toward a dynamic trust establishment approach for multi
play

Toward a Dynamic Trust Establishment Approach for Multi-provider - PowerPoint PPT Presentation

Toward a Dynamic Trust Establishment Approach for Multi-provider Intercloud Environment Canh Ngo , Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering Group University of Amsterdam Agenda Motivation Trust


  1. Toward a Dynamic Trust Establishment Approach for Multi-provider Intercloud Environment Canh Ngo , Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering Group University of Amsterdam

  2. Agenda • Motivation • Trust Management Challenges • Trust Model – Attribute-based Trust approach • Application – Dynamic Trust Establishment for Intercloud – Trust Evaluation Engine • Conclusion and Future work 2

  3. Motivation Intercloud use-cases • Enterprise IT infrastructure migration • Large project-oriented scientific infrastructures • IT infrastructure disaster recovery 3

  4. Motivation Intercloud Properties • Communication between Cloud providers/applications – Vertical integration: different service layers – Heterogeneous: cross-domains, composite services • Distributed, public data access environment • Data/resources are off-premise • RORA * : cloud resource ownerships – Physical ownership – Management/brokering ownership – Subscription/consumption ownership *RORA: Resource, Ownership, Role, Action (GEYSERS project) 4

  5. Challenges • Distributed multiple security domains – Authorizations based on identities are not applicable – Attributed-based access control (ABAC): different attributes profiles at domains • Clouds composed from multiple providers – Authorization for “unknown” entities (“know implicitly”)? – Relations between Cloud providers: dynamic, established on Cloud provisioning lifecycles • Approach: Trust Management for distributed, public environment – Attribute-based, attribute semantics can be transformed between domains – Multiple levels of delegations – Dynamic trust-chain establishment – Efficient attribute-based trust evaluation implementation 5

  6. Trust Model • Entities U1 – Cloud Providers U2 • Physical Cloud Providers: PIP VIO1 VIO2 • Intermediate Cloud Providers: VIP, Cloud Broker – Cloud Clients – End-users/applications VIP VIP2 • Trust “the belief of trustor in trustee to behave reliably, securely in a specific context” PIP1 PIP2 PIP3 PIP4 • Trust relationships – Properties : VR[1,1] • Asymmetric Virtual Resource of VI-1 (blue) • Contextual Virtual Resource of VI-2 (red) • Time-constraint – Types : • Direct trust relationships • Indirect trust relationships 6

  7. Trust Model Trust Mechanisms(1) • Trust decisions – Simple: binary (trust, distrust) – Complex: trust predicates • Attribute-based trust policies – Attributes to describe trust context – Policy actor, policy target, policy context – Formal logic formula: X= (x 1 ,x 2 ,…x n ); x i ∈ P i ���� � � � � � � � � � 7

  8. Trust Model Trust Mechanisms(2) • Direct trust relationships – Attributes: X= (x 1 ,x 2 ,…x n ); x i ∈ P i – Attribute-based trust policy: � ����� �������, �� → ���� Actor, target: entities • • X: attribute-based context • pred: predicates (e.g. trust, distrust, etc) 8

  9. Trust Model Trust Mechanisms(3): Delegation • Indirect trust relationship? • Delegation “Transferring part of the ownership (i.e., right to control as defined by the policy/administrative context) from the trustor to the trustee” • Trust credential issuer policy # � �������_� ��� ���_!, � → �" � tc: trust credential: {trustor, trustee, context} • Delegation policy $ � � → %������ & ������� X – trust context d – abbrev. for delegation targets – Id/trust_anchors of recommenders (e.g. B) 9

  10. Trust Model Trust Mechanisms(4): Delegation • Example: “B delegates A to access (r,w, etc) cloud resource X at C” • At A: access context description X # ' • At B: � � !, � → �" � • At C: – Delegation policy at C for context X $ � → ������ ≔ * � ( – Trust policy for unknown entities $ � - : * ∈ � � ( ? , � ≔ �. �" � → ��� �| pred ( 10

  11. Trust Model Trust Management: Challenges & Directions Trust policy evaluation : a ttribute-based policy evaluation • – XACML with extensions – Using Multi-data types Interval Decision Diagrams (MIDD): neutralized with policy languages. – Efficient in evaluation complexity. – Authentic of attributes, trust credentials: SAML assertion to carry trust credentials • Distributed policy evaluation : using Push model in AAA • Trust context description : – Attribute profiles: using resource description languages – Semantics inference between attribute namespace ontologies • Dynamic trust relationships – On-demand cloud resources – Provision trust policies 11

  12. Application Dynamic Trust Establishment for Intercloud • Use-case: – Consuming cloud resources from sub-contractor Cloud Service Providers Adopt cloud resources/services lifecycles • – Request – Reservation – Deployment – Operation - Decommissioning – Reservation & Deployment phases • Establish direct trust relations between entities and/by linking/chaining trust anchors • Generate trust policies & delegation policies for provisioned cloud resources • Local attribute name spaces resolution – Operation phase • Establish (indirectdynamic) trust relationships for instantly provisioned infrastructures using trust policies & delegation policies 12

  13. Dynamic Trust Establishment for Intercloud Indirect/Dynamic Trust Establishment Protocol Operation phase: Establish indirect trust relationships using trust policies & delegation policies E: End-user C: Cloud customer P: Cloud provider ( , ) → X f E X tc 1 1 C C X tc 1 C , X X tc 1 1 C ( ∈ ( )) ∧ C f D X 1 P ( X , ) valid tc X → trust 1 1 C 13

  14. Dynamic Trust Establishment for Intercloud Indirect Trust Establishment Protocol Flow Operation phase: Establish indirect trust relationships for delegation chain of K providers (trust-chain) Indirect Trust Establishment Protocol Flow with Push Model C: client P i : Cloud Providers i 14

  15. Dynamic Trust Establishment for Intercloud Implementation Trust evaluation engine : SNEXACML • Dynamic trust establishment • protocol : experiment in – XACML extensions: Geysers (https://geysers.eu) • Policy issuer • Issuing trust credential: obligations – SAML assertion extension U1 – Evaluation performance VIO1 • Using Multi-type Interval Decision Diagrams (MIDD) VIP P-code (IN DP ) [ 1080AB ] [1085BL] [1098XH] ( 1085BL,1095CJ ) [1095CJ] ( 1080AB,1085BL ) time time time time time (1095CJ,1098XH) time (NA) (NA) (NA) (NA) (NA) (NA) PIP1 PIP2 {(-inf,9am)U [6am,9am] [6am,9am] (9am, +inf)} [9am] [6am,9am) [12pm] [12pm, 5pm) {(-inf,12pm)U [12pm, 5pm) (12pm, +inf)} [9am] [5pm] [12pm, 5pm] Price [9am] Price Price Price (NA) (D, (O 2 )) (NA) (D, (O 2 )) [1,2] {(-inf,3)U {(-inf,1)U [1,2] [3,4] (4, +inf)} (2, +inf)} [3,4] VM/storage at PIP P, (O 1 ) D, (O 2 ) 15

  16. Trust evaluation engine: performance analysis Datasets Policy # Policy- #Policies #Rules Attr Operators level sets GEYSERS 3 6 7 33 3 = Continue-a 6 111 266 298 14 = Synthetic- =(80%), co- 4 31 72 360 10 360 mplex(20%) 100% 100000.0 80% 10000.0 52.3% 59.7% Microseconds 60% 82.4% 1000.0 2.5% 40% 1.6% 100.0 44.8% 20% 38.7% 3.4% 10.0 14.2% 0% 1.0 GEYSERS Continue-a Synthetic-360 GEYSERS Continue-a Synthetic-360 Request conversion time Response conversion time SNEXACML SunXACML MIDD evaluation time Average request evaluation time Micro-benchmark evaluation response times 16

  17. Conclusion • An attribute-based approach for dynamic trust establishments for multiple Cloud providers – Attribute trust policies: flexible, manageable – Open for attribute namespaces resolutions – Dynamic provisioning trust relationships – High performance evaluation 17

  18. Discussion and Future work • On-going work – Resolutions of attribute namespaces ontologies – Attribute validation – Apply dynamic trust establishment protocol to Intercloud – Trust Policy Engine • P2302 Group – Section 6.6-6.8, Intercloud Security • Trust Management Framework – Trust topology, protocols, evaluation mechanisms. – Auxiliary functions: collect and validate trust values, attributes, trust credentials 18

  19. Thank you! Contact Information Canh Ngo, Yuri Demchenko {t.c.ngo, y.demchenko}@uva.nl System and Network Engineering research group (SNE) University of Amsterdam 19

Recommend


More recommend