1 / 30

Distributed Trust Management

Organization. A Local Research Focus. Different speakers will treat different aspectsFirst lecture: IntroductionSafety problemRemaining classes: treat a DTM topic based on research papers, Next weeks topic Role based Access Control. (Please check website for papers to read.). What is TM for ?.

shanon
Download Presentation

Distributed Trust Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Distributed Trust Management Sandro Etalle Jerry den Hartog Marnix Dekker Jeroen Doumen (webpage at www.cs.utwente/~etalle/dtm)

    2. Organization A Local Research Focus. Different speakers will treat different aspects First lecture: Introduction Safety problem Remaining classes: treat a DTM topic based on research papers, Next weeks topic Role based Access Control. (Please check website for papers to read.)

    3. What is TM for ? Trust is needed to make decision on interaction with other entity How much value to put in the information you get in this class. Give access to a resource Decision has to be made with incomplete information Do not know if all the information you get is actually correct and state-of-the-art. Do not know how the resource will be used.

    4. What is TM; how does it help you in your decision Two classes of TM systems. Rule based systems: Trust in the role the entity plays You trust the information given in this class because it is given by a teacher who has been assigned by the university and you trust that the university selects suitable teachers You trust the university because it is a certified institution of higher learning. You trust the certification body because it is appointed by the government … Reputation Systems: You trust in the information because you have had earlier classes from the teacher that were good and/or your friends tell you they had good classes from the teacher, or that their friends tell them they had good classes, etc. More on this later first some basics: Access Control.

    5. Overview Access Control Basics Delegation & Certificates in Access Control Public key crypto, X.509 & PGP Logic in Access Control Trust and Trust Management Role base TM Take-Grant models Difficult problems in AC & TM Chain discovery Safety (Decidability) over/under estimation negative information. over/under estimation negative information.

    6. Access Control Security policies describe allowed access. Access Control enforces these policies OS AC: Access control matrix, Access control lists Maintenance, Consistency

    7. Role base access control(1) Role (Similar to `group’) Teacher Student Assign access rights to Roles and Roles to users The added Indirection makes for easier maintenance A role describes some function relevant to the security policy. The added Indirection makes for easier maintenance: E.g. next season only need to change the role assignement, not the access to each and every file. A role describes some function relevant to the security policy. The added Indirection makes for easier maintenance: E.g. next season only need to change the role assignement, not the access to each and every file.

    8. Role dependency (Role Hierarchies) Roles are not all independent: University Employee University Teacher Role Hierarchies Define roles in terms of other roles: Employee = Professor + Teacher + Administrative Staff + Support Staff Employee rights also granted to Professors. Employee = … (Expressable in SDSI/SPKI)Employee = … (Expressable in SDSI/SPKI)

    9. Distributed AC Different authorities at different locations UT administrator does not control access to TU/e resources Different Hierarchies for different locations In NL PhD student is subrole of Employee in US PhD student is subrole of Student How to achieve access to distributed resources? TU/e student list, US student discount.

    10. Delegation Define your roles based on roles of other users: Jerry.StudentsInMyClass = EducationOffice.RegisteredStudents215020 Trust Management Issue: I trust the education office to define the registered student role. Education office may trust registration office to define the student role EducationOffice.RegisteredStudents215020 = RegistrationOffice.Student and WebServer.subscribed215020 The education office may have a registration policy in which students have to subscribe to classes by adding their name to a list and showing their student card (issued by the registration office)/entering their student number on the website. (Note: the student card/nr is an example of an `certificate’.)The education office may have a registration policy in which students have to subscribe to classes by adding their name to a list and showing their student card (issued by the registration office)/entering their student number on the website. (Note: the student card/nr is an example of an `certificate’.)

    11. Toward DTM Can specify `trust rules’ Link roles in different Hierarchies Difficulty: Naming Conventions ( AIO – PhD student ). More fine grained control Different Roles for different users/locations Jerry.StudentsInMyClass Sandro.StudentsInMyClass EducationOffice.RegisteredStudents215020

    12. Logic in Access Control Express Access control rules using logical predicates: Classical Access control matrix can be translated predicates: may-access(p,o,r): principle p has access right r to object o. Basic rules can also be expressed: may-access(p,o,Wr) => may-access(p,o,Rd) States Wr (write access) is stronger than Rd (read access) Different ways to generalize this principle

    13. Logic in Access Control (2) Complications of distributed systems Often used construct SAYS for stating requests for delegation, e.g. p says may-access(q,o,r)

    14. Trust vs. Trust Notions of trust: To get people to use a smartcard for storing cash (UT student card) they have to trust the card and the system. Psychological concept To raise the balance on the card the card has to trust the terminal requesting this. Technical, Computer Science notion

    15. Why trust? Trust needed for cooperation Cannot control behaviour of other people/systems Base of trust Own experience and experience of others (reputation based TM) Regulations Technical measures (more on this below) Taking a risk (risk vs benefit analysis when possible). `Good’ behaviour slowly enforces/builds trust `Bad’ behaviour quickly lowers trust Reputation: E.g. ordering from a webshop: own experience with this shop and in general; the less earlier problems with webshops…the more likely to trust. If others say a webshop is good…more likely to trust (especially if you trust the recommender; a knowledgeable friend telling you about a great webshop is more likely to enspire trust than an anonymous review on a reviewing site (e.g. tweakers.net). Regulations: Laws that protect the online shopper (e.g. can get money back if you change your mind within a week). Risk; getting cheated weighed against benefit; e.g. much cheaper than shop next door, cannot get the object else where, small amount involved and if shows trustworthy could be a good place to order in the future. (Amount of risk taking varies between people.)Reputation: E.g. ordering from a webshop: own experience with this shop and in general; the less earlier problems with webshops…the more likely to trust. If others say a webshop is good…more likely to trust (especially if you trust the recommender; a knowledgeable friend telling you about a great webshop is more likely to enspire trust than an anonymous review on a reviewing site (e.g. tweakers.net). Regulations: Laws that protect the online shopper (e.g. can get money back if you change your mind within a week). Risk; getting cheated weighed against benefit; e.g. much cheaper than shop next door, cannot get the object else where, small amount involved and if shows trustworthy could be a good place to order in the future. (Amount of risk taking varies between people.)

    16. Why Trust (Cont.) ? Technical measures: Create trust in the computation taking place elsewhere, e.g. on someone else’s PC, a piece of hardware in hands of another person. Trusted computing platform: Hardware chip base chain of trust – chip checks signatures of programs to ensure they are not altered, can do essential computation steps. Smartcards allow protecting information and applications from the holder of the device (such as Twente student card mentioned above).

    17. Distributed Trust Management DTM deals mainly with the technical notion of trust Formal rules describe `trust’, e.g. I trust RegistrationOffice to define the role Student (but not the role `Friend’). Grant rights of a user (other system) on the system by Establishing trust in user/requesting system; Create a `chain of trust’ from system to user. Specification: Policies, delegation, naming, … Implementation: Certificates, Chain discovery, Logic, … Applications: AC, PGP-PKI, Tribler, … Distributed Trust Management: AC -Distributed Delegation and Access control, PGP-PKI the public key distribution is a form of network of `trust’; correctness of keys is attested by other users in the system. Tribler(SP?) – `trusted’ P2P network; better sharing of resources, quality of service. AC -Distributed Delegation and Access control, PGP-PKI the public key distribution is a form of network of `trust’; correctness of keys is attested by other users in the system. Tribler(SP?) – `trusted’ P2P network; better sharing of resources, quality of service.

    18. Reputation Systems Reputation systems try to capture the `psychological’ notion of trust. Experience in past interactions will play big role in trust decision. But what if no or little interaction yet? Reputation systems (e.g. Ebay and similar): Participants evaluate an interaction and provide feedback. Positive feedback increases reputation, negative feedback reduces reputation. Reputation expresses collective experience of all participants. Personalizing trust through recommendations: Use recommendations only of parties you trust; e.g. you trust your friends so you somewhat trust the friends of your friends etc. The more you trust someone the more weight their recommendations will carry.

    19. Common features Rule based TM – Reputation Systems Combine information from different sources; trust sources providing information Openness; anyone can join or leave the system and issue credentials/recommendations. Up to the other participants to decide trust worthiness of such credentials.

    20. Differences Rule based TM – Reputation Systems Role of risk: In rule based systems certificates state facts. Reputation systems include intrinsic risk; reputation does not give any guarantees. (“In het verleden behaalde resultaten geven geen garantie voor de toekomst”). Yes/No verses numerical. Reputation changes with actions; trust value is dynamic.

    21. Implementation: Certificates Proof that you are a member of a role Student card issued by registration office More generally: Binding of properties to an identity (public key) signed by the cerfitication authority (i.e. issuer of the role student). Proof that a role is defined in a given way Education office can issue a single certificate stating EducationOffice.RegisteredStudents215020 = RegistrationOffice.Student and WebServer.subscribed215020 rather than given a different certificate to each student of course we also need proof that the student has subscribed on the website.of course we also need proof that the student has subscribed on the website.

    22. Using Certificates Use a chain of certificates to proof role membership Student card to proof student, confirmation from webserver to show registered, certificate of education office to show registration policy. (Automatic) Chain discovery can be difficult who stores certificates where to look for certificates Example A.r <- B.r B.r <- C.r C.r <- D D want to proof membership to A.r, however, how does he know (s)he needs the middle credential and how is it found (efficiency, backward search, forward search. With more advanced rules neither may be effective.) Example A.r <- B.r B.r <- C.r C.r <- D D want to proof membership to A.r, however, how does he know (s)he needs the middle credential and how is it found (efficiency, backward search, forward search. With more advanced rules neither may be effective.)

    23. Examples of PKI & certificate systems Public key crypto Certificate links public key to identity. May be signed by certificate authority; trust based on trust in CA (Webbrouwers) or by other users; trust by numbers (PGP). (PKI->C.),examples of PKI/certificate based systems: X.509 – Certificates bind a public key to a name(string) SPKI: PKI with focus on authorization (rather than authentication), binding properties directly to public keys. Kerberos: Single sign on system; the user gets a `ticket’ for use of a service. Ticket is a form of certificate. PGP: Often used for encryption and signing of email. No central CAs for distribution of public keys. PGP: Can use the TM system described above. More often however, simply put public key in signature, on webpage, etc. PGP: Can use the TM system described above. More often however, simply put public key in signature, on webpage, etc.

    24. Take-Grant model Use a directed graph to represent the Access control matrix. Edge between Role and Object labeled with right (e.g. read/write) Edge between Roles: relationship between roles; can takes rights of /may grants rights to. Rules for adding and edges and nodes to the graph.

    25. Take-Grant Model example

    26. Safety problem Can subject obtain a right? Given a set of delegation rules and a set of initial permissions, decide whether a given permission can be granted. Decidable in linear time if set of delegation rules fixed to Take-grant model [Jone76]. Not decidable in general Not possible to create algorithm that, given a set of rules and starting configuration decides this. (Equivalent to the Turing halting problem.) Variations…

    27. Side step: Turing halting problem Assume we have program H(p,i) that outputs Y if p(i) halts and N if p(i) does not halt. Define prog T(i): If H(i, i) = Y then loop else return false; What does H(T,T) return? if Y then T(T) will loop so H(T,T) should give N if N then T(T) will stop so H(T,T) should give Y Contradiction H(p,i) cannot exist.

    28. Undecidability of Safety problem Assume decidable, then there is some algorithm that makes this decision. Encode halting problem in Safety problem; For a given TM machine construct a graph with a permission which is granted exactly when the TM halts (enters the halting state). Give this graph to our decision algorithm…the answer also gives whether the TM halts, thus we have solved the halting problem. CONTRADITIUON.

    29. Conclusions Basics of distributed trust management Distributed access control Delegation control Next week; more detailed discussion of Role based access control Please read the papers:

    30. Recommended Reading Decentralized Trust Management, M. Blaze et al. the PolicyMaker trust management system. comparison with X.509 and PGP. Formal Models for Computer Security, C. Landwehr Overview of classical data security notions and systems

More Related