SlideShare une entreprise Scribd logo
1  sur  33
JMHM Jayamaha
SEU/IS/10/PS/104
PS0372
 Security Threats
 Security Policy
 Security Mechanisms
 Globus Security Architecture
 way of looking at security in computer
systems is that we attempt to protect the
services and data it offers against security
threats
 There are four types of security threats
1. Interception
2. Interruption
3. Modification
4. Fabrication
 The concept of interception refers to the
situation that an unauthorized party has
gained access to a service or data
◦ Example
 Where communication between two parties has been
overheard by someone else
 Interception also happens when data are
illegally copied
◦ Example
 after breaking into a person's private directory in a
file system.
 An example of interruption is when a file is
corrupted or lost.
 More generally interruption refers to the
situation in which services or data become
unavailable, unusable, destroyed, and so on.
◦ Example
 denial of service attacks by which someone
maliciously attempts to make a service inaccessible
to other parties is a security threat that classifies as
interruption
 involve unauthorized changing of data or
tampering with a service so that it no longer
adheres to its original specifications
 Example
◦ Modifications include intercepting and subsequently
changing transmitted data, tampering with database
entries, and changing a program so that it secretly logs the
activities of its user.
 Refers to the situation in which additional
data or activity are generated that would
normally not exist.
 Example
◦ an intruder may attempt to add an entry into a
password file or database. Likewise, it is
sometimes possible to break into a system by
replaying previously sent messages
 Note that interruption, modification, and
fabrication can each be seen as a form of data
falsification
 Simply stating that a system should be able
to protect itself against all possible security
threats is not the way to actually build a
secure system.
 What is first needed is a description of
security requirements, that is, a security
policy.
 A security policy describes precisely which
actions the entities in a system are allowed to
take and which ones are prohibited. Entities
include users, services, data, machines, and
so on.
 Once a security policy has been laid down, it
becomes possible to concentrate on the
security mechanisms by which a policy can
be enforced.
 Important security mechanisms are :
1. Encryption
2. Authentication
3. Authorization
4. Auditing
 Encryption is fundamental to computer
security
 Encryption transforms data into something an
attacker cannot understand.
 In other words
◦ encryption provides a means to implement data
confidentiality.
 In addition, encryption allows us to check
whether data have been modified.
 It thus also provides support for integrity
checks.
 is used to verify the claimed identity of a
user, client, server, host, or other entity.
 In the case of clients, the basic premise is
that before a service starts to perform any
work on behalf of a client, the service must
learn the client's identity (unless the service is
available to all).
 Typically, users are authenticated by means
of passwords, but there are many other ways
to authenticate clients.
 After a client has been authenticated, it is
necessary to check whether that client is
authorized to perform the action requested
 Example
◦ Access to records in a medical database
 Depending on who accesses the database.
Permission may be granted to read records, to
modify certain fields in a record, or to add or
remove a record
 Auditing tools are used to trace which clients
accessed what, and which way.
 Although auditing does not really provide any
protection against security threats.
 Audit logs can be extremely useful for the
analysis of a security breach, and
subsequently taking measures against
intruders.
 For this reason, attackers are generally keen
not to leave any traces that could eventually
lead to exposing their identity.
 In this sense, logging accesses makes
attacking sometimes a riskier business.
 To devise and properly use security
mechanisms, it is necessary to understand
what exactly needs to be protected, and what
the assumptions are with respect to security.
 security policy for Globus entails eight
statements
 Globus assumes that the environment
consists of multiple administrative domains,
where each domain has its own local security
policy.
 It is assumed that local policies cannot be
changed just because the domain participates
in Globus, nor can the overall policy of
Globus override local security decisions.
 Consequently, security in Globus will restrict
itself to operations that affect multiple
domains
 operations that are initiated and carried out
only within a single domain
 all security issues will be carried out using
local security measures only.
 Globus will not impose additional measures
 The Globus security policy states that
requests for operations can be initiated either
globally or locally.
 The initiator, be it a user or process acting on
behalf of a user, must be locally known within
each domain where that operation is carried
out.
 An important policy statement is that
operations between entities in different
domains require mutual authentication.
 for example,
◦ that if a user in one domain makes use of a service
from another domain, then the identity of the user
will have to be verified.
 If the identity of a user has been verified, and
that user is also known locally in a domain,
then he can act as being authenticated for
that local domain.
 This means that Globus requires that its
system wide authentication measures are
sufficient to consider that a user has already
been authenticated for a remote domain
when accessing resources in that domain.
 Additional authentication by that domain
should not be necessary
 Once a user has been authenticated, it is still
necessary to verify the exact access rights
with respect to resources.
 For example,
◦ a user wanting to modify a file will first have to be
authenticated, after which it can be checked
whether or not that user is actually permitted to
modify the file.
 consider a mobile agent in Globus that carries
out a task by initiating several operations in
different domains, one after another. Such an
agent may take a long time to complete its
task.
 To avoid having to communicate with the
user on whose behalf the agent is acting,
Globus requires that processes can be
delegated a subset of the user's rights.
 Globus requires that groups of processes
running with a single domain and acting on
behalf of the same user may share a single
set of credentials.
 credentials are needed for authentication.
 This statement essentially opens the road to
scalable solutions for authentication by not
demanding that each process carries its own
unique set of credentials.
 Globus architecture is described using entities:
◦ Users
◦ User proxies: processes that are given permission to
act on behalf of a user temporarily.
◦ Resource proxies: processes used to translate a
remote user’s requests into operations that do not
violate a resource’s local security policy.
◦ General processes
 The globus security architecture defines four
different protocols,
 in order to let the user proxy act on behalf of
its user, the user gives the proxy an
appropriate set of credentials
 the protocol tells a resource proxy to create a
process in the remote domain after mutual
authentication has taken place.
 That process represents the user, but
operates in the same domain as the
requested resource.
 The process is given access to the resource
subject to the access control decisions local
to that domain.
 In the Globus system, this type of allocation
is done via the user proxy, by letting a
process have its associated user proxy
request the allocation of resources,
essentially following the second protocol.
 Assuming that a user has an account in a
domain, what needs to be established is that
the system wide credentials as held by a user
proxy are automatically converted to
credentials that are recognized by the specific
domain.
 The protocol prescribes how the mapping
between the global credentials and the local
ones can be registered by the user in a
mapping table local to that domain.
 Andrew S.Tanenbaum & Maarten Van Steen.
Distributed Systems – Principles and
Paradigms. 2nd ed. 2007.
Distributed System - Security
Distributed System - Security

Contenu connexe

Tendances

Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacyPawan Arya
 
Security models
Security models Security models
Security models LJ PROJECTS
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating SystemsDr Sandeep Kumar Poonia
 
Distributed file system
Distributed file systemDistributed file system
Distributed file systemAnamika Singh
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and DistributionSyed Bahadur Shah
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing modelsishmecse13
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniquesvinitha96
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada umardanjumamaiwada
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key CryptosystemDevakumar Kp
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Dr. Kapil Gupta
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.pptZaheer720515
 

Tendances (20)

Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 
Replication in Distributed Systems
Replication in Distributed SystemsReplication in Distributed Systems
Replication in Distributed Systems
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 
Security models
Security models Security models
Security models
 
8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems8. mutual exclusion in Distributed Operating Systems
8. mutual exclusion in Distributed Operating Systems
 
Distributed file system
Distributed file systemDistributed file system
Distributed file system
 
Intruders
IntrudersIntruders
Intruders
 
Key Management and Distribution
Key Management and DistributionKey Management and Distribution
Key Management and Distribution
 
Email security
Email securityEmail security
Email security
 
IP Security
IP SecurityIP Security
IP Security
 
File models and file accessing models
File models and file accessing modelsFile models and file accessing models
File models and file accessing models
 
Substitution techniques
Substitution techniquesSubstitution techniques
Substitution techniques
 
Key management
Key managementKey management
Key management
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada file sharing semantics by Umar Danjuma Maiwada
file sharing semantics by Umar Danjuma Maiwada
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security Chapter 1 Introduction of Cryptography and Network security
Chapter 1 Introduction of Cryptography and Network security
 
Kerberos
KerberosKerberos
Kerberos
 
Security Attacks.ppt
Security Attacks.pptSecurity Attacks.ppt
Security Attacks.ppt
 
11. dfs
11. dfs11. dfs
11. dfs
 

Similaire à Distributed System - Security

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...ASAITHAMBIRAJAA
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...ASAITHAMBIRAJAA
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloudNag Nani
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willJinElias52
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesSahithi Naraparaju
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfDigital Auxilio Technologies
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportKiran Girase
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Editor IJARCET
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudEditor IJCATR
 

Similaire à Distributed System - Security (20)

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Unit 1
Unit 1Unit 1
Unit 1
 
IT.pptx
IT.pptxIT.pptx
IT.pptx
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
 
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
Ieeepro techno solutions   2014 ieee java project - decentralized access cont...Ieeepro techno solutions   2014 ieee java project - decentralized access cont...
Ieeepro techno solutions 2014 ieee java project - decentralized access cont...
 
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...Ieeepro techno solutions   2014 ieee dotnet project - decentralized access co...
Ieeepro techno solutions 2014 ieee dotnet project - decentralized access co...
 
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
111906665 ensuring-distributed-accountability-for-data-sharing-in-the-cloud
 
Unit 1
Unit 1Unit 1
Unit 1
 
Goals of security
Goals of securityGoals of security
Goals of security
 
Dit yvol5iss38
Dit yvol5iss38Dit yvol5iss38
Dit yvol5iss38
 
CHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you willCHAPTER 9 Design Considerations In this chapter you will
CHAPTER 9 Design Considerations In this chapter you will
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
documentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemesdocumentation for identity based secure distrbuted data storage schemes
documentation for identity based secure distrbuted data storage schemes
 
Best Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdfBest Security Practices for Web Application Development.pdf
Best Security Practices for Web Application Development.pdf
 
Achieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing reportAchieving Secure, sclable and finegrained Cloud computing report
Achieving Secure, sclable and finegrained Cloud computing report
 
Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946Ijarcet vol-2-issue-3-942-946
Ijarcet vol-2-issue-3-942-946
 
Accountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the CloudAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud
 

Plus de Harshana Madusanka Jayamaha

Plus de Harshana Madusanka Jayamaha (8)

Handwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural networkHandwritten character recognition using artificial neural network
Handwritten character recognition using artificial neural network
 
Linear and non linear equation
Linear and non linear equationLinear and non linear equation
Linear and non linear equation
 
Clipping ( Cohen-Sutherland Algorithm )
Clipping ( Cohen-Sutherland Algorithm )Clipping ( Cohen-Sutherland Algorithm )
Clipping ( Cohen-Sutherland Algorithm )
 
Advance operator and technique in genetic algorithm
Advance operator and technique in genetic algorithmAdvance operator and technique in genetic algorithm
Advance operator and technique in genetic algorithm
 
Artificial Neural Network Topology
Artificial Neural Network TopologyArtificial Neural Network Topology
Artificial Neural Network Topology
 
Parallel algorithm in linear algebra
Parallel algorithm in linear algebraParallel algorithm in linear algebra
Parallel algorithm in linear algebra
 
Organizational structure
Organizational structureOrganizational structure
Organizational structure
 
Operating system critical section
Operating system   critical sectionOperating system   critical section
Operating system critical section
 

Dernier

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Dernier (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Distributed System - Security

  • 2.  Security Threats  Security Policy  Security Mechanisms  Globus Security Architecture
  • 3.  way of looking at security in computer systems is that we attempt to protect the services and data it offers against security threats  There are four types of security threats 1. Interception 2. Interruption 3. Modification 4. Fabrication
  • 4.  The concept of interception refers to the situation that an unauthorized party has gained access to a service or data ◦ Example  Where communication between two parties has been overheard by someone else  Interception also happens when data are illegally copied ◦ Example  after breaking into a person's private directory in a file system.
  • 5.  An example of interruption is when a file is corrupted or lost.  More generally interruption refers to the situation in which services or data become unavailable, unusable, destroyed, and so on. ◦ Example  denial of service attacks by which someone maliciously attempts to make a service inaccessible to other parties is a security threat that classifies as interruption
  • 6.  involve unauthorized changing of data or tampering with a service so that it no longer adheres to its original specifications  Example ◦ Modifications include intercepting and subsequently changing transmitted data, tampering with database entries, and changing a program so that it secretly logs the activities of its user.
  • 7.  Refers to the situation in which additional data or activity are generated that would normally not exist.  Example ◦ an intruder may attempt to add an entry into a password file or database. Likewise, it is sometimes possible to break into a system by replaying previously sent messages  Note that interruption, modification, and fabrication can each be seen as a form of data falsification
  • 8.  Simply stating that a system should be able to protect itself against all possible security threats is not the way to actually build a secure system.  What is first needed is a description of security requirements, that is, a security policy.
  • 9.  A security policy describes precisely which actions the entities in a system are allowed to take and which ones are prohibited. Entities include users, services, data, machines, and so on.  Once a security policy has been laid down, it becomes possible to concentrate on the security mechanisms by which a policy can be enforced.
  • 10.  Important security mechanisms are : 1. Encryption 2. Authentication 3. Authorization 4. Auditing
  • 11.  Encryption is fundamental to computer security  Encryption transforms data into something an attacker cannot understand.  In other words ◦ encryption provides a means to implement data confidentiality.  In addition, encryption allows us to check whether data have been modified.  It thus also provides support for integrity checks.
  • 12.  is used to verify the claimed identity of a user, client, server, host, or other entity.  In the case of clients, the basic premise is that before a service starts to perform any work on behalf of a client, the service must learn the client's identity (unless the service is available to all).  Typically, users are authenticated by means of passwords, but there are many other ways to authenticate clients.
  • 13.  After a client has been authenticated, it is necessary to check whether that client is authorized to perform the action requested  Example ◦ Access to records in a medical database  Depending on who accesses the database. Permission may be granted to read records, to modify certain fields in a record, or to add or remove a record
  • 14.  Auditing tools are used to trace which clients accessed what, and which way.  Although auditing does not really provide any protection against security threats.  Audit logs can be extremely useful for the analysis of a security breach, and subsequently taking measures against intruders.
  • 15.  For this reason, attackers are generally keen not to leave any traces that could eventually lead to exposing their identity.  In this sense, logging accesses makes attacking sometimes a riskier business.
  • 16.  To devise and properly use security mechanisms, it is necessary to understand what exactly needs to be protected, and what the assumptions are with respect to security.  security policy for Globus entails eight statements
  • 17.  Globus assumes that the environment consists of multiple administrative domains, where each domain has its own local security policy.  It is assumed that local policies cannot be changed just because the domain participates in Globus, nor can the overall policy of Globus override local security decisions.  Consequently, security in Globus will restrict itself to operations that affect multiple domains
  • 18.  operations that are initiated and carried out only within a single domain  all security issues will be carried out using local security measures only.  Globus will not impose additional measures
  • 19.  The Globus security policy states that requests for operations can be initiated either globally or locally.  The initiator, be it a user or process acting on behalf of a user, must be locally known within each domain where that operation is carried out.
  • 20.  An important policy statement is that operations between entities in different domains require mutual authentication.  for example, ◦ that if a user in one domain makes use of a service from another domain, then the identity of the user will have to be verified.
  • 21.  If the identity of a user has been verified, and that user is also known locally in a domain, then he can act as being authenticated for that local domain.  This means that Globus requires that its system wide authentication measures are sufficient to consider that a user has already been authenticated for a remote domain when accessing resources in that domain.  Additional authentication by that domain should not be necessary
  • 22.  Once a user has been authenticated, it is still necessary to verify the exact access rights with respect to resources.  For example, ◦ a user wanting to modify a file will first have to be authenticated, after which it can be checked whether or not that user is actually permitted to modify the file.
  • 23.  consider a mobile agent in Globus that carries out a task by initiating several operations in different domains, one after another. Such an agent may take a long time to complete its task.  To avoid having to communicate with the user on whose behalf the agent is acting, Globus requires that processes can be delegated a subset of the user's rights.
  • 24.  Globus requires that groups of processes running with a single domain and acting on behalf of the same user may share a single set of credentials.  credentials are needed for authentication.  This statement essentially opens the road to scalable solutions for authentication by not demanding that each process carries its own unique set of credentials.
  • 25.  Globus architecture is described using entities: ◦ Users ◦ User proxies: processes that are given permission to act on behalf of a user temporarily. ◦ Resource proxies: processes used to translate a remote user’s requests into operations that do not violate a resource’s local security policy. ◦ General processes  The globus security architecture defines four different protocols,
  • 26.  in order to let the user proxy act on behalf of its user, the user gives the proxy an appropriate set of credentials
  • 27.  the protocol tells a resource proxy to create a process in the remote domain after mutual authentication has taken place.  That process represents the user, but operates in the same domain as the requested resource.  The process is given access to the resource subject to the access control decisions local to that domain.
  • 28.  In the Globus system, this type of allocation is done via the user proxy, by letting a process have its associated user proxy request the allocation of resources, essentially following the second protocol.
  • 29.  Assuming that a user has an account in a domain, what needs to be established is that the system wide credentials as held by a user proxy are automatically converted to credentials that are recognized by the specific domain.  The protocol prescribes how the mapping between the global credentials and the local ones can be registered by the user in a mapping table local to that domain.
  • 30.
  • 31.  Andrew S.Tanenbaum & Maarten Van Steen. Distributed Systems – Principles and Paradigms. 2nd ed. 2007.

Notes de l'éditeur

  1. Ex: Suppose that companies A, B, & C, offering the same service, have merged after independently operating for years. Now suppose that the 3 companies have merged and wish to integrate their websites. 3 subsystems that run independently of each other. The same 3 subsystems connected to a global authority (G) . The functionality of the 3 subsystems should change very little if at all even though they are now connected through the global authority
  2. Ex: Suppose that an entity in domain B wishes to utilize a file housed in domain B. Local operation. Just as if domain B was running independently of Globus and any other subsystems. Globus should recognize local operations and not impose further restrictions.
  3. Operations that affect more than 1 domain in the distributed system. Require the initiator to be known in each domain where the operation is executed. Ex: If you wishes to update a file located in domains A, B, and C, each domain must authenticate him before he can be allowed to perform the update
  4. Ex: Suppose you located in domain A wishes to use a mail server located in domain B. Not only must You be authenticated by domain B to use the mail server, but the mail server must also be authenticated by domain A. The latter condition ensures Adam that he is indeed using the mail server from domain B and not malicious software.
  5. Ex: Suppose you located in domain A wants to perform operations in domains B and C. You must be authenticated in domains B and C. Instead, allow Globus to globally authenticate you. You can now be considered authenticated in domains B and C if both domains recognize you. Recognition takes less processing time than authentication.
  6. Ex: Suppose you located in domain A wishes to modify a file located in domain B and has already been globally authenticated. Even though you has been authenticated, his access rights to the file still must be checked. Access rights are checked by the file’s local domain – in this case domain B.
  7. Ex: Suppose that Adam located in domain A has been globally authenticated. He wishes to deploy processes P1 and P2 to repeatedly poll files located in domains B and C respectively. Adam can pass his authentication certificate to processes P1 and P2. P1 receives access rights for the files needed in domain B and P2 receives access rights for the files needed in domain C.
  8. Multiple processes attributed to a single user located in a remote domain can share one set of authentication and access rights. Known as credentials. Ex: Suppose you located in domain A has multiple processes P1, P2, and P3 operating in domain B. The 3 processes share a set of credentials. Credentials are easily modified even if there are a large number of processes. Easily scalable – space is conserved since only one copy of the credentials need be present per domain
  9. First, a process is created by the user in his/her local subsystem. To act as the user, the process must be given an identifying key linked to the user. This key is a tuple comprised of the user’s id, name of the local host, authentication lifetime, etc. The user then digitally signs the tuple, indicating the validity of the proxy to remote domains. The proxy is then provided with the key and allowed to execute in a remote domain. It is the responsibility of the local security policy to protect this key.
  10. A user proxy (UP) locates the resource proxy (RP) for the resource it wishes to access. The UP and RP authenticate each other. The RP checks if the resource is available. If the request can be honored, the RP allocates the resource to the UP. Otherwise, the RP denies access and it is up to the UP to try again after some specified passage of time.
  11. Essentially follows the second protocol. Ex: A resource allocated to a UP may spawn process Pα that requires an additional resource R1. The request to R1’s RP must come from the UP, NOT Pα. Advantages: Simplicity and greater security. Allowing only UPs to initiate resource requests decreases the potential locations for security breaches. Disadvantage: scalability is limited due to a single point of requests (UP).
  12. First, the user authenticates globally with Globus. A subsystem-wide mapping of the global authentication to a local authentication is accessible by the RP. The exact implementation varies with each domain. Examples include trees and linked lists. The user is considered authenticated for domain X if the RP can find a mapping from the user’s global authentication to his/her local authentication for domain X. The remote domain thus recognizes the user.