integrity justified experimental provenance
play

(Integrity Justified) Experimental Provenance Patrick McDaniel, - PowerPoint PPT Presentation


  1. �������฀฀���฀฀�������� ��������������฀�������� � � �������฀���฀��������฀��������฀������ ����������฀��฀��������฀�������฀���฀����������� ������������฀�����฀�����������฀����������฀����฀฀�� (Integrity Justified) Experimental Provenance Patrick McDaniel, Pennsylvania State University Workshop on GENI and Security Davis, CA -- January 22, 2009 Systems and Internet Infrastructure Security Laboratory (SIIS) Page 1

  2. Provenance • A human scale problem: � Data often comes from many sources ... � ... is synthesized/influenced by complex/hidden processes ... � ... thus, how do you really know what the data means? • Data provenance immutably identifies how data came to be in the state it is. � Who/what contributed to it? � What was it based on? � When was it generated? � Why was it generated? � How was it generated? Systems and Internet Infrastructure Security Laboratory (SIIS) Page 2

  3. Why GENI provenance? • Error handling � Detection, isolation, and recovery • Source attribution � Forensics, consistency, believability • Experimental Reproducability � Extension, instrumentation • Data revision � Updates, correction, extension, refinement • Evidentiary � Evidence that data is legitimate/legal (certification, verification) • Experimental data can only be judged in light of how, when and where it comes from Systems and Internet Infrastructure Security Laboratory (SIIS) Page 3

  4. GENI System Provenance • Assessing system provenance is key to understanding achieving the goals of GENI � What software was a component (slice/aggregate) running? � What inputs and configuration were used? � What security policy was being enforced? • e.g., isolation, data protection, privacy • Stated as experimental criteria during the setup/acceptance � Think about sensitive experiments: NCR -esque, proprietary algoritms, opt-in with personal information � Determines apparatus acceptability of validation GENI adoption requires answers to these questions Systems and Internet Infrastructure Security Laboratory (SIIS) Page 4

  5. Integrity Justified Provenance • Integrity measurement techniques provide information about the instantaneous state of a system, but not its data, or over time, or for other computational elements (VMs) • What if you could build an aggregate of mutually attesting components that uses that apparatus to attest to the system state, protection state, data, and environment. � ... and tie a proof of that aggregate to experimental results. • Building on the shared reference monitor (Shamon) Physical Platform 1 Physical Platform 2 App VM App VM Client Other Application App Sys App Sys Application VM VM ... ... VM/OS VM/OS Untrusted Untrusted Trusted Services Trusted Services Services Services Shamon Core Shamon Core ... Shamon Connections Systems and Internet Infrastructure Security Laboratory (SIIS) Page 5

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend