toward a dynamic trust establishment approach for multi
play

Toward a Dynamic Trust Establishment Approach for Multi-provider - PowerPoint PPT Presentation

Toward a Dynamic Trust Establishment Approach for Multi-provider Intercloud Environment Canh Ngo , Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering Group University of Amsterdam Agenda Motivation Trust


  1. Toward a Dynamic Trust Establishment Approach for Multi-provider Intercloud Environment Canh Ngo , Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering Group University of Amsterdam

  2. Agenda • Motivation • Trust Management Challenges • Trust Model – Attribute-based Trust approach • Application – Dynamic Trust Establishment for Intercloud – Trust Evaluation Engine • Conclusion and Future work 2

  3. Motivation Intercloud use-cases • Enterprise IT infrastructure migration • Large project-oriented scientific infrastructures • IT infrastructure disaster recovery 3

  4. Motivation Intercloud Properties • Communication between Cloud providers/applications – Vertical integration: different service layers – Heterogeneous: cross-domains, composite services • Distributed, public data access environment • Data/resources are off-premise • RORA * : cloud resource ownerships – Physical ownership – Management/brokering ownership – Subscription/consumption ownership *RORA: Resource, Ownership, Role, Action (GEYSERS project) 4

  5. Challenges • Distributed multiple security domains – Authorizations based on identities are not applicable – Attributed-based access control (ABAC): different attributes profiles at domains • Clouds composed from multiple providers – Authorization for “unknown” entities (“know implicitly”)? – Relations between Cloud providers: dynamic, established on Cloud provisioning lifecycles • Approach: Trust Management for distributed, public environment – Attribute-based, attribute semantics can be transformed between domains – Multiple levels of delegations – Dynamic trust-chain establishment – Efficient attribute-based trust evaluation implementation 5

  6. Trust Model • Entities U1 – Cloud Providers U2 • Physical Cloud Providers: PIP VIO1 VIO2 • Intermediate Cloud Providers: VIP, Cloud Broker – Cloud Clients – End-users/applications VIP VIP2 • Trust “the belief of trustor in trustee to behave reliably, securely in a specific context” PIP1 PIP2 PIP3 PIP4 • Trust relationships – Properties : VR[1,1] • Asymmetric Virtual Resource of VI-1 (blue) • Contextual Virtual Resource of VI-2 (red) • Time-constraint – Types : • Direct trust relationships • Indirect trust relationships 6

  7. Trust Model Trust Mechanisms(1) • Trust decisions – Simple: binary (trust, distrust) – Complex: trust predicates • Attribute-based trust policies – Attributes to describe trust context – Policy actor, policy target, policy context – Formal logic formula: X= (x 1 ,x 2 ,…x n ); x i ∈ P i ���� � � � � � � � � � 7

  8. Trust Model Trust Mechanisms(2) • Direct trust relationships – Attributes: X= (x 1 ,x 2 ,…x n ); x i ∈ P i – Attribute-based trust policy: � ����� �������, �� → ���� Actor, target: entities • • X: attribute-based context • pred: predicates (e.g. trust, distrust, etc) 8

  9. Trust Model Trust Mechanisms(3): Delegation • Indirect trust relationship? • Delegation “Transferring part of the ownership (i.e., right to control as defined by the policy/administrative context) from the trustor to the trustee” • Trust credential issuer policy # � �������_� ��� ���_!, � → �" � tc: trust credential: {trustor, trustee, context} • Delegation policy $ � � → %������ & ������� X – trust context d – abbrev. for delegation targets – Id/trust_anchors of recommenders (e.g. B) 9

  10. Trust Model Trust Mechanisms(4): Delegation • Example: “B delegates A to access (r,w, etc) cloud resource X at C” • At A: access context description X # ' • At B: � � !, � → �" � • At C: – Delegation policy at C for context X $ � → ������ ≔ * � ( – Trust policy for unknown entities $ � - : * ∈ � � ( ? , � ≔ �. �" � → ��� �| pred ( 10

  11. Trust Model Trust Management: Challenges & Directions Trust policy evaluation : a ttribute-based policy evaluation • – XACML with extensions – Using Multi-data types Interval Decision Diagrams (MIDD): neutralized with policy languages. – Efficient in evaluation complexity. – Authentic of attributes, trust credentials: SAML assertion to carry trust credentials • Distributed policy evaluation : using Push model in AAA • Trust context description : – Attribute profiles: using resource description languages – Semantics inference between attribute namespace ontologies • Dynamic trust relationships – On-demand cloud resources – Provision trust policies 11

  12. Application Dynamic Trust Establishment for Intercloud • Use-case: – Consuming cloud resources from sub-contractor Cloud Service Providers Adopt cloud resources/services lifecycles • – Request – Reservation – Deployment – Operation - Decommissioning – Reservation & Deployment phases • Establish direct trust relations between entities and/by linking/chaining trust anchors • Generate trust policies & delegation policies for provisioned cloud resources • Local attribute name spaces resolution – Operation phase • Establish (indirectdynamic) trust relationships for instantly provisioned infrastructures using trust policies & delegation policies 12

  13. Dynamic Trust Establishment for Intercloud Indirect/Dynamic Trust Establishment Protocol Operation phase: Establish indirect trust relationships using trust policies & delegation policies E: End-user C: Cloud customer P: Cloud provider ( , ) → X f E X tc 1 1 C C X tc 1 C , X X tc 1 1 C ( ∈ ( )) ∧ C f D X 1 P ( X , ) valid tc X → trust 1 1 C 13

  14. Dynamic Trust Establishment for Intercloud Indirect Trust Establishment Protocol Flow Operation phase: Establish indirect trust relationships for delegation chain of K providers (trust-chain) Indirect Trust Establishment Protocol Flow with Push Model C: client P i : Cloud Providers i 14

  15. Dynamic Trust Establishment for Intercloud Implementation Trust evaluation engine : SNEXACML • Dynamic trust establishment • protocol : experiment in – XACML extensions: Geysers (https://geysers.eu) • Policy issuer • Issuing trust credential: obligations – SAML assertion extension U1 – Evaluation performance VIO1 • Using Multi-type Interval Decision Diagrams (MIDD) VIP P-code (IN DP ) [ 1080AB ] [1085BL] [1098XH] ( 1085BL,1095CJ ) [1095CJ] ( 1080AB,1085BL ) time time time time time (1095CJ,1098XH) time (NA) (NA) (NA) (NA) (NA) (NA) PIP1 PIP2 {(-inf,9am)U [6am,9am] [6am,9am] (9am, +inf)} [9am] [6am,9am) [12pm] [12pm, 5pm) {(-inf,12pm)U [12pm, 5pm) (12pm, +inf)} [9am] [5pm] [12pm, 5pm] Price [9am] Price Price Price (NA) (D, (O 2 )) (NA) (D, (O 2 )) [1,2] {(-inf,3)U {(-inf,1)U [1,2] [3,4] (4, +inf)} (2, +inf)} [3,4] VM/storage at PIP P, (O 1 ) D, (O 2 ) 15

  16. Trust evaluation engine: performance analysis Datasets Policy # Policy- #Policies #Rules Attr Operators level sets GEYSERS 3 6 7 33 3 = Continue-a 6 111 266 298 14 = Synthetic- =(80%), co- 4 31 72 360 10 360 mplex(20%) 100% 100000.0 80% 10000.0 52.3% 59.7% Microseconds 60% 82.4% 1000.0 2.5% 40% 1.6% 100.0 44.8% 20% 38.7% 3.4% 10.0 14.2% 0% 1.0 GEYSERS Continue-a Synthetic-360 GEYSERS Continue-a Synthetic-360 Request conversion time Response conversion time SNEXACML SunXACML MIDD evaluation time Average request evaluation time Micro-benchmark evaluation response times 16

  17. Conclusion • An attribute-based approach for dynamic trust establishments for multiple Cloud providers – Attribute trust policies: flexible, manageable – Open for attribute namespaces resolutions – Dynamic provisioning trust relationships – High performance evaluation 17

  18. Discussion and Future work • On-going work – Resolutions of attribute namespaces ontologies – Attribute validation – Apply dynamic trust establishment protocol to Intercloud – Trust Policy Engine • P2302 Group – Section 6.6-6.8, Intercloud Security • Trust Management Framework – Trust topology, protocols, evaluation mechanisms. – Auxiliary functions: collect and validate trust values, attributes, trust credentials 18

  19. Thank you! Contact Information Canh Ngo, Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering research group (SNE) University of Amsterdam 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend