41
Security and Trust By Troy Lee

Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Embed Size (px)

Citation preview

Page 1: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Security and TrustBy Troy Lee

Page 2: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Overview• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control

• Distributed Security• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 3: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Computer Security• “The protection afforded to an automated information

system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).” – National Institute of Standards and Technology

Page 4: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

3 Main Aspects• Confidentiality (aka Secrecy)• Integrity• Availability

Page 5: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Confidentiality• Preventing unauthorized parties from accessing the

information or perhaps even being aware of the existence of the information

Page 6: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Cryptography• Equations• Cipher = Encryption Function(Encryption_Key, ClearText)• ClearText = Decryption Function(Decryption_Key, Cipher)

• 2 Forms• Shared-Key Cryptography• Public-Key Cryptography

• Best Practices• Evaluate Performance, Architecture, and Security Requirements• Choose a Suitable Public Algorithm• Use Frequently Changing Keys as the Primary Secrecy Mechanism

Page 7: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Integrity• Only authorized parties can manipulate the information and

do so only in authorized ways

Page 8: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Availability• Accessible by authorized parties on all appropriate occasions

Page 9: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Design Principles• Least Privilege• Fail-Safe Defaults• Economy of Mechanism• Complete Mediation• Open Design• Separation of Privilege• Least Common Mechanism• Psychological Acceptability• Defense in Depth

Page 10: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Defense in Depth

Page 11: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Architectural Access Control• Access Control Models• Connector-Centric Architectural Access Control

Page 12: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Access Control Models• Classic Discretionary Access Control• Role-Based Access Control• Mandatory Access Control

Page 13: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Connector-Centric Architectural Access Control• Basic Concepts• Central Role of Architectural Connectors• Algorithm to Check Architectural Access Control• Integrating Security in ASTER

Page 14: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Basic Concepts• Subject• Principal• Resource• Permission• Privilege• Safeguard

Page 15: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Central Role of Architectural Connectors• Components• Connectors• Secure Architecture Description Language

Page 16: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Secure xADL

Page 17: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Algorithm to Check Architectural Access Control

Page 18: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Secure Cooperation

Page 19: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Firefox

Page 20: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Integrating Security in ASTER

Page 21: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Distributed Security

Page 22: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Protection Against Piracy• Goals• Raise Cost of Breaking Protection Mechanism• Increase Probability of Being Caught• Discourage Attempts at Piracy

• Technologies• Hardware and Software Tokens• Water Marking• Code Partitioning

Page 23: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 24: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Trust• “A particular level of the subjective probability with which an

agent assesses that another agent or group of agents will perform a particular action, both before he can monitor such action (or independently of his capacity ever to be able to monitor it) and in a context in which it affects his own action” – Diego Gambetta

Page 25: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Trust Model• Describes the trust information that is used to establish trust

relationships, how that trust information is obtained, how that trust information is combined to determine trustworthiness, and how that trust information is modified in response to personal and reported experiences

Page 26: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Reputation-Based Systems• Types• Decentralized• Centralized

• Examples• Ebay• XREP

Page 27: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

XREP• Phase 1 – Resource Searching• Phase 2 – Resource Selection and Vote Polling• Phase 3 – Vote Evaluation• Phase 4 – Best Servent Check• Phase 5 – Resource Downloading

Page 28: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Phase 1

Page 29: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Phase 2

Page 30: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Phase 3

Page 31: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Phase 4

Page 32: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Phase 5

Page 33: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Architectural Approach to Decentralized Trust Management• Threats• Measures to Address Threats• Guidelines to Incorporate into an Architectural Style• Resultant Architectural Style• PACE Architectural Style• PACE-Based Trust-Enabled Decentralized File-Sharing App

Page 34: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Threats• Impersonation• Fraudulent Actions• Misrepresentation• Collusion• Denial of Service• Addition of Unknowns• Deciding Whom to Trust• Out-of-Band Knowledge

Page 35: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Measures to Address Threats• Use of Authentication• Separation of Internal Beliefs and Externally Reported

Information• Making Trust Relationships Explicit• Comparable Trust

Page 36: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Guidelines to Incorporate into an Architectural Style• Digital Identities• Separation of Internal and External Data• Making Trust Visible• Expression of Trust

Page 37: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Resultant Architectural Style• Functional Units• Communication• Information• Trust• Application

Page 38: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

PACE Architectural Style

Page 39: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

PACE-Based Trust-Enabled Decentralized File-Sharing App

Page 40: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

Summary• Security• Design Principles• Architectural Access Control• Access Control Models• Connector-centric Architectural Access Control

• Protection Against Piracy• Trust Management• Trust• Trust Model• Reputation-Based Systems• Architectural Approach to Decentralized Trust Management

Page 41: Security and Trust By Troy Lee. Overview Security Design Principles Architectural Access Control Access Control Models Connector-centric Architectural

References• Bidan, C., and V. Issarny. Security Benefits from Software Architecture.

Web. 7 Apr. 2012. <http://www.springerlink.com/content/87378446049q1783/fulltext.pdf>.

• Devanbu, Premkumar T., and Stuart Stubblebine. Software Engineering for Security: A Roadmap. 2000. Web. 7 Apr. 2012. <http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.1303>.

• Nagaratnam, Nataraj, Philippe Janson, John Dayka, Anthony Nadalin, Frank Siebenlist, Von Welch, Ian Foster, and Steve Tuecke. The Security Architecture for Open Grid Services. 17 July 2002. Web. 7 Apr. 2012. <ftp://ftp.cigs.unimo.it/pub/OGSA-SecArch-v1-07192002.pdf>.

• Taylor, Richard N., Nenad Medvidovic, and Eric M. Dashofy. Software Architecture: Foundations, Theory, and Practice. Hoboken, NJ: Wiley, 2010. Print.