FileWall : Implementing File Access Policies Using Dynamic Access - - PowerPoint PPT Presentation

filewall implementing file access policies using dynamic
SMART_READER_LITE
LIVE PREVIEW

FileWall : Implementing File Access Policies Using Dynamic Access - - PowerPoint PPT Presentation

FileWall : Implementing File Access Policies Using Dynamic Access Context Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode DiscoLab Department of Computer Science Rutgers University Workshop on Spontaneous Networking May 12, 2006


slide-1
SLIDE 1

FileWall : Implementing File Access Policies Using Dynamic Access Context Stephen Smaldone, Aniruddha Bohra, and Liviu Iftode

DiscoLab Department of Computer Science Rutgers University

Workshop on Spontaneous Networking May 12, 2006

slide-2
SLIDE 2

Workshop on Spontaneous Networking

Organization:

Too many files, directories, servers

Protection:

Left to the discretion of the owner

Dynamism:

Cannot be incorporated without file system extension

slide-3
SLIDE 3

Workshop on Spontaneous Networking

Organization:

Too many files, directories, servers

Protection:

Left to the discretion of the owner

Dynamism:

Cannot be incorporated without file system extension

Administrator has little control over file access policies Administrator has little control over file access policies

slide-4
SLIDE 4

Workshop on Spontaneous Networking

File names are powerful

Can be used to implement access policies

All file system access are performed through messages

Message transformations can be used to enforce policies File system state can be constructed using information contained in messages

slide-5
SLIDE 5

Workshop on Spontaneous Networking

File names are powerful

Can be used to implement access policies

All file system access are performed through messages

Message transformations can be used to enforce policies File system state can be constructed using information contained in messages Access policies can be implemented by interposition and message transformation Access policies can be implemented by interposition and message transformation

slide-6
SLIDE 6

Workshop on Spontaneous Networking

Interposes on the client- server path Stores network flow history Evaluates each message against the firewall policies Passes-through, drops, or transforms network packets

slide-7
SLIDE 7

Workshop on Spontaneous Networking

Interposes on client-server path Stores file access history Evaluates each message against FileWall policies Transforms file system messages

slide-8
SLIDE 8

Workshop on Spontaneous Networking

Interposes on client-server path Stores file access history Evaluates each message against FileWall policies Transforms file system messages FileWall constructs virtual namespaces using file system namespaces and access policies through message transformation FileWall constructs virtual namespaces using file system namespaces and access policies through message transformation

slide-9
SLIDE 9

Workshop on Spontaneous Networking

Access control Quality of Service (QoS) File system organization Intrusion detection Information Lifecycle Management (ILM) Data transformations

slide-10
SLIDE 10

Workshop on Spontaneous Networking

Motivation Design

Access Context FileWall Policies

Implementation Evaluation Related Work Conclusions

slide-11
SLIDE 11

Workshop on Spontaneous Networking

Access history

Access statistics Sequence of accesses

Describes user behavior

Environment

Time, available disk space, CPU load, etc.

slide-12
SLIDE 12

Workshop on Spontaneous Networking

Requirements

Compact representation Contain semantic information which describes user behavior Easy to understand and specify Soft state

slide-13
SLIDE 13

Workshop on Spontaneous Networking

Node = file run

Groups of accesses performed by same application Open to close or approximate using clustered accesses

Attributes

File name Type of run (READ, WRITE, etc.) Operation count

Edge

Run started after and ended before parent

Depth-first traversal defines sequence of runs in an access tree

slide-14
SLIDE 14

Workshop on Spontaneous Networking

Root

slide-15
SLIDE 15

Workshop on Spontaneous Networking

Read 1

Root 1

slide-16
SLIDE 16

Workshop on Spontaneous Networking

Read 1, Create/Delete 2

Root 1 2

slide-17
SLIDE 17

Workshop on Spontaneous Networking

Read 1, Create/Delete 2, Read/Write 3

Root 1 2 3

slide-18
SLIDE 18

Workshop on Spontaneous Networking

Read 1, Create/Delete 2, Read/Write 3, Write 1

Root 1 2 3 1

slide-19
SLIDE 19

Workshop on Spontaneous Networking

Motivation Design

Access Context FileWall Policies

Implementation Evaluation Related Work Conclusions

slide-20
SLIDE 20

Workshop on Spontaneous Networking

Transform messages (requests and replies)

Sequence of rules INPUT and OUTPUT

Use:

Access context File attributes contained in messages

slide-21
SLIDE 21

Workshop on Spontaneous Networking

Policy: Show files accessed today For each client-visible file:

Access Time = TODAY

Transform directory listing messages

READDIR and READDIRPLUS

slide-22
SLIDE 22

Workshop on Spontaneous Networking

Access Context Policies

FileWall

slide-23
SLIDE 23

Workshop on Spontaneous Networking

Access Context Policies

M

READDIR

FileWall

slide-24
SLIDE 24

Workshop on Spontaneous Networking

Access Context Policies

READDIR

FileWall

slide-25
SLIDE 25

Workshop on Spontaneous Networking

Access Context Policies

READDIR

FileWall

slide-26
SLIDE 26

Workshop on Spontaneous Networking

Access Context Policies

READDIR READDIRPLUS

FileWall

slide-27
SLIDE 27

Workshop on Spontaneous Networking

Access Context Policies

READDIRPLUS

FileWall

slide-28
SLIDE 28

Workshop on Spontaneous Networking

Access Context Policies

READDIRPLUS

FileWall

slide-29
SLIDE 29

Workshop on Spontaneous Networking

Access Context Policies

READDIRPLUS

FileWall

slide-30
SLIDE 30

Workshop on Spontaneous Networking

Access Context Policies

READDIRPLUS READDIR

FileWall

slide-31
SLIDE 31

Workshop on Spontaneous Networking

INPUT Rule:

int fwin(rpc_msg request) { if (request.proc == READDIR) { request.proc = READDIRPLUS; return FORWARD; } }

OUTPUT Rule:

int fwout(rpc_msg reply) { if (reply.proc == READDIRPLUS) { FOREACH entp in reply { if (entp.atime == TODAY) copy_entry(resp_entp, entp) } reply.entries = res_entp; reply.proc = READDIR; return FORWARD; } }

Specified as C programs and compiled as loadable shared modules Specified as C programs and compiled as loadable shared modules

slide-32
SLIDE 32

Workshop on Spontaneous Networking

Motivation Design

Access Context FileWall Policies

Implementation Evaluation Related Work Conclusions

slide-33
SLIDE 33

Workshop on Spontaneous Networking

FileWall:

Click Modular Router NFS over UDP

slide-34
SLIDE 34

Workshop on Spontaneous Networking

FileWall

Click Modular Router NFS over UDP

FileWall Client

SFS toolkit Session establishment Bootstrapping

Identify list of available file systems

slide-35
SLIDE 35

Workshop on Spontaneous Networking

Motivation Design

Access Context FileWall Policies

Implementation Evaluation Related Work Conclusions

slide-36
SLIDE 36

Workshop on Spontaneous Networking

slide-37
SLIDE 37

Workshop on Spontaneous Networking

General purpose server

Email, user homes, web server Files mounted over NFS

Web servers are prone to flash crowds Current policies

Rate limit number of requests Disable web server

slide-38
SLIDE 38

Workshop on Spontaneous Networking

Access context

Rate of sequential file reads, directory listings, etc.

Policy

Hide files with rate greater than a threshold Show files again when rate falls below threshold

Only the source of the flash crowd disappears from the namespace

slide-39
SLIDE 39

Workshop on Spontaneous Networking

slide-40
SLIDE 40

Workshop on Spontaneous Networking

Infokernel [Arpaci-Dusseau 03], firewall/NAT Access Context

Desktop search [Soules 03] File system prefetching [Amer 02, Lei 97] Enforcing enterprise-wide policies [He 05]

Semantic file systems [Sheldon 91, Pike 93, Neuman 92, Rao 93] Extensible file systems [Zadok 00, Tewari 05]

slide-41
SLIDE 41

Workshop on Spontaneous Networking

User study

Real deployment Behavior models

slide-42
SLIDE 42

Workshop on Spontaneous Networking

User study

Real deployment Behavior models

Policy language

Constraints Debugging and logging

slide-43
SLIDE 43

Workshop on Spontaneous Networking

User study

Real deployment Behavior models

Policy language

Constraints Debugging and logging

Data transformations

Censorship Protocol translations

NFS -> CIFS Recipe-based file system (CASPER) IP -> RDMA

Video encoding Content adaptation

slide-44
SLIDE 44

Workshop on Spontaneous Networking

Per-file access policies can be enforced using virtual namespaces

No client or server modification required Soft state maintenance required

slide-45
SLIDE 45

Workshop on Spontaneous Networking

Per-file access policies can be enforced using virtual namespaces

No client or server modification required Soft state maintenance required

Provides administrators the ability to define a wide variety of access policies

Protect file systems Provide quality of service

slide-46
SLIDE 46
slide-47
SLIDE 47

Workshop on Spontaneous Networking

Dell Poweredge 2600 systems

Dual 2.4GHz Intel Xeon processors 1GB RAM 36GB 15000 RPM SCSI disk

Linux Gigabit Ethernet switch

slide-48
SLIDE 48

Workshop on Spontaneous Networking

slide-49
SLIDE 49

Workshop on Spontaneous Networking

Expressive Deployable Scalable Available