementation ID is hash of a public key Hash obscures key format, length for versatility Passed between Federator and testbed as X.509 certificatates Self-signed certificate – self-certifying name NB: name as hash provides more assurance Can use certification chain as introducer Binding information to ID through trusted chain Direct TLS/SSL implementation

Access Control Configuration Map from (testbed, project, user) to local (project, user)‏ Abstractly: Maps from global namespace -> local namespace Realizes access control decisions as local rights Concretely Provides access using familiar access controls Maintains local control over resources An access control request may result in local project creation

Expressing Access Decisions Fedd access rules Known user to static project: (deter, DeterTest, faber) -> (fDeter, faber)‏ Any user from testbed to static project, new user: (deter,, ) -> (fDeter, )‏ Project annotated with access: (deter,, ) -> (fDeter:special_type, )‏ Anonymous users: (,, ) -> (lockdown, anon)‏

Dynamic Project Allocation Fedd can create projects for federated experiments Dynamic projects: Precise allocation of rights to federated experiment Clear accounting of federated actions More system resources & startup time Static projects: Amortize system costs for federation support Naturally support discrete access classes No human intervention required

Future Work: Realizing more of the Architecture Tools for experiment creation Network topology-based embedders Domain specific embedders Experiment Creation/Topology Generation tools Resource advertisements Experiment Environment More scalable file system More natural model for experimentation in the large

Conclusions Presented model for experiments that supports Larger experiments New kinds of experiments DETER federation architecture Framework for creating such experiments Particular piece of that architecture: Access Control Abstract framing Current implementation

Attestation and Amplification Projects and Testbeds May have more privileges than users May be more constrained than users “DETER testbed may use any hardware, but only 10 total machines” Users negotiate with project & testbed agents Agent will make request with its credentials Agent may impose additional constraints