1 / 26

Synergy: A Trust-aware, Policy-driven Information Dissemination Framework

Synergy: A Trust-aware, Policy-driven Information Dissemination Framework. Ragib Hasan and Marianne Winslett University of Illinois at Urbana-Champaign. Overview. Motivation Synergy framework Trust negotiation Components Protocol Case study VisiRescue Conclusion. Motivation.

moira
Download Presentation

Synergy: A Trust-aware, Policy-driven Information Dissemination Framework

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Synergy: A Trust-aware, Policy-driven Information Dissemination Framework Ragib Hasan and Marianne Winslett University of Illinois at Urbana-Champaign

  2. Overview • Motivation • Synergy framework • Trust negotiation • Components • Protocol • Case study • VisiRescue • Conclusion

  3. Motivation • Providing secure access to right information at the right time, to the right entities is important • Access control and authorization needs to be context-dependent, and scalable

  4. Motivation • Hypothetical scenario 1: • A Train derails inside the City of Champaign • First Responders meet at the Emergency Operations Center (EOC) • For swift decisions, information needed from various sources • Video cameras at nearby locations • Three gas sensors used by the Hazmat team • Windspeed, direction sensors • Waterflow sensors from USGS

  5. Motivation • Hypothetical scenario 1: • The info sources belong to different organizations • Security domains are different • Some resources will not be shared in normal situations • Cameras may not be shared, to protect privacy • Not feasible or manageable to create logins at every organization

  6. Motivation • Hypothetical scenario 2: • The information from all power stations in the mid west are collected by Midwest ISO. For market-related reasons, all the details are not normally shared with every client • Suppose, an overload trips a generator in Champaign, IL. This, and other info from MISO can be used by other power stations to balance their loads • Lack of information caused the 2003 powergrid failure • But the info is also sensitive, so should only be shared during emergencies

  7. Motivation • Hypothetical scenario 2: • Here the information source is single, but there are multiple clients • Not all information are shared with every client • Not all clients get the same view • Access to information is situation/context dependent • It is not feasible to create logins for every plant operator

  8. Solution? • To utilize Trust Negotiation in creating a flexible information sharing framework • Use access control policies, to determine level of access to information • Use a modular architecture for separating the applications from the underlying security infrastructure

  9. Contribution • A generalized modular framework for Policy-based Trust-aware secure information sharing (Synergy) • Utilization of heterogeneous components in building a situational awareness system (VisiRescue), running on top of Synergy

  10. Overview • Motivation • Synergy framework • Trust negotiation • Components • Protocol • Case study • VisiRescue • Conclusion

  11. Synergy • Goals • To build a information sharing framework that is, • Secure • Modular • Extensible • Decouple security and authorization mechanisms from information sources and consumers to allow diverse systems to be integrated easily • Use Trust Negotiation for attribute-based authorization

  12. Trust negotiation overview • An iterative way of establishing trust between strangers • Uses attributes, certified by unforgeable digital credentials for authorization • Automated exchange based on policies allow flexibility and scalability • Example implementations: • Trustbuilder (UIUC and BYU) • Trust-X (Purdue, Milan)

  13. Client establishes trust with previously unknown server via TN Prove you’re the real TV station server previously certified by the State Server credentials Request for access to the weather sensors Prove that you are a first responder First responder credentials Server establishes trust with previously unknown client via TN A certificate from FEMA/IEMA Access tokens/ Sensor data Prove that there is an emergency situation Trust negotiation example Fireman in Champaign EOC Wind sensors at TV station

  14. Synergy components • Information Producer • The source of information, for example, a windspeed sensor • Information Consumer • The consumer of information, for example, a GIS display • Synergy Server • Provides access to resources based on access policies • Synergy Client • Retrieves information and converts it for use by consumer • Trust Agent • Provides access through Trust Negotiation

  15. Information Sources set policies for access to information Model Synergy Servers provide negotiated access to resources Trust Agents negotiate access to information on behalf of Synergy clients and servers Synergy clients communicates with server, provides resources to local application Information Consumers interpret and use the information

  16. Protocol (informal description) • Client to Server: • Request resource list • Server to Client: • Either the list, or a request for negotiation • Client: • Invoke its Trust Agent, negotiate with server’s designated Trust Agent, obtain token, resend list request • Client to Server: • Request individual resources • Server to Client: • Either the value of the resource, or a request to negotiate further • Client: • Invoke Trust Agent, negotiate, get token, resend request with token

  17. Advantages • Decouple security and authorization from information producers and consumers • This allows integrating any application on top of Synergy • TN allows attribute based authorization between the information producer and consumer’s domain, • More scalable and flexible than traditional identity based schemes

  18. Overview • Motivation • Synergy framework • Trust negotiation • Components • Protocol • Case study • VisiRescue • Conclusion

  19. Case study: VisiRescue • Goal • Build a situational awareness tool for City of Champaign Emergency Operations Center • Project information from different types of sensors available from various organizations in the city • Wind sensors: Located at the airport, Atmospheric science department • Waterflow: Maintained by USGS • Video Camera: Maintained by many entities

  20. Mapping to Synergy • Trust Agent • TrustBuilder 1.0 • Information Producer: • The sensor feeds, video streams, METCAD 911 data • Information Consumer: • Visual display with ArcGIS • Google Map API (quite useful and easy to program)

  21. Front Ends • ArcGIS • Too slow, heavyweight • But can show finer details with data from CCGIS • Not free! • Google Maps • Simple API using AJAX • Free! • Works fine for simple tasks

  22. Screenshot: GMap frontend

  23. Screenshot: ArcGIS

  24. Overview • Motivation • Synergy framework • Trust negotiation • Components • Protocol • Case study • VisiRescue • Conclusion

  25. Conclusion and Future work • Synergy allows scalable, policy-based secure information dissemination • Work-in-progress • More case studies in different areas • More work needed to standardize Trust Agent component

  26. Questions? Contact: rhasan@uiuc.edu

More Related