Assured Cloud Computing and Information Sharing
Assured Cloud Computing and Information Sharing
Assured Cloud Computing and Information Sharing
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) April 2012
Team Members
Sponsor: Air Force Office of Scientific Research The University of Texas at Dallas Faculty: Dr. Murat Kantarcioglu; Dr. Latifur Khan; Dr. Kevin Hamlen; Dr. Zhiqiang Lin, Dr. Kamil Sarac Sub-contractors Prof. Elisa Bertino (Purdue) Ms. Anita Miller, Dr. Bob Johnson (North Texas Fusion Center) Collaborators Dr. Steve Barker, Kings College, U of London (EOARD) Dr. Barbara Carminati; Dr. Elena Ferrari, U of Insubria (EOARD) Prof. Peng Liu, Penn State Prof. Ting Yu, NC State
Outline
Objectives Layered Framework Data Security Issues for Clouds Our Research FY11
Cloud-based Assured Information Sharing Demonstration RDF-based Policy Engine on the Cloud Secure Query Processing in Hybrid Cloud CloudMask: Purdue University Stream-based Malware Detection on the Cloud Hypervisor (e.g., Xen) Integrity Issues and Forensics in the Cloud Preliminary Investigation of Identity Management Secure Querying and Storing Relational Data with HIVE Secure Querying and Storing RDF in Hadoop with SPARQL XACML Implementation for Hadoop Amazon.com Web Services and Security Accountability and Access Control (Joint with Purdue)
FY10
Objectives
Cloud computing is an example of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users need not have knowledge of, expertise in, or control over the technology infrastructure in the "cloud" that supports them. Our research on Cloud Computing is based on Hadoop, MapReduce, Xen Apache Hadoop is a Java software framework that supports data intensive distributed applications under a free license. It enables applications to work with thousands of nodes and petabytes of data. Hadoop was inspired by Google's MapReduce and Google File System (GFS) papers. XEN is a Virtual Machine Monitor developed at the University of Cambridge, England Our goal is to build a secure cloud infrastructure for assured information sharing applications
Publish Data/Policy
Conduct experiments as to how much information is lost as a result of enforcing security policies in the case of trustworthy partners Develop more sophisticated policies based on role-based and usage control based access control models Develop techniques based on game theoretical strategies to handle partners who are semi-trustworthy Develop data mining techniques to carry out defensive and offensive information operations
Scientific/Technical Approach
Accomplishments
Developed an experimental system for determining information loss due to security policy enforcement Developed a strategy for applying game theory for semitrustworthy partners; simulation results Developed data mining techniques for conducting defensive operations for untrustworthy partners
Challenges
Handling dynamically changing trust levels; Scalability
Technical Approach
Verify that the other participants do not lie about their data If the data is revealed as it is Trust but verify (Our initial results: DKE 08 paper) If the data is not revealed (e.g., SMC techniques are used) Non-cooperative computing Mechanism design SMC with rational adversaries
Layered Framework
Policies XACML User Interface QoS
Resource Allocation
HIVE/SPARQL/Query Hadoop/MapReduc/Storage
Cloud Monitors
10/31/2013
CollaborateCom 2010
Developed a query optimizer and query rewriting techniques for RDF Data with XACML policies and implemented on top of JENA
IEEE Transactions on Knowledge and Data Engineering, 2011
Agency n
User Interface Layer Relational Data Fine-grained Access Control with Hive RDF Data SPARQL Query Optimizer for Secure RDF Data Processing
Inference Engine/ Rules Processor e.g., Pellet Policies Ontologies Rules In RDF
JENA RDF Engine RDF Documents
Determine how access is granted to a resource as well as how a document is shared User specify policy: e.g., Access Control, Redaction, Released Policy Parse a high-level policy to a low-level representation Support Graph operations and visualization. Policy executed as graph operations Execute policies as SPARQL queries over large RDF graphs on Hadoop Support for policies over Traditional data and its provenance IFIP Data and Applications Security, 2010, ACM SACMAT 2011
High Level Specification Policy Parser Layer Access Control/ Redaction Policy (Traditional Mechanism) Policy / Graph Transformation Rules
Policy Translator
DB
RDF
A testbed for evaluating different policy sets over different data representation. Also supporting provenance as directed graph and viewing policy outcomes graphically
Agency n
Hadoop HDFS
Result
Research Results
Data Design: A user submits data, a query workload, monetary and confidentiality constraints
Linux
forensics
Solaris
XP
integrity
MacOS
OS Hypervisor
Unknown executable
Feature extraction
Classify
Malware Remove
Directions
Secure VMM (Virtual Machine Monitor) and VNM (Virtual Network Monitor) Exploring XEN VMM and examining security issues Developing automated techniques for VMM introspection Will examine VMM issues January 2012 Integrate Secure Storage Algorithms into Hadoop (FY 2012) Identity Management (FY 2012) Technology Transfer through Knowledge and Security Analytics, LLC