security policies as membranes in systems for global
play

Security Policies as Membranes in Systems for Global Computing - PowerPoint PPT Presentation

Why What How Conclusion Security Policies as Membranes in Systems for Global Computing Vladimiro Sassone University of Sussex, UK GC 2004: MyThS/MIKADO/DART Meeting Venice 15.06.04 with D. Gorla, M. Hennessy V. Sassone Security Polices


  1. Why What How Conclusion Security Policies as Membranes in Systems for Global Computing Vladimiro Sassone University of Sussex, UK GC 2004: MyThS/MIKADO/DART Meeting Venice 15.06.04 with D. Gorla, M. Hennessy V. Sassone Security Polices as Membranes

  2. Why What How Conclusion Why 1 What 2 How 3 Barring actions Counting actions Sequencing actions Controlling coalitions Conclusion 4 V. Sassone Security Polices as Membranes

  3. Why What How Conclusion Why Most calculi/languages for GC rely on code mobility to model interprocesses interactions; This leads to security concerns (malicious agents can compromise ‘good’ sites through viruses, spammings, denial-of-service attacks, ...); V. Sassone Security Polices as Membranes

  4. Why What How Conclusion Why Most calculi/languages for GC rely on code mobility to model interprocesses interactions; This leads to security concerns (malicious agents can compromise ‘good’ sites through viruses, spammings, denial-of-service attacks, ...); Thus, code mobility usually equipped with security checks : static checks: make the run-time as efficient as possible, but 1 it may be not adequate in practice; dynamic checks: make the runtime heavier, execution 2 slower, but are flexible. V. Sassone Security Polices as Membranes

  5. Why What How Conclusion Simple Systems are (plain) collections of sites; Sites are places for computations, divided in at least two layers: a computing body a membrane , to carry on security related issues membranes regulate the interactions between the computing body and the environment around the site differently from Boudol’s and Stefani’s: our membranes are not fully-fledged computing entities. They only implement higher-level (type related) verification on incoming agents. V. Sassone Security Polices as Membranes

  6. Why What How Conclusion The Objectives Run an initial investigation into what kind of security policies can be implemented through membranes, and how . This is related to, and aims at generalizing for the specific application the security types developed for D π and K LAIM ; the session types by Honda et al; the generic types by Igarashi, Kobayashi. V. Sassone Security Polices as Membranes

  7. Why What How Conclusion What a formal framework to formalize processes running in a GC 1 system, whose activities are local computations and migrations ; membranes to implement advanced checks on incoming 2 agents (including notions of trust and proof-carrying code ); tools to enforce different kind of policies. 3 V. Sassone Security Polices as Membranes

  8. Why What How Conclusion A Calculus for Migrations A minimal calculus (Turing not an issue here) BasicActions a , b , c , ... ∈ Act Localities l , h , k , ... ∈ Loc � a . P � go � P | Q � ! P � � � � Agents P , Q , R ::= nil T l . P � l [ � N 1 � N 2 � � Systems N ::= 0 [ M | � P ] ] where V. Sassone Security Polices as Membranes

  9. Why What How Conclusion A Calculus for Migrations A minimal calculus (Turing not an issue here) BasicActions a , b , c , ... ∈ Act Localities l , h , k , ... ∈ Loc � a . P � go � P | Q � ! P � � � � Agents P , Q , R ::= nil T l . P � l [ � N 1 � N 2 � � Systems N ::= 0 [ M | � P ] ] where l [ [ M | � P ] ] is a site with address l , membrane M and hosting process P ; go T l . P is an agent willing to migrate on l , whose body is P and exhibiting as PCC the policy T . V. Sassone Security Polices as Membranes

  10. Why What How Conclusion Dynamic Semantics – local Local behaviours: l [ [ M | � a . P | Q ] ] − → l [ [ M | � P | Q ] ] Remark: we are not really interested in the local computations. V. Sassone Security Polices as Membranes

  11. Why What How Conclusion Dynamic Semantics – migration Migration: [ M ′ | [ M ′ | k [ [ M | � go T l . P | Q ] ] � l [ � R ] ] − → k [ [ M | � Q ] ] � l [ � P | R ] ] This reduction may happen only if P complies with M ′ . V. Sassone Security Polices as Membranes

  12. Why What How Conclusion Dynamic Semantics – migration Migration: [ M ′ | [ M ′ | k [ [ M | � go T l . P | Q ] ] � l [ � R ] ] − → k [ [ M | � Q ] ] � l [ � P | R ] ] This reduction may happen only if P complies with M ′ . But checking whole processes at migration can be very expensive! Solution: PCCs. A source-generated and certified ‘process outline’ accepted as such at destination. V. Sassone Security Polices as Membranes

  13. Why What How Conclusion The matter with certification When can we consider PCCs? They are easy to verify (they are usually very small, if compared to the process they refer to), but they can be dangerous (if they don’t certify properly the process behaviour) V. Sassone Security Polices as Membranes

  14. Why What How Conclusion The matter with certification When can we consider PCCs? They are easy to verify (they are usually very small, if compared to the process they refer to), but they can be dangerous (if they don’t certify properly the process behaviour) A compromise: we can safely consider PCCs of agents coming from trusted sites, i.e. sites that calculate the PCC attached to a migrating agent “properly.” V. Sassone Security Polices as Membranes

  15. Why What How Conclusion Trust Each site store the trust it has on other sites, as part of its membrane . Thus, a membrane is a couple ( M t , M p ) , where M t : Loc → { good , bad , unknown } ; M p is an upper bound to the local actions of incoming agents. V. Sassone Security Polices as Membranes

  16. Why What How Conclusion The Migration Rule – revised [ M ′ | k [ [ M | � go T l . P | Q ] ] � l [ � R ] ] [ M ′ | if M ′ ⊢ k − → k [ [ M | � Q ] ] � l [ � P | R ] ] T P where M ′ ⊢ k T P is if M ′ t ( k ) = good then ( T enforces M ′ p ) else ⊢ P : M ′ p and predicate enforces is a partial order on policies; ⊢ is a compliance check of a process against a policy. V. Sassone Security Polices as Membranes

  17. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Policies as Constraints on Legal Actions a site only provides some methods (i.e. only some actions can be executed while running in it) a policy T is a subset of Act ∪ Loc where a process can only execute locally actions in T a process can only migrate on sites in T V. Sassone Security Polices as Membranes

  18. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Policies as Constraints on Legal Actions a site only provides some methods (i.e. only some actions can be executed while running in it) a policy T is a subset of Act ∪ Loc where a process can only execute locally actions in T a process can only migrate on sites in T T enforces T ′ is simply defined as T ⊆ T ′ ; V. Sassone Security Polices as Membranes

  19. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Policies as Constraints on Legal Actions a site only provides some methods (i.e. only some actions can be executed while running in it) a policy T is a subset of Act ∪ Loc where a process can only execute locally actions in T a process can only migrate on sites in T T enforces T ′ is simply defined as T ⊆ T ′ ; judgment ⊢ is simple. The key rules are ⊢ P : T ⊢ P : T ′ a ∈ T l ∈ T ⊢ a . P : T ⊢ go T ′ l . P : T V. Sassone Security Polices as Membranes

  20. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Policies as Constraints on Legal Actions (ctd) a system N is well-formed , written ⊢ N : ok , if “good” nodes only hosts “good” agents. Formally: ⊢ P : M p l good l not good ⊢ l [ [ M | � P ] ] : ok ⊢ l [ [ M | � P ] ] : ok V. Sassone Security Polices as Membranes

  21. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Policies as Constraints on Legal Actions (ctd) a system N is well-formed , written ⊢ N : ok , if “good” nodes only hosts “good” agents. Formally: ⊢ P : M p l good l not good ⊢ l [ [ M | � P ] ] : ok ⊢ l [ [ M | � P ] ] : ok → N ′ , then ⊢ N ′ : ok . Subject Reduction: If ⊢ N : ok and N − V. Sassone Security Polices as Membranes

  22. Why What How Conclusion Barring actions Counting actions Sequencing actions Controlling coalitions Counting Legal Actions sometimes, legal actions can be performed only a certain number of times. E.g.: a fair mail server allows its clients to send mails, but: it should block spamming activities of malicious clients; thus: it could allow sending at most K mails for each login of each client. V. Sassone Security Polices as Membranes

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend