26
Architecting Secure Architecting Secure Mobile P2P Systems Mobile P2P Systems James Walkerdine James Walkerdine , Peter , Peter Phillips, Phillips, Simon Lock Simon Lock Lancaster University Lancaster University

Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Embed Size (px)

Citation preview

Page 1: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Architecting Secure Architecting Secure Mobile P2P SystemsMobile P2P Systems

James WalkerdineJames Walkerdine, Peter Phillips, , Peter Phillips,

Simon LockSimon Lock

Lancaster UniversityLancaster University

Page 2: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

OverviewOverview Mobility, P2P and SecurityMobility, P2P and Security

ChallengesChallenges

Overview of the PEPERS projectOverview of the PEPERS project

The PEPERS Development MethodologyThe PEPERS Development Methodology Architectural supportArchitectural support Tool support (video)Tool support (video)

EvaluationEvaluation

Page 3: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

MotivationMotivation Advances in wireless networking and mobile Advances in wireless networking and mobile

technology now make mobile P2P feasibletechnology now make mobile P2P feasible

Mobile P2P can support organisations that have:Mobile P2P can support organisations that have: Decentralised management styleDecentralised management style Geographically dispersed or highly mobile workforcesGeographically dispersed or highly mobile workforces Wide range of computing and communication devicesWide range of computing and communication devices

The ad-hoc and heterogeneous nature poses The ad-hoc and heterogeneous nature poses significant design challenges – especially with significant design challenges – especially with regards to security regards to security

Page 4: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Mobile P2P and SecurityMobile P2P and Security Connecting trusted and non-trusted devices Connecting trusted and non-trusted devices

requires:requires: Secure communication and storage (via Secure communication and storage (via

encryption)encryption) Robust authenticationRobust authentication

Difficult to achieve in decentralised and Difficult to achieve in decentralised and highly dynamic environmentshighly dynamic environments

Adapting traditionally centralised company Adapting traditionally centralised company security policiessecurity policies Consider distributed, mobile and intermittently Consider distributed, mobile and intermittently

connected platformsconnected platforms

Page 5: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

PEPERSPEPERS Mobile Peer-to-Peer Security Mobile Peer-to-Peer Security

Infrastructure (EU project)Infrastructure (EU project) Develop an infrastructure to support the Develop an infrastructure to support the

design, development and operational design, development and operational deployment of secure mobile P2P applicationsdeployment of secure mobile P2P applications

Jan 06 – Jun 08Jan 06 – Jun 08

PartnersPartners UK: Lancaster and City Universities, SymbianUK: Lancaster and City Universities, Symbian Greece: ATC, G4S, PhililetherosGreece: ATC, G4S, Phililetheros Italy: EngineeringItaly: Engineering

Page 6: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

PEPERS DevelopmentsPEPERS Developments

Development Framework Runtime Framework

Design

and

Architecture

Framework

(DAF)

Static

Verification

Framework

(SVF)

Execution

Framework

(EF)

Dynamic

Verification

Framework

(DVF)

Development Platform Runtime Platform

DevelopmentMethodology

P2P ApplicationReference

Architectures

Tool Support

Page 7: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

User Partner ScenariosUser Partner Scenarios

PhileleftherosPhileleftheros Use mobile devices to support Use mobile devices to support

communication between journalists, communication between journalists, photographers, etc, in the fieldphotographers, etc, in the field

Support the process of publication Support the process of publication creationcreation

G4SG4S Use mobile devices to support guard Use mobile devices to support guard

patrols on clients site (e.g. door codes), etcpatrols on clients site (e.g. door codes), etc Communication with HQCommunication with HQ

Page 8: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

PEPERS PEPERS Development Development MethodologyMethodology

(PDM)(PDM)

Page 9: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

OverviewOverview A Methodology and Support ToolA Methodology and Support Tool

Supports developers in building Supports developers in building secure mobile P2P applicationssecure mobile P2P applications

Stems from our previous workStems from our previous work BANKSEC - Secure Component based BANKSEC - Secure Component based

developmentdevelopment P2P ARCHITECT - Architecting P2P ARCHITECT - Architecting

Dependable P2P SystemsDependable P2P Systems

Page 10: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Secure Mobile P2P Secure Mobile P2P Development Development

ConsiderationsConsiderations Make security central to the designMake security central to the design

Development perspectiveDevelopment perspective Organisational perspectiveOrganisational perspective

Consider requirements and constraints on Consider requirements and constraints on security cause by:security cause by: MobilityMobility Network and CommunicationNetwork and Communication P2P TechnologyP2P Technology

Be architecturally drivenBe architecturally driven

Page 11: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Key types of P2P Key types of P2P TopologyTopology

Structured indirectcommunication

ring server/superpeermodel

Example SystemsAzureus Bit Torrent

Direct Connect (although not all servers communicate)

Unstructured indirectcommunication

server/superpeermodel

Example SystemsGnutella (v0.6), Kazaa

DirectCommunication

Example SystemsARPANet

Un-structured indirectcommunication

Example SystemsGnutella (v0.4), FreeNet

Structured indirectcommunication

Example SystemsPastry, Chord

Decentralised

Single centralisedindex server

Example SystemsNapster, OpenNap

Computational model(no autonomy)

Example SystemsSETI@home

Semi-Centralised

Hybrids (examples)

Unstructured indirectcommunication overlaid

over a structured indirectcommunication architecture

Example SystemsStructella

Page 12: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Topology support for Topology support for SecuritySecurity

MediumHighHighMediumMediumMediumMediumMediumHighMediumunstructured indirect communication overlaid over a structured indirect communication model

HighHighMediumHighHighHighHighHighMediumHighunstructured indirect communication server/super peer

Potentially High

Potentially High

Potentially High

Potentially High

Potentially High

Potentially High

Potentially High

PotentiallyHigh

Potentially High

Potentially High

Hybrid topologies(general)

HighMediumMediumHighHighHighHighHighLowHighSemi-Centralised

LowLowHighLowLowLowMediumLowHighLowDecentralisedUn-structured Direct Communication

MediumHighHighMediumMediumMediumMediumLowMediumMediumDecentralisedStructured Indirect Communication

HighHighLowHighLowMediumHighHighHighMediumDecentralisedDirect Communication

TrustRecoveryPrivacyPeer / User Management

MonitoringLoggingEncryptionAuthentication / Authorisation

Attack Resistance

Attack Detection

Page 13: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Development Development MethodologyMethodology

5 stage method5 stage method Spiral – developers do not need follow fixed Spiral – developers do not need follow fixed

phasesphases Iterative – stages can be revisited (e.g. when Iterative – stages can be revisited (e.g. when

new requirements are discovered, etc)new requirements are discovered, etc) Flexible – can accommodate different software Flexible – can accommodate different software

engineering techniques (components, etc)engineering techniques (components, etc)

Each stage contains activities geared Each stage contains activities geared specifically for supporting secure mobile specifically for supporting secure mobile P2P application developmentP2P application development

Page 14: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Requirements Elicitation

Propose System Architecture

Start

Propose Sub-System Design

System Implementation

Verification and Validation

Each stage tailoredto consider P2P,Security and Mobile aspects

Page 15: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Support ToolSupport Tool Web basedWeb based

Knowledge base of analysis and reference architecturesKnowledge base of analysis and reference architectures

Support for identifying, specifying and managing Support for identifying, specifying and managing requirementsrequirements

Support for P2P topology selectionSupport for P2P topology selection

Support for the identification of key secure mobile P2P Support for the identification of key secure mobile P2P application functionalityapplication functionality

Support for Secure Mobile P2P Application Reference Support for Secure Mobile P2P Application Reference Architecture selectionArchitecture selection

Support for Sub-system identification and initial Support for Sub-system identification and initial descriptiondescription

Support for general managerial and trace ability activities. Support for general managerial and trace ability activities.

Page 16: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

G4S Case StudyG4S Case Study

Allow guards and mobile patrols to Allow guards and mobile patrols to transmit/receive sensitive datatransmit/receive sensitive data With one anotherWith one another With the ARCWith the ARC

Often ad-hoc exceptional situationsOften ad-hoc exceptional situations Emergencies guards are responding tooEmergencies guards are responding too Change in guard roles (team leader, etc)Change in guard roles (team leader, etc) Access privileges can changeAccess privileges can change

Page 17: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Requirements Elicitation

Propose System Architecture

Start

Propose Sub-System Design

System Implementation

Verification and Validation

Page 18: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Propose System Propose System ArchitectureArchitecture

Key ActivitiesKey Activities Select P2P suitable topologiesSelect P2P suitable topologies Derive system functional capabilitiesDerive system functional capabilities Select mobile P2P application reference Select mobile P2P application reference

architecturesarchitectures Establish architectural modelEstablish architectural model Describe sub-systemsDescribe sub-systems Initial PEPERS runtime platform considerationInitial PEPERS runtime platform consideration Where possible, allocate requirements to sub-Where possible, allocate requirements to sub-

systemssystems Evaluate architectureEvaluate architecture

Page 19: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Application Reference Application Reference ArchitecturesArchitectures

Developed within PEPERSDeveloped within PEPERS Key P2P application domains (IM, shared workspace, Key P2P application domains (IM, shared workspace,

DL,…)DL,…) Decentralised and semi-centralised versionsDecentralised and semi-centralised versions

Provide guidance on the functionality and Provide guidance on the functionality and structure that would be required for particular structure that would be required for particular types of applicationtypes of application

Identified capabilitiesIdentified capabilities Represent abstract system functionalityRepresent abstract system functionality Capabilities of individual layers and whole Capabilities of individual layers and whole

architecturesarchitectures

Page 20: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Shared Workspace Shared Workspace ApplicationApplication

Reference ArchitectureReference Architecture

Application/GUI

Real-time ConnectionMonitor/Synchronisation

Distributed Authentication/Authorisation

Awareness Monitor

DecentralisedP2P

Communication

Encryption

Distributed Logging

P2P Network Layer

KnownPeer

RepositoryDistributedLog Storage

Workspace Management

LocalData

Page 21: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Case StudyCase Study Designers began to investigate the suitability of the different P2P Designers began to investigate the suitability of the different P2P

topologies and reference architecturestopologies and reference architectures

Semi-centralised topology chosenSemi-centralised topology chosen Fitted in with their current systemsFitted in with their current systems

Distributed Repository, Shared Workspace reference Distributed Repository, Shared Workspace reference architectures chosenarchitectures chosen

Sub-systems identified, high level architecture createdSub-systems identified, high level architecture created Drawing upon reference architectures – though not all sub-systems Drawing upon reference architectures – though not all sub-systems

usedused

Identifed suitable PEPERS runtime platform modules that can be Identifed suitable PEPERS runtime platform modules that can be usedused

Page 22: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

Tool VideoTool Video

Page 23: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

NetworkNative

ApplicationsCamera

Device - Symbian OS

Database

User Interface

MultimediaManagement

P2PCommunication

Authentication/Authorisation

Encryption

ApplicationServer

Application

Page 24: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University
Page 25: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

EvaluationEvaluation Two evaluations performedTwo evaluations performed

External (mobile phone software companies, developers, etc)External (mobile phone software companies, developers, etc) Internal (PEPERS partners)Internal (PEPERS partners)

Good starting point for building secure mobile P2P Good starting point for building secure mobile P2P applicationsapplications

ImprovementsImprovements More thorough security and mobility analysisMore thorough security and mobility analysis

Threat analysis, weightings for security propertiesThreat analysis, weightings for security properties Degree of mobilityDegree of mobility

Encourage the consideration of technologiesEncourage the consideration of technologies Support other non-functional properties (reliability, scalability, etc)Support other non-functional properties (reliability, scalability, etc) Rationale behind tool recommendationsRationale behind tool recommendations Better integration with 3Better integration with 3rdrd party tools party tools

Page 26: Architecting Secure Mobile P2P Systems James Walkerdine, Peter Phillips, Simon Lock Lancaster University

SummarySummary Mobile P2P systems are now a feasible possibilityMobile P2P systems are now a feasible possibility

Introduces new challenges in terms of mobility and securityIntroduces new challenges in terms of mobility and security

Presented the PDM and supporting toolPresented the PDM and supporting tool Method to support the development of secure mobile P2P Method to support the development of secure mobile P2P

systemssystems Focused on the architectural support the PDM providesFocused on the architectural support the PDM provides

Evaluation has shown benefits, but still areas of Evaluation has shown benefits, but still areas of improvementimprovement

Tool and further information can be found at Tool and further information can be found at www.pepers.orgwww.pepers.org